The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtual machines. However this model has significant drawbacks that it relies on the trusted third party...
A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It...
Security concerns with respect to cloud computing have impelled the private sector to suggest a hybrid cloud architecture consisting of private and public clouds. For national security purposes, we advocate a hybrid cloud model that consists of private, public and community clouds. The community clouds in this architecture are as defined by NIST, and will be used for inter-agency and community-of-interest...
One of the network and services management problems is security, either in preventing attacks and using computational mechanisms to protect data and systems or in administrative matters, which involves not just what needs to be protected, but also what security service levels will be delivered. This paper explores Service Level Agreements for Security or just Sec-SLAs. Is tried to provide an overview...
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of these data by every authorized stakeholder is one of the mandatory features of data center. At the same time, it has many challenges like the cost, management and updating it and also encounters...
Cloud computing has recently paid attention as a way to share the resources to provide scalable and on-demand services. Across various authorities, cloud resources should be configured to a virtual organization (VO) according to user's requirements. Ontology-based representation of cloud computing environment would be able to conceptualize common attributes among cloud resources and to represent semantic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.