198   Artículos

« Anterior     Página: 1 de 10     Siguiente »

 
en línea
Yunusa Simpa Abdulsalam and Mustapha Hedabou    
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ashraf Hamdan Aljammal,Hani Bani-Salameh,Ayoub Alsarhan,Mohammad Kharabsheh,Mamoon Obiedat     Pág. pp. 55 - 65
Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new techniqu... ver más

 
en línea
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon    
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dimitra Georgiou and Costas Lambrinoudakis    
Currently, there are several challenges that cloud-based healthcare systems around the world are facing. The most important issue is to ensure security and privacy, or in other words, to ensure the confidentiality, integrity, and availability of the data... ver más
Revista: Information    Formato: Electrónico

 
en línea
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusinska    
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha    
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Tanweer Alam,Mohamed Benaida     Pág. pp. 74 - 84
The internet of smart devices is a network of intelligent gadgets with sensors, programs, Wi-Fi and communication network connections. These devices store the data in cloud and process data outside the device using the proposed Cloud-Internet communicati... ver más

 
en línea
Moses Moyo and Marianne Loock    
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 S... ver más
Revista: Information    Formato: Electrónico

 
en línea
Gregorius Airlangga and Alan Liu    
Revista: Drones    Formato: Electrónico

 
en línea
Rajasekhar Chaganti, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu and Vinayakumar Ravi    
The Internet of Things (IoT) has rapidly progressed in recent years and immensely influenced many industries in how they operate. Consequently, IoT technology has improved productivity in many sectors, and smart farming has also hugely benefited from the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai    
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Andrei Brazhuk     Pág. 36 - 41
This work considers challenges, related to the lack of methods of automatic threat modeling and well-formed data sources of threats and countermeasures as well as techniques to collect such security knowledge. Cloud computing domain has&nb... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Sakshi Chhabra,Ashutosh Kumar Singh     Pág. 296 - 307
Cloud Computing has achieved long dreamed vision of developments in IT industry such as remote storage services or privacy solutions. It is a data storage model in which data is preserved, controlled and presented over the network users. However, cloud s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone and Manuel Mazzara    
The Internet of Things (IoT) is rapidly changing our society to a world where every ?thing? is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, wh... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Saleh Altowaijri, Mohamed Ayari and Yamen El Touati    
-
Revista: Journal of Sensor and Actuator Networks    Formato: Electrónico

 
en línea
Ishu Gupta,Niharika Singh,Ashutosh Kumar Singh     Pág. 173 - 185
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner. In order to minimize the overhead at cloud service provider of applying security over each document and then send it to t... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Olusola Akinrolabu, Steve New and Andrew Martin    
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information technology (IT) risks, research shows that it introduces a new set of ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Osman Ghazali,Chun Yang Leow,Shahzad Qaiser,Nanthini Pattabiraman,Sathiyaroobaa Vasuthevan,Eman Mohamed Abdusalam,Mustafa M. Barakat     Pág. pp. 96 - 116
Customer disposition to data, nature of the information on site, protection concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-comme... ver más

 
en línea
Boubakeur Annane,Osman Ghazali     Pág. pp. 20 - 32
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing i... ver más

 
en línea
Qiuyan Liu, Mingwu Wang, Xiao Wang, Fengqiang Shen and Juliang Jin    
The evaluation of land eco-security is challenging because it is involved with various uncertainty factors. Although the normal cloud model provides an idea for dealing with the randomness and fuzziness of indicators for the evaluation of land eco-securi... ver más
Revista: Sustainability    Formato: Electrónico

« Anterior     Página: 1 de 10     Siguiente »