7,895 Hits in 3.2 sec

Risk-Driven Compliant Access Controls for Clouds [article]

Hanene Boussi Rahmouni, Kamran Munir, Mohammed Odeh, Richard McClatchey
2012 arXiv   pre-print
These metrics will be integrated within usual data access-control policies and will be checked at policy analysis time before a decision to allow/deny the data access is made.  ...  on it in order to define metrics for non-compliance or, in other terms, risks to compliance.  ...  Figure 1 : 1 A Proposed Roadmap to Enforce Compliant Access Control (Denial of Access) Figure 2 : 2 An Ontology-Driven Framework for Legal Requirements and Risks Engineering for the Exchange of Private  ... 
arXiv:1202.5482v2 fatcat:2lu3w6fy4bfbxa3hgaddbz73ta

Hey You, Get On the Cloud: Safe and Compliant Use of Cloud Computing with Medical Devices

Clay Anselmo, Mike Attili, Randy Horton, Bernhard Kappe, Josh Schulman, Pat Baird
2021 Biomedical Instrumentation & Technology  
Acknowledgments The authors thank John Murray, a former employee of the Food and Drug Administration, for his vision for this article; Nathan Leong and Steve Mutkoski from Microsoft for contributing ideas  ...  to the writing of the manuscript; Wil Vargas, formerly a senior director of standards at AAMI, for his contributions to the manuscript; and Richard de la Cruz of Silver Lake Group Inc. for reviewing the  ...  • You can create an appropriate purchasing control that is compliant with 21 CFR 820.50  ... 
doi:10.2345/0899-8205-55.1.1 pmid:33465776 pmcid:PMC8641424 fatcat:bug4uloaanfhpeshmek2f3q5mq

Adaptive management of applications across multiple clouds: The SeaClouds Approach

Antonio Brogi, Jose Carrasco, Javier Cubo, Elisabetta Di Nitto, Francisco Durán, Michella Fazzolari, Ahmad Ibrahim, Ernesto Pimentel, Jacopo Soldani, PengWei Wang, Francesco D´Andria
2015 CLEI Electronic Journal  
How to deploy and manage, in an efficient and adaptive way, complex applications across multiple heterogeneous cloud platforms is one of the problems that have emerged with the cloud revolution.  ...  the distribution, monitoring and migration of application modules over multiple heterogeneous cloud platforms.  ...  Brooklyn ( is an open source, policy-driven control plane for distributed applications delivered by CloudSoft (a member of the SeaClouds consortium).  ... 
doi:10.19153/cleiej.18.1.1 fatcat:kgqla55vgjee7gyyswfelzypny

The Infrastructure Level of Cloud Computing as a Basis for Privacy and Security of Software Services [chapter]

Ina Schiering, Jan Kretschmer
2012 IFIP Advances in Information and Communication Technology  
In this context a prototype of an IaaS cloud service is presented which serves as a basis for software services (e.g. SaaS services) compliant with these European Directive.  ...  An important basis for cloud computing are public IaaS cloud services as offered e.g. by Amazon, Rackspace, VmWare.  ...  Another interesting direction for research is the composition of cloud services out of services of different cloud providers and the investigation of processes for data processing of cloud users incorporating  ... 
doi:10.1007/978-3-642-31668-5_7 fatcat:hs5aqxpoxbavvcpz25inx44jti

C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive Surveillance System for Prostate Cancer

Haibin Wang
2012 International Journal of Computer Science & Information Technology (IJCSIT)  
This paper presents C-PASS-PC, a cloud-driven prototype of multi-center proactive surveillance system for prostate cancer.  ...  The C-PASS-PC prototype can be accessed through an SSL-enabledweb browser.  ...  It strictly controls staff's access to customer's confidential data.  ... 
doi:10.5121/ijcsit.2012.4412 fatcat:ichr5d3szvh45lmw6sgkmtt3mi

Migrating a research data warehouse to a public cloud: challenges and opportunities

Michael G Kahn, Joyce Y Mui, Michael J Ames, Anoop K Yamsani, Nikita Pozdeyev, Nicholas Rafaels, Ian M Brooks
2021 JAMIA Journal of the American Medical Informatics Association  
New RDWs are migrating to cloud platforms for the scalability and flexibility needed to meet these challenges. We describe our experience in migrating a multi-institutional RDW to a public cloud.  ...  Objective Clinical research data warehouses (RDWs) linked to genomic pipelines and open data archives are being created to support innovative, complex data-driven discoveries.  ...  We also thank our partners at Google Cloud for Higher Education and Research for their unfailing support and expert guidance.  ... 
doi:10.1093/jamia/ocab278 pmid:34919694 pmcid:PMC8922165 fatcat:d4xflguhyvbmze2necxfmzpmsa

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David Laverty, Sakir Sezer
2020 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)  
The presented work does not migrate control of each individual device to the cloud. Authors in [15] presented access control models for the integration of cloud technologies.  ...  OpenVPN Setup For VPN setup, an open-source and scalable VPN solution is used i.e., OpenVPN. A cloud VM is configured with 'OpenVPN Access Server' that acts as the gateway for external access.  ... 
doi:10.1109/isgt45199.2020.9087760 dblp:conf/isgt/KhanMKLS20 fatcat:zl4bv2c7xveoza3h2jxbujurjq

Trust and Regulation Conceptualisation: The Foundation for User-Defined Cloud Policies [chapter]

