The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Exploratory evaluation is an effective way to analyze and improve the security of information system. The information system structure model for security protection capability is set up in view of the exploratory evaluation requirements of security protection capability, and the requirements of agility, traceability and interpretation for exploratory evaluation are obtained by analyzing the relationship...
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility perks up the advanced facilities to the existing assets. The...
The emerging and developing technology of cloud computing may be defined as an availability of scalable and easily accessible virtualised resources allowing the various paradigms. Cloud computing thus helps to reduce cost of ownership and management of