Filters








15,839 Hits in 8.0 sec

Proactive Maintenance Strategy Based on Resilience Empowerment for Complex Buildings [chapter]

Francesco Rota, Maria Cinzia Luisa Talamo, Giancarlo Paganin
2020 Smart Innovation, Systems and Technologies  
in the direction of a proactive maintenance approach.  ...  In this perspective, maintenance is therefore a key factor to assure building resilience by keeping systems and equipment in the required operational state.  ...  This paper shows an application of a methodology, tested for the proactive maintenance of equipment, which support the operations of hospital buildings. 2 Complex Systems Resilience Management in the Building  ... 
doi:10.1007/978-3-030-52869-0_21 fatcat:4dgcbwsennbgxekozpdjzs4d3q

Risk-Driven Proactive Fault-Tolerant Operation of IaaS Providers

Jordi Guitart, Mario Macias, Karim Djemame, Tom Kirkham, Ming Jiang, Django Armstrong
2013 2013 IEEE 5th International Conference on Cloud Computing Technology and Science  
Risk assessments are used to analyse execution specific data from the Cloud Infrastructure and linked to a business driven holistic management component that is part of a Cloud Manager.  ...  In this paper a risk model methodology and holistic management approach is developed specific to the operation of the Cloud Infrastructure Provider and is applied through improvements to SLA fault tolerance  ...  FAULT-TOLERANT IP OPERATION Our approach for fault-tolerant VM management in an IP considers the synergistic operation of several components: Risk Assessor, which is able to assess the risk level of a  ... 
doi:10.1109/cloudcom.2013.62 dblp:conf/cloudcom/GuitartMDKJA13 fatcat:g3uayqfi6nhpfeos3kb3aazcja

Introducing the Information Security Management System in Cloud Computing Environment

2015 Acta Polytechnica Hungarica  
In this paper, authors suggested a framework for an establishing quality management system (QMS) of CCSs, including CC SMF and CC ISMS, proactive digital forensic (DF), proactive and predictive security  ...  Available Cloud Computing Services (CCSs) include new types of vulnerability (management, virtualization, sprawl, etc.) and differ in management requirements from other computational systems.  ...  suggested by Gartner group, in the article, Assessing the Security Risks of Cloud Computing, in June 2008, etc.  ... 
doi:10.12700/aph.12.3.2015.3.9 fatcat:cd4mcs4hnjfa3c5hdlptstic5i

Technology of computing risks visualization for distributed production infrastructures

Dmitrii Voronin, Victoria Shevchenko, Olga Chengar, S. Bratan, S. Gorbatyuk, S. Leonov, S. Roshchupkin
2018 MATEC Web of Conferences  
Scientific problems related to the classification, assessment, visualization and management of risks in the cloud environments have been considered.  ...  In order to fill this research gap, this study attempts to propose a risks visualization technique that is based on radar chart implementation for multidimensional data visualization.  ...  Examples of a radar charts used for operational and informational cloud assessment risks are presented on the figures 4 and 5.  ... 
doi:10.1051/matecconf/201822402071 fatcat:ycfdh7cf7rbszptvp7ewmxogwq

Challenges and Mitigation for Application Deployment over SaaS Platform in Banking and Financial Services Industry

Abhishek Mahalle, Jianming Yong, Xiaohui Tao
2021 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)  
SaaS platform hosts critical applications required for every operations of Bank which includes core banking application, internet banking platform, Card processing applications, ATM & EFTPOS networks and  ...  In this paper we have discussed the challenges in deploying the changes required in applications over SaaS platform and methods to mitigate those challenges with minimum or no disruption to cloud architecture  ...  Elasticity of Cloud resources with changing demand: Elasticity of cloud is a prime characteristic that acts as a decisive factor to select cloud infrastructure over application service provider infrastructure  ... 
doi:10.1109/cscwd49262.2021.9437798 fatcat:lrfqzgx6sbbnlnrtxpd47yqv6i

Rapid and Proactive Approach on Exploration of Vulnerabilities in Cloud based Operating Systems

S. Ramachandran, A. Ramachandran
2012 International Journal of Computer Applications  
Cloud computing was originally designed for dealing with problems involving large amounts of data and/or compute-intensive applications.  ...  Our approach plays a major role in detecting and managing vulnerabilities present in the Cloud infrastructure. Implementation of this methodology proves to be cost effective and saves analyzing time .  ...  RPVS is a comprehensive enterprise Vulnerability Scanner Tool. It functions to track risk assessment of operating system.  ... 
doi:10.5120/5674-7711 fatcat:cu7y3bumyzerdkouclcwv3qh4y

Multifaceted Risk Assessment and Risk Countermeasure Portfolio for Internet of Things

Shigeaki Tanimoto
2021 International journal of service and knowledge management  
Our findings help clarify IoT security and its relation to non-cyber risks for proper implementation of IoT systems.  ...  Next, we proposed risk countermeasures for all the extracted risk factors using a risk matrix method.  ...  Current Risk Assessment Current risk assessment methods have huge limitations when it comes to applying them to ever-changing IoT systems [8] .  ... 
doi:10.52731/ijskm.v5.i2.641 fatcat:4htesactnnec5jns7m2uzmk37i

