Filters








70 Hits in 7.1 sec

Transformational Cloud Government (TCG): Transforming Public Administrations with a Cloud of Public Services

Juncal Alonso, Marisa Escalante, Leire Orue-Echevarria
2016 Procedia Computer Science  
maturity level of cloud adoption in public administrations, allowing to transition their own software and services to implement on one hand, a more efficient internal software to be used by the public  ...  This paper introduces the novel Transformational Cloud Government (TCG) approach and its enabling tools, techniques and best practices to foster the adoption of cloud computing as well as to improve the  ...  of public administrations with ICT 29 in what we have named the Transformational Cloud Government.  ... 
doi:10.1016/j.procs.2016.08.279 fatcat:rv6mfwwbt5halhbt7sftqkplgy

A Study of Security and Privacy Issues at Service Models of Cloud Computing

Vaishali R. Thakare, K. John Singh
2016 Indian Journal of Science and Technology  
Moreover, service models of cloud computing are also described with its security issues.  ...  Application/ Improvements: This paper studied about the cloud security concerns and brings a new challenge to the cloud service provider and a parameter wise comparison of existing security solutions.  ...  The resources of cloud are found at an off-site area, which transforms this model into less secure and more vulnerable than other organization models, on the grounds that the administration service models  ... 
doi:10.17485/ijst/2016/v9i38/92880 fatcat:3zo5nxjj7ze6xbz24fq3xn6y2e

A Survey on User Authentication Techniques and Attack Taxonomy in Cloud Computing

Madhuri Dhange, Rajani Sajjan, Vijay Ghorpade
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
So nowadays, the private enterprises, government organizations, educational institutional are adopting cloud services for their work.  ...  In recent years, a lot of research on cloud security has been carried out and many more techniques and methods are proposed to overcome cloud security issues.  ...  It is used with combination of other authentication technology to provide robust security to cloud services.  ... 
doi:10.23956/ijarcsse/v7i2/0122 fatcat:wmczq24evnaaroc63xk4n3pnbu

Enterprise Information Risk Management: Dealing with Cloud Computing [chapter]

Adrian Baldwin, David Pym, Simon Shiu
2012 Computer Communications and Networks  
From the perspective of engagement with a services ecosystem, there is a change in the procurement model.  ...  No longer do we see an IT stack that operates under a set of security policies; instead, we procure business IT services with appropriate terms and conditions.  ...  administrative roles, along with strong audit.  ... 
doi:10.1007/978-1-4471-4189-1_8 fatcat:qeqlezuyyneghkoszfbuuiuyba

Security and Privacy Issues in Cloud Computing [article]

Jaydip Sen
2013 arXiv   pre-print
In this chapter, we describe various service and deployment models of cloud computing and identify major challenges.  ...  Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.  ...  Transformational Government Framework TC: it is advancing an overall framework for using IT to improve delivery of public services.  ... 
arXiv:1303.4814v1 fatcat:2h7xyaefbzaqbkfz3hwnux6pe4

Initial 2016 HOLACloud Roadmap

Keith G. Jeffery, Lutz Schubert
2016 Procedia Computer Science  
The HOLACloud initial 2016 roadmap has been generated by a process similar to that for 2015 using the input to the CLOUD Forward Conference 2016.  ...  stack including trust, security and privacy; interoperability both across hybrid CLOUD platforms and across heterogeneity of data and software.  ...  The order of authors/papers below is the planned programme order at the conference.  ... 
doi:10.1016/j.procs.2016.08.296 fatcat:debhq66xjfc75morrgd3meiuqy

Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services [chapter]

Yuri Demchenko, Canh Ngo, Cees de Laat, Diego R. Lopez, Antonio Morales, Joan A. García-Espín
2012 Computer Communications and Networks  
In particular, this chapter discusses the design and use of a security token service for federated access control and security context management in the generically multi-domain and multi-provider cloud  ...  This chapter describes general use cases for provisioning cloud infrastructure services and the proposed architectural framework that provides a basis for defining the security infrastructure requirements  ...  Acknowledgement This work is supported by the FP7 EU-funded project GEANT3 (FP7-ICT-238875) and the FP7 EU-funded integrated project the Generalised Architecture for Dynamic Infrastructure Services (GEYSERS  ... 
doi:10.1007/978-1-4471-4189-1_5 fatcat:ri2iagravjbpblkqzfhpceeof4

