The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a web...
Cloud computing has emerged as an increasingly popular means of delivering IT-enabled business services and a potential technology resource choice for many private and government organizations in today's rapidly changing computing environment. Consequently, as cloud computing technology, functionality and usability expands unique security vulnerabilities and treats requiring timely attention arise...
VDrive works on the baseline model of Storage-as-a-Service (SaaS), with an infrastructure built on volunteer computing. The project gives a model for storing user data as decentralized packets on nodes on the network. The model proposes a solution with redundant data to provide an efficient model, with maximum availability.
We introduce a computational model for networks that is suitable for supporting the administrative staff in estimating the threat that is caused by security relevant events, for identifying possible root causes for these events and for making predictions about the impact of attacks or countermeasures against attacks. We refer to expertise from the network management domain and extend the common methodologies...
In cloud computing environment, security becomes a more and more critical issue as users are sharing computing resources remotely. It is important to analyse the potential security challenges and risks clouds may face. In this paper, a number of security challenges, concerns and issues are discussed, including three major aspects of security, namely confidentiality, integrity and availability.
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud"...
The aim of autonomic computing is to realize self - management of complex IT systems, which makes systems own the ability of self-configuration, self-recovering, self-optimizing and self-protecting. The aim of cloud computing is to realize the use of resources on demand in distributed environment. But the problem of how to build an autonomic computing model for cloud computing environment has not...
Security of cloud computing is one of the challenges to be addressed before the novel pas-as-you-go business model is widely applied, and dependability is one of the most important means to improve security of current heterogeneous cloud platforms. Previous research on dependability in computing systems only uses qualitative approaches and there are few systematic works on dependability in cloud systems...
Any system during its lifecycle could be subject to internal or external accidental or malicious threats. Therefore attention to system security is very important nowadays. Security brings in concerns for availability, in addition to confidentiality and integrity. Many security assessment methodologies like ITSEC, CC and etc were used up to now, but most of them have some limitations for being used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.