Showing 21 - 40 results of 691 for search '"cloud computing"', query time: 0.07s Refine Results
  1. 21

    Network Security Threats and Countermeasures on Cloud Computing by Ping Yao, Hong Li

    Published 2013-08-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  2. 22
  3. 23

    Risks and Crises for Healthcare Providers: The Impact of Cloud Computing by Ronald Glasberg, Michael Hartmann, Michael Draheim, Gerrit Tamm, Franz Hessel

    Published 2014-01-01
    “…We analyze risks and crises for healthcare providers and discuss the impact of cloud computing in such scenarios. The analysis is conducted in a holistic way, taking into account organizational and human aspects, clinical, IT-related, and utilities-related risks as well as incorporating the view of the overall risk management.…”
    Get full text
    Article
  4. 24
  5. 25
  6. 26

    Biometric Fusion for Enhanced Authentication in Cloud Computing Environments by Chiyo Miyazawa, Ryosuke Sato

    Published 2024-03-01
    “…In the realm of cloud computing, ensuring robust data security is of utmost importance. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33

    Resource management model based on cloud computing environment by Ahyoung Kim, Junwoo Lee, Mucheol Kim

    Published 2016-11-01
    “…In this article, we propose the dynamic resources management model in a cloud computing environment. For monitoring the certain resource, we should utilize not only a cloud management module but also a network management module. …”
    Get full text
    Article
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  19. 39
  20. 40

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…Cloud computing and Internet of Things (IoT) are emerging technologies that have experienced rapid development in recent years. …”
    Get full text
    Article