Digital Trust - Trusted Computing and Beyond: A Position Paper

Raja Naeem Akram, Ryan K.L. Ko
2014 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications  
We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems.  ...  Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment.  ...  They have to get the cloud service provider to make an offline agreement (official contract governed by local regulations/laws of the country where the health care provider resides) regarding the security  ... 
doi:10.1109/trustcom.2014.116 dblp:conf/trustcom/AkramK14a fatcat:xjmm6svm2zbkzmdewmgemha33u

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  For example, core-services may be on a private cloud; other services originate from public clouds.  ...  The ability to augment a private cloud with the resources of a public cloud can be used to manage any unexpected surges in workload.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself  ...  Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace.  ...  Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 2014CB340601, 61332019, 61379139, U1135002, U1405255, 61431008, 2013CB329603).  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
We also deduce an attack strategy of a Distributed Denial of Service attack through IoT botnet followed by requisite security measures.  ...  This paper thus endeavors to highlight most of the known threats at various layers of the IoT architecture with a focus on the anatomy of malware attacks.  ...  This public sharing is currently achieved with the cloud technologies. Over the period cloud computing [93] has evolved to process, analyze and store Big Data.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

Automated and Secure Onboarding for System of Systems

Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkic, Balint Peceli, Gabor Singler, Kristof Kovacs, Markus Tauber, Jerker Delsing
2021 IEEE Access  
A different scenario is the administration and authentication of mobile devices, which may enter and leave local clouds on an ad-hoc basis.  ...  (TCG) industry consortium.  ...  The sequence diagram of the automated onboarding procedure for a new device with a manufacturer certificate. the device without using any CA service, or (ii) verifies the received Arrowhead onboarding  ... 
doi:10.1109/access.2021.3102280 fatcat:oy5otxecabfqxlrryomgqsfjma

Supercloud Self-Management Of Security Specification

Reda Yaich, Sabir Idrees, Nora Cuppens, Frédéric Cuppens
2015 Zenodo  
We conclude with a summary and a presentation of ongoing and future steps.  ...  In this document, we present a preliminary architecture of SUPERCLOUD security self-management.  ...  A cloud resource is a virtual component of limited availability within the cloud infrastructure, such as an instance, a volume, a public IP address, etc.  ... 
doi:10.5281/zenodo.49741 fatcat:pxpw6e4uw5c4hpdyz6wjyehbqq

Asia Federation Report on International Symposium on Grid Computing (ISGC) 2010 [chapter]

Francois Grey, Simon C. Lin
2011 Data Driven e-Science  
As EUAsiaGrid comes to a close in 2010, a key question, how to transition from Grids to a grid/cloud hybrid world. Finally, the issue of af-S.C. Lin and E.  ...  For example, South Korea's KISTI now leads development of AMGA, an official EGEE gLite middleware component for a metadata catalogue service on the grid.  ...  includes cloud computing; both public and private cloud. 5. enables internationally recognized, federated and trusted security framework for Grid resource sharing among government agencies including private  ... 
doi:10.1007/978-1-4419-8014-4_1 fatcat:r426skzf5jbddeuvp6q3yfm3z4

A blind processing framework to facilitate openness in smart grid communications

Mehmet Hadi Gunes, Murat Yuksel, Hayreddin Ceker
2015 Computer Networks  
In this paper, we propose secure communication and computation services for smart grid to transform the current "closed cyber architecture" to an "open cyber architecture".  ...  In order to ensure the privacy and integrity of communicating parties at the distribution level, we propose to utilize the smart meters as a gateway between intra-network (i.e., HAN) and inter-network  ...  After a contract agreement between a smart meter and a service provider is established, both entities will exchange certificates to ensure identity and legitimacy of public keys.  ... 
doi:10.1016/j.comnet.2015.05.004 fatcat:fat5bqm5m5dqpjj56at6e6jvum
« Previous Showing results 1 — 15 out of 70 results