A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
When rain clouds gather: Digital curation of South African public records in the cloud
2020
South African Journal of Information Management
Funding information This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors. ...
Data availability statement The data that support the findings of this study are available from the corresponding author, M.N., upon reasonable request. ...
Given the nature of its design, data in the cloud storage cannot be accessed in the absence of network connection. ...
doi:10.4102/sajim.v22i1.1205
fatcat:wgbexs6u35h3piidycjrnmebma
Application of modern technologies in the management of records in public libraries
2020
Journal of the South African Society of Archivists
This study utilised literature review to investigate the application of modern technologies in managing records in public libraries with the view to highlight how these technologies can revolutionise library ...
The study established that although public libraries acknowledge the importance of modern technologies such as blockchain, cloud computing and Internet of Things in managing their records, these technologies ...
Cloud computing technology is therefore enabling librarians to shift from the paradigm of ownership and maintenance of resources towards the provision of access to information maintained and controlled ...
doi:10.4314/jsasa.v53i1.5
fatcat:nn5lbezrtne5zpnm7qw7mi7mk4
Cloud resources modelling using smart cloud management
2022
Bulletin of Electrical Engineering and Informatics
base (KB) (provide a cloud ontology which will help in the management of resources and provides intelligence to the smart cloud), server and cloud enrolment, designated monitoring tool and moderator. ...
value and its type; it also implements the strategy for efficient resource management for smart clouds. ...
ACKNOWLEDGEMENTS The authors would like to express their thanks to Mustansiriyah University Baghdad, Iraq for its support in this research. ...
doi:10.11591/eei.v11i2.3286
fatcat:uzwgoosxuncg5do4cqflvwugue
Block-Cloud: The new paradigm of Cloud Computing
2019
Economy Informatics
The user's focus on privacy, security and transparency has motivated corporations to invest in distributed applications throughout their structure and operations. ...
Distributed Ledger Technology (DLT), also known as "Blockchain", represents a new paradigm in how applications are designed and built. ...
A BlockCloud system offers the traceability needed for cloud providers to offer solutions that enables their customers to easily track the usage of all resources stored in their system. ...
doi:10.12948/ei2019.01.02
fatcat:ulmxjvitf5gjhculwa5xwa4jki
Managing Metadata to Protect the Integrity of Records. / Series: Digital Preservation in Lower Resource Environments: A Core Curriculum
[article]
2016
Zenodo
Managing Metadata to Protect the Integrity of Digital Records is designed to support records professionals working in lower resource countries in a range of organisational types, including public, private ...
Content and Structure of the Module Lesson 1: Concepts and terminology: what are metadata and how do they relate to the realities of managing and using records, data and statistics, particularly in lower-resource ...
Managing Metadata to Protect the Integrity of Digital Records is designed to support records professionals working in lower resource countries in a range of organisational types, including public, private ...
doi:10.5281/zenodo.3466166
fatcat:7fytqyjzk5cnhbk4b36p54ealy
Mobile Cloud for Assistive Healthcare (MoCAsH)
2010
2010 IEEE Asia-Pacific Services Computing Conference
Deploying state-of-the-art technologies is vital and inevitable in assistive healthcare to cope with emerging services such as remote monitoring, collaborative consultation, and electronic health record ...
Grid computing has succeeded somewhat in enabling the sharing of resources across organizations but has not been deployed widely due to its complex implementation and interface. ...
The resource manager will then allocate specific virtual execution resources in the virtual resource layer to execute the task. ...
doi:10.1109/apscc.2010.102
dblp:conf/apscc/HoangC10
fatcat:ae6ueft2lbcpzax6ndmfnczw4q
Authorized Secure Deduplication in Cloud Computing
2016
International Journal of Science and Research (IJSR)
Firstly, higher confidentiality is being ensured from unauthorized users. That is, every consumer computes a per data key in order to encrypt the data which intends to store in the cloud. ...
After receiving the client request to fetch the data CSP checks for the ownership of requested file and in response produce ResponseBackup message. ...
