The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite their increasing proliferation and technical variety, existing cloud storage technologies by design lack support for enforcing compliance with regulatory, organizational, or contractual data handling requirements. However, with legislation responding to rising privacy concerns, this becomes a crucial technical capability for cloud storage systems. In this paper, we introduce PRADA, a practical...
Standards are often considered as an alternative form of regulation to legislative rule setting. However, standards also complement legislative acts, supporting their effective implementation and providing precise definitions for sometimes vague legal concepts. As we demonstrate, standards are not mere technical regulations but relate to sensitive political issues. The genesis and contents of ISO/IEC...
Security policies are an established way for specifying security demands. However, stakeholders are hardly capable of specifying complex machine-readable security policies. Therefore, a user-friendly specification method is necessary, such as refineable natural-language security policy templates. This paper describes how a security expert can elicit security demands from various stakeholders and generalize...
In an increasingly integrated global economy the importance as well as the growing availability of Cloud Providers has provided companies, individuals and the Governmental agencies with a variety of benefits such as significant cost reduction. As the role and number of Cloud Providers has increased a novel set of issues has emerged. These novel issues refer to a variety of legal complexities from...
Cloud Computing technologies are gaining increased attention both in academia and practice. Despite of its relevance and potential for more IT flexibility and its beneficial effects on costs, legal uncertainties regarding the data processing especially between large economies still exist on the customer and provider side. Against this background, this contribution aims at providing an overview of...
E-health is becoming more important in today's technological world. Healthcare is increasingly being supported by IT applications such as the emergence of cloud computing. But what are the challenges when using cloud computing in e-health?
This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements. Then, we analyze the cloud security requirements in terms of the fundamental issues, i.e., confidentiality, integrity, availability,...
Business-to-Business (B2B) interactions can be defined in terms of the exchange of documents. Such exchanges must be regulated to comply with obligations including service agreements, contracts and law. It is fundamental to such regulation that participants are held accountable for their actions. This can be achieved through the deployment of support services to produce a verifiable audit trail of...
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.