The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As its complexity grows, securing a system is harder than it looks. Even with efficient security mechanisms, their configuration remains a complex task. Indeed, the current practice is the hand-made configuration of these mechanisms to protect systems about which we generally lack information. Cloud computing brings its share of new security concerns but it may also be considered as leverage to overcome...
In this advanced era, thousands of students, apply for the admission test which is a rigorous academic system, build on a foundation of high-quality assessments that have been adopted around countrywide to consent to enter into tertiary education both at private and public universities in Bangladesh. Among them, thousands of students apply to several universities at the same time where they have to...
Current state-of-the-art infrastructure-centric deployment and management of distributed web-scale applications cannot scale and meet the demands of changing workloads and increasing demands on application availability, mobility and security. The DIME network architecture has matured during the last four years to offer an alternative to provide a post-Hyper visor, Hyper-Cloud network of applications...
One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments. According to three directions of trust-oriented research,...
The applications submitted to cloud middle ware have been distributed to the Cloud Service Providers(CSPs) based on the available CSPs in the cloud environment to categorize the service CSP providers with this work we are trying to introduce a concept to find the optimal CSP based on rough set based approach. IaaS provides a large amount of computational capacities to users in a flexible and efficient...
MapReduce has been widely used as a powerful parallel data processing model and is adopted by most cloud providers to built cloud computing framework. However, in open cloud systems, security of computation becomes a great challenge. Moreover, MapReduce data-processing services are long-running, which increase the opportunity that an adversary launches attack to the workers and make them behave maliciously...
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.