Jörg Kebbedies, Felix Kluge, Iris Braun, Alexander Schill
2016 IFIP Advances in Information and Communication Technology  
An ontology-driven regulation concept enables formal policy definitions and trustworthy real-time reasoning about current trust levels, policy states, and pending security risks.  ...  This work introduces a conceptual approach to user-centric policy management for cloud usage, combined with an underpinning holistic trust approach.  ...  The use of a Mandatory Access Control (MAC) model mitigates deficiencies of standard UNIX-based access-control models; the cloud user is given the security background needed to take over responsibility  ... 
doi:10.1007/978-3-319-41354-9_14 fatcat:udu4yil3mnaa3fcftas7334xym

Trusted, Fair Multi-Segment Business Models, Enabled by a User-Centric, Privacy-Aware Platform, for a Data-Driven Era

Iosif Alvertis, Michael Petychakis, Romanos Tsouroplis, Evmorfia Biliri, Fenareti Lampathaki, Dimitrios Askounis
2015 International Conference on Advanced Information Systems Engineering  
storage space, the "Cloudlet", equipped with strong privacy controlling mechanisms, accessed through its open-source Graph API platform.  ...  Users have greeted this abundance of services with even greater demand for innovative applications to address personal and business needs, but are still unaware of the full power that could be leveraged  ...  This work has been created in the context of the EU-funded project OPENi (Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets), Contract No:  ... 
dblp:conf/caise/AlvertisPTBLA15 fatcat:c4wg2uaw2rc2ffucgqzgtcj5ta

Extracting Requirements and Modeling Information and Controlling Risk

Jeffrey Carver, Birgit Penzenstadler, Silvia Abrahao
2021 IEEE Software  
THE "PRACTITIONERS' DIGEST" department in this issue of IEEE Software includes papers from the 2020 IEEE Conference on Requirements Engineering and the ACM/ IEEE 23rd International Conference on Model Driven  ...  Data-Driven Risk Management "Data-Driven Risk Management for Requirements Engineering: An Automated Approach Based on Bayesian Networks" by Wiesweg and colleagues 1 addresses one of the most important  ...  requirements engineering activities: controlling risk.  ... 
doi:10.1109/ms.2021.3056989 fatcat:3n5snjyxhjaqll2uu544dg3uwi

Contribution to the uptake of Cloud Computing solutions: Design of a cloud services intermediator to foster an ecosystem of trusted, interoperable and legal compliant cloud services. Application to multi-cloud aware software [article]

Juncal Alonso, Leire Orue-Echevarria, Marisa Escalante
2019 Zenodo  
Contribution to the uptake of Cloud Computing solutions: Design of a cloud services intermediator to foster an ecosystem of trusted, interoperable and legal compliant cloud services.  ...  Application to multi-cloud aware software. Open Communications, WEBIST 2019  ...  of cloud services, for assembling a network of interoperable, legal compliant, quality assessed (against SLAs) single and composite cloud services for multi-cloud aware applications deployment and operation  ... 
doi:10.5281/zenodo.3748988 fatcat:hpyw5o5kwvge7hsbxcinwgvjom

Legal issues in clouds: towards a risk inventory

K. Djemame, B. Barnitzke, M. Corrales, M. Kiran, M. Jiang, D. Armstrong, N. Forgo, I. Nwankwo
2012 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
This paper focuses on the legal issues surrounding risk assessment in Cloud Computing.  ...  If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential, during SLA negotiation and service operation.  ...  This requires functions for input control in order to retrace who accessed which data, the time and purpose of access (Schultze-Melling 2010).  ... 
doi:10.1098/rsta.2012.0075 pmid:23230158 fatcat:eq5toa6s2vbkffzxjlylfcxaxq

Research on compliant configuration of hydraulic manipulator with passive following characteristic

Lin Jiang, Lisheng Ren, Xiaoyue Pan, Jianyang Zhu, Hui Zhao
2020 The Journal of Engineering  
which provides theoretical guidance for the subsequent design of the compliant manipulator.  ...  Finally, the visual method is employed to solve, draw, and compare the workspace of the selected compliant configuration, to obtain the optimal compliant configuration with both flexibility and motion,  ...  A standard D-H parameter table for the compliant configuration was created, and the workspace cloud map was drawn using the MATLAB robot toolbox.  ... 
doi:10.1049/joe.2020.0044 fatcat:hcfvppuuorawpizpsuylggacxi

CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment)

Jyoti Bolannavar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
and "Does the configuration of my cloud services represent excessive risk?"  ...  For example, manually assessing the secure setup and configuration in cloud environments across different services, each with varying granularities of authorization policies, is extremely difficult, if  ...  As shown in Figure 1, we are continuously monitoring for gaps between our desired security policy (driven from our cloud risk and governance processes), the intended security posture (what the developer  ... 
doi:10.32628/cseit206268 fatcat:tamcusngtzax7dvojydrx6lj6q

C-PASS-PC: A Cloud-driven Prototype of Multi-Center Proactive Surveillance System for Prostate Cancer [article]

Haibin Wang
2012 arXiv   pre-print
This paper presents C-PASS-PC, a cloud-driven prototype of multi-center proactive surveillance system for prostate cancer.  ...  Cloud Computing platforms provide big potential for increasing efficiency through a web-based data collection interface, especially for large-scale multi-center trials.  ...  As a future work, we will study the architecture and technology of inter-Cloud communication tools which connect heterogeneous Cloud Computing platforms and present one uniform API.  ... 
arXiv:1209.2641v1 fatcat:zyarufektvarxcrlinsgw6embi
« Previous Showing results 1 — 15 out of 7,895 results