SYSTEM ARCHITECTURE Cloud Computing aim to drive the design of the next generation data centers by architecting them as a network of virtual services, so that users can access and deploy applications from ...
doi:10.21275/v5i6.nov164306
fatcat:m2dgegzsnzf6bffljuc42hnsf4
Security Concerns in Cloud Computing
2018
International Journal of Trend in Scientific Research and Development
In defiance of its potential characteristics, the organizations risk their sensitive data by storing it in the cloud. ...
The security and privacy challenge listed in this paper perceives demand for implementation of sophisticated technologies to deal with them. ...
In this, the cloud can be managed by the organizations themselves or given to the third party to manage it. These clouds have an agreement between the related organizations. ...
doi:10.31142/ijtsrd18306
fatcat:ojbdanrxpfg6zjnrm3n2la3ucy
Managing clouds
2006
ACM SIGOPS Operating Systems Review
We call this resource pool a cloud. ...
However, to exploit them in a wider range of environments, such as very large-scale networks of smartphones or set-top boxes, it is imperative to make P2P protocols manageable: we need to be able to start ...
Obviously, the system dynamism is reflected in the cloud composition. This is possible since the (peer-to-peer) applications we intend to support are designed with such environments in mind. ...
doi:10.1145/1151374.1151379
fatcat:6wxtn23r7zcfpmj3sbvbkpug2u
A framework for the digitisation of records and archives at selected state universities in Zimbabwe
2021
South African Journal of Information Management
multiple-case research design to provide an in-depth understanding of the cases of the digitisation of records and archives at the selected state universities. ...
This study is pertinent as it enriches the literature in the field of records and archives management and provides strategies on the management of digital records and archives in state universities in ...
This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors. ...
doi:10.4102/sajim.v23i1.1312
fatcat:yb7og7id7zeqvhsxvmjb2qdsg4
CLOUD COMPUTING IN HEALTHCARE
2017
International Journal of Students Research in Technology & Management
It has the special ability to offer infinite capacity and power of process in the e-healthcare sector.This leads computer to be used efficiently and exclusively by the sharing of resources in healthcare ...
This paper provide a review of some proposed cloud based e-healthcare architectures edge along with issues inbothtechnologies and the crucial reasons of enhancingforward to a cloud based e-healthcare especially ...
We wish to express our sincere thanks to all the authors for the information that guide us throughout this journey. VII. ...
doi:10.18510/ijsrtm.2017.516
fatcat:bmql5hycqzfhbkoq4x5oxjjkgi
A Model of Cloud Forensic Application With Assurance of Cloud Log
2021
International Journal of Digital Crime and Forensics
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. ...
The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. ...
He completed B E(CSE) in 1998 from CBIT, (affiliated to Osmania University), Hyderabad, and M Tech (CS), from JNTU Kakinada in 2002, and Passed Ph.D. in ...
doi:10.4018/ijdcf.20210901.oa7
fatcat:oslxixbyqzdyjj2dx373oexfgm
Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach
2010
Journal of Grid Computing
In this paper, we explore the architectural features of Cloud Computing and classify them according to the requirements of end-users, enterprises that use the cloud as a platform, and cloud providers themselves ...
We show that several architectural features will play a major role in the adoption of the Cloud Computing paradigm as a mainstream commodity in the enterprise world. ...
Acknowledgements The authors would like to thank the anonymous reviewers for their valuable comments which helped us to improve the quality of our initial manuscript. ...
doi:10.1007/s10723-010-9171-y
fatcat:af3ydifl2ncm5ljo75u5silxey
Factors impacting information governance in the mobile device dual‐use context
2013
Records Management Journal
Design/methodology/approach -Case study methodology was used and 15 semi-structured interviews were conducted with records and information management (RIM) and information security professionals from different ...
Purpose -The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual-use context. ...
the records management system. ...
doi:10.1108/rmj-11-2012-0033
fatcat:vnua7uvdl5b6fo2yummb5az7kq
Deduplication on Encrypted Big Data in Cloud
2016
IEEE Transactions on Big Data
In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. ...
Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. ...
In this paper, we proposed a practical scheme to manage the encrypted big data in cloud with deduplication based on ownership challenge and PRE. ...
doi:10.1109/tbdata.2016.2587659
fatcat:wpfdm3jlljc3vlfoalfxko5apy
« Previous
Showing results 1 — 15 out of 27,844 results