Secure NXT-the Next Level of Cloud Security

N.Venkata Subramanian, V. Prakash, K.S. Ramanujam
2013 Research Journal of Applied Sciences Engineering and Technology  
In other words, enterprises are looking for assurances that they are not adding risk to the business by leveraging the cloud. For many, moving to the cloud is still a leap of faith.  ...  Therefore, the adoption of cloud services is being tempered by a significant level of uncertainty.  ...  , too • In summary we recommend that organizations should • Establish a risk-based approach for assessing viability of cloud services • Design applications to run in the cloud • Implement ongoing auditing  ... 
doi:10.19026/rjaset.6.3930 fatcat:f7u2o7zdgnf67cz6nh5ei446tm

CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment)

Jyoti Bolannavar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
For example, manually assessing the secure setup and configuration in cloud environments across different services, each with varying granularities of authorization policies, is extremely difficult, if  ...  and "Does the configuration of my cloud services represent excessive risk?"  ...  Since cloud infrastructure is always in flux, the strategy for CSPM should be one of continuous assessment and improvement throughout the life cycle of cloud applications, beginning in development and  ... 
doi:10.32628/cseit206268 fatcat:tamcusngtzax7dvojydrx6lj6q

Methodology for Information Management and Data Assessment in Cloud Environments

Mariam Kiran, Gregory Katsaros, Jordi Guitart, Juan Luis Prieto
2014 International Journal of Grid and High Performance Computing  
In this paper, an architectural approach is presented that involves a combination of a cloud-enabled data model, the monitoring infrastructure and the establishment of assessment mechanisms which are based  ...  This architectural model discusses the monitoring features as well as the how the assessment functionalities can work together with other components to produce a self-reliant cloud ecosystem preventing  ...  The result of assessing this information causes these components to react to the changes in the environment and optimize the operation of the Cloud.  ... 
doi:10.4018/ijghpc.2014100104 fatcat:76orz25wpvbm3iij5k6qmd6qjy

Quantitative Risk Analysis for Mobile Cloud Computing: A Preliminary Approach and a Health Application Case Study

Javeria Samad, Seng W. Loke, Karl Reed
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
This paper is a first step in developing a quantitative risk model suitable for a dynamic mobile cloud environment.  ...  Mobile cloud computing is presented as the next logical step in the adoption of cloud based systems. However, there are number of issues inherent in it that may limit its uptake.  ...  In order to calculate the risk value for a mobile cloud system/application precisely, we utilize the following procedure.  ... 
doi:10.1109/trustcom.2013.166 dblp:conf/trustcom/SamadLR13 fatcat:mygb2xen4nf5fo5354z4t5i7ii

Study on the Security Models and Strategies of Cloud Computing

Jianhua Che, Yamin Duan, Tao Zhang, Jie Fan
2011 Procedia Engineering  
However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications.  ...  Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits.  ...  Customers must keep in mind that they may have to change service providers for the sake of unacceptable cost increase at contract renewal time, business operations ceasing by service providers, partial  ... 
doi:10.1016/j.proeng.2011.11.2551 fatcat:ef2ufqcjyjar5iniqgonj4itvu

Malicious code in the cloud
Zlonamerni kod u oblaku

Dragan Damjanović
2022 Vojnotehnički Glasnik  
In addition, billions of devices on the Internet use the cloud infrastructure as a background for processing and transmitting large data sets.  ...  Understanding the nature of practical security controls and how they are assessed enables organizations to build a practical approach to security and privacy in the cloud.  ...  Hooking ) is an inherent technique for controlling the execution behavior of running processes by intercepting the flow of communication, which changes the known behavior of the operating system.  ... 
doi:10.5937/vojtehg70-37168 fatcat:ucw67ifo4rhorispgwo6yynriu

Moving Target Defense for SDN-Based Cloud Datacenter Network Protection

2021 International Journal of Advanced Trends in Computer Science and Engineering  
and complexityto the attackers and reduce the likelihood of an attack and minimize cloud security risk.  ...  The key underlying idea of MTD is to increase uncertainty and confusion for attackers by changing attack surface (i.e., system or network configurations) that can invalidate the intelligence collected  ...  All network elements run a Linux sub-system that operates real-world protocols and applications.  ... 
doi:10.30534/ijatcse/2021/421032021 fatcat:6xheceoopbdbljagcfwnqhwote

Liability of corporations in Italy and risk prevention: toward a cloud-governance system

Barbara Gaudenzi, Gianluigi Lucietto, Pietro Domenichini
2013 International Journal of Auditing Technology  
This research describes the Italian regulation on liability of corporations (Italian Legislative Decree 231 issued in 2001) and the consequent requirements in terms of risk management and corporate governance  ...  Finally, the paper analyses when and how cloud-based solutions can support companies in managing critical risks, and particularly those risks that are formally mentioned by the Italian regulation on liability  ...  Looking at the usability of cloud systems, significant applications are reported in the field of risk and security management.  ... 
doi:10.1504/ijaudit.2013.057731 fatcat:lqn4lkt5afh7tjyie4xcn55cuu
« Previous Showing results 1 — 15 out of 15,839 results