27,844 Hits in 7.8 sec

When rain clouds gather: Digital curation of South African public records in the cloud

Amos Shibambu, Mpho Ngoepe
2020 South African Journal of Information Management  
Funding information This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors.  ...  Data availability statement The data that support the findings of this study are available from the corresponding author, M.N., upon reasonable request.  ...  Given the nature of its design, data in the cloud storage cannot be accessed in the absence of network connection.  ... 
doi:10.4102/sajim.v22i1.1205 fatcat:wgbexs6u35h3piidycjrnmebma

Application of modern technologies in the management of records in public libraries

Tlou Maggie Masenya
2020 Journal of the South African Society of Archivists  
This study utilised literature review to investigate the application of modern technologies in managing records in public libraries with the view to highlight how these technologies can revolutionise library  ...  The study established that although public libraries acknowledge the importance of modern technologies such as blockchain, cloud computing and Internet of Things in managing their records, these technologies  ...  Cloud computing technology is therefore enabling librarians to shift from the paradigm of ownership and maintenance of resources towards the provision of access to information maintained and controlled  ... 
doi:10.4314/jsasa.v53i1.5 fatcat:nn5lbezrtne5zpnm7qw7mi7mk4

Cloud resources modelling using smart cloud management

Haitham Salman Chyad, Raniah Ali Mustafa, Dena Nadir George
2022 Bulletin of Electrical Engineering and Informatics  
base (KB) (provide a cloud ontology which will help in the management of resources and provides intelligence to the smart cloud), server and cloud enrolment, designated monitoring tool and moderator.  ...  value and its type; it also implements the strategy for efficient resource management for smart clouds.  ...  ACKNOWLEDGEMENTS The authors would like to express their thanks to Mustansiriyah University Baghdad, Iraq for its support in this research.  ... 
doi:10.11591/eei.v11i2.3286 fatcat:uzwgoosxuncg5do4cqflvwugue

Block-Cloud: The new paradigm of Cloud Computing

2019 Economy Informatics  
The user's focus on privacy, security and transparency has motivated corporations to invest in distributed applications throughout their structure and operations.  ...  Distributed Ledger Technology (DLT), also known as "Blockchain", represents a new paradigm in how applications are designed and built.  ...  A BlockCloud system offers the traceability needed for cloud providers to offer solutions that enables their customers to easily track the usage of all resources stored in their system.  ... 
doi:10.12948/ei2019.01.02 fatcat:ulmxjvitf5gjhculwa5xwa4jki

Managing Metadata to Protect the Integrity of Records. / Series: Digital Preservation in Lower Resource Environments: A Core Curriculum [article]

International Council On Archives International Record Management Trust
2016 Zenodo  
Managing Metadata to Protect the Integrity of Digital Records is designed to support records professionals working in lower resource countries in a range of organisational types, including public, private  ...  Content and Structure of the Module Lesson 1: Concepts and terminology: what are metadata and how do they relate to the realities of managing and using records, data and statistics, particularly in lower-resource  ...  Managing Metadata to Protect the Integrity of Digital Records is designed to support records professionals working in lower resource countries in a range of organisational types, including public, private  ... 
doi:10.5281/zenodo.3466166 fatcat:7fytqyjzk5cnhbk4b36p54ealy

Mobile Cloud for Assistive Healthcare (MoCAsH)

Doan B. Hoang, Lingfeng Chen
2010 2010 IEEE Asia-Pacific Services Computing Conference  
Deploying state-of-the-art technologies is vital and inevitable in assistive healthcare to cope with emerging services such as remote monitoring, collaborative consultation, and electronic health record  ...  Grid computing has succeeded somewhat in enabling the sharing of resources across organizations but has not been deployed widely due to its complex implementation and interface.  ...  The resource manager will then allocate specific virtual execution resources in the virtual resource layer to execute the task.  ... 
doi:10.1109/apscc.2010.102 dblp:conf/apscc/HoangC10 fatcat:ae6ueft2lbcpzax6ndmfnczw4q

Authorized Secure Deduplication in Cloud Computing

2016 International Journal of Science and Research (IJSR)  
Firstly, higher confidentiality is being ensured from unauthorized users. That is, every consumer computes a per data key in order to encrypt the data which intends to store in the cloud.  ...  After receiving the client request to fetch the data CSP checks for the ownership of requested file and in response produce ResponseBackup message.  ...  SYSTEM ARCHITECTURE Cloud Computing aim to drive the design of the next generation data centers by architecting them as a network of virtual services, so that users can access and deploy applications from  ... 
doi:10.21275/v5i6.nov164306 fatcat:m2dgegzsnzf6bffljuc42hnsf4

