The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of benefits originate from the implementation of cloud computing. Cloud computing has been extensively implemented in organizations like companies and universities. However, in Indonesia cloud computing is not widely approved by universities yet. This condition can be caused by lack of trust of the universities in the risk of cloud computing implementation. This paper is intended to analyze...
In order to support large volume of transactions and number of users, as estimated by the load demand modeling, a system needs to scale in order to continue to satisfy required quality attributes. In particular, for systems exposed to the Internet, scaling up may increase the attack surface susceptible to malicious intrusions. The new proactive approach based on the concept of Moving Target Defense...
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local servers to cloud servers for scalable and durable resources on pay per use basis. Considering enormous users and large amount of documents at cloud servers, there is a requirement of an access control scheme, which supports fine-grained cum flexible access control along with "Query-Response"...
Penetration Testing is a security research and study of exploitation methods with counter measures to protect web applications from attacks and intruders. It is the art of exploiting the weakness that has been identified in the system under test. Identifying the insecure areas is the major task; the goal is to protect sensitive and the valuable data. All the safety vulnerabilities which are present...
The deployment of applications able to consume cloud infrastructure services is currently a tedious process especially when it should be often repeated in the application developing phase. We present a technical solution that simplifies the deployment process, as being almost fully automated. Its integration as a module of an open-source platform for enforcing security controls by its users is further...
SlapOS is the first open source operating system for Distributed Cloud Computing. SlapOS is based on a grid computing daemon — called slapgrid — which is capable of installing any software on a PC and instantiate any number of processes of potentially infinite duration of any installed software. Slapgrid daemon receives requests from a central scheduler — the SlapOS Master — which collects back accounting...
This position paper focuses on deriving some of the challenges for trust establishment in Cloud Computing. We start by providing a conceptual model of Cloud infrastructure, and then discuss the dynamic nature of Cloud based on the provided model. We identify that the dynamic nature of a Cloud infrastructure is essential for its desirable properties (e.g. elasticity, resilience, availability, and reliability),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.