Security Concerns in Cloud Computing

Gopal K. Shyam, Mir Abdul Samim Ansari
2018 International Journal of Trend in Scientific Research and Development  
In defiance of its potential characteristics, the organizations risk their sensitive data by storing it in the cloud.  ...  The security and privacy challenge listed in this paper perceives demand for implementation of sophisticated technologies to deal with them.  ...  In this, the cloud can be managed by the organizations themselves or given to the third party to manage it. These clouds have an agreement between the related organizations.  ... 
doi:10.31142/ijtsrd18306 fatcat:ojbdanrxpfg6zjnrm3n2la3ucy

Managing clouds

Ozalp Babaoglu, Márk Jelasity, Anne-Marie Kermarrec, Alberto Montresor, Maarten van Steen
2006 ACM SIGOPS Operating Systems Review  
We call this resource pool a cloud.  ...  However, to exploit them in a wider range of environments, such as very large-scale networks of smartphones or set-top boxes, it is imperative to make P2P protocols manageable: we need to be able to start  ...  Obviously, the system dynamism is reflected in the cloud composition. This is possible since the (peer-to-peer) applications we intend to support are designed with such environments in mind.  ... 
doi:10.1145/1151374.1151379 fatcat:6wxtn23r7zcfpmj3sbvbkpug2u

A framework for the digitisation of records and archives at selected state universities in Zimbabwe

Godfrey Tsvuura, Patrick Ngulube
2021 South African Journal of Information Management  
multiple-case research design to provide an in-depth understanding of the cases of the digitisation of records and archives at the selected state universities.  ...  This study is pertinent as it enriches the literature in the field of records and archives management and provides strategies on the management of digital records and archives in state universities in  ...  This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors.  ... 
doi:10.4102/sajim.v23i1.1312 fatcat:yb7og7id7zeqvhsxvmjb2qdsg4


Lingkiswaran Devadass, Sugalia Santhira Sekaran, Rajermani Thinakaran
2017 International Journal of Students Research in Technology & Management  
It has the special ability to offer infinite capacity and power of process in the e-healthcare sector.This leads computer to be used efficiently and exclusively by the sharing of resources in healthcare  ...  This paper provide a review of some proposed cloud based e-healthcare architectures edge along with issues inbothtechnologies and the crucial reasons of enhancingforward to a cloud based e-healthcare especially  ...  We wish to express our sincere thanks to all the authors for the information that guide us throughout this journey. VII.  ... 
doi:10.18510/ijsrtm.2017.516 fatcat:bmql5hycqzfhbkoq4x5oxjjkgi

A Model of Cloud Forensic Application With Assurance of Cloud Log

More Swami Das, A. Govardhan, Vijaya Lakshmi Doddapaneni
2021 International Journal of Digital Crime and Forensics  
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities.  ...  The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security.  ...  He completed B E(CSE) in 1998 from CBIT, (affiliated to Osmania University), Hyderabad, and M Tech (CS), from JNTU Kakinada in 2002, and Passed Ph.D. in  ... 
doi:10.4018/ijdcf.20210901.oa7 fatcat:oslxixbyqzdyjj2dx373oexfgm

Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach

Bhaskar Prasad Rimal, Admela Jukan, Dimitrios Katsaros, Yves Goeleven
2010 Journal of Grid Computing  
In this paper, we explore the architectural features of Cloud Computing and classify them according to the requirements of end-users, enterprises that use the cloud as a platform, and cloud providers themselves  ...  We show that several architectural features will play a major role in the adoption of the Cloud Computing paradigm as a mainstream commodity in the enterprise world.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their valuable comments which helped us to improve the quality of our initial manuscript.  ... 
doi:10.1007/s10723-010-9171-y fatcat:af3ydifl2ncm5ljo75u5silxey

Factors impacting information governance in the mobile device dual‐use context

Mario Silic, Andrea Back
2013 Records Management Journal  
Design/methodology/approach -Case study methodology was used and 15 semi-structured interviews were conducted with records and information management (RIM) and information security professionals from different  ...  Purpose -The purpose of this paper is to reveal factors that impact information governance within the mobile technology implementation in organizations in the dual-use context.  ...  the records management system.  ... 
doi:10.1108/rmj-11-2012-0033 fatcat:vnua7uvdl5b6fo2yummb5az7kq

Deduplication on Encrypted Big Data in Cloud

Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng
2016 IEEE Transactions on Big Data  
In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form.  ...  Therefore, few of them can be readily deployed in practice. In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption.  ...  In this paper, we proposed a practical scheme to manage the encrypted big data in cloud with deduplication based on ownership challenge and PRE.  ... 
doi:10.1109/tbdata.2016.2587659 fatcat:wpfdm3jlljc3vlfoalfxko5apy
« Previous Showing results 1 — 15 out of 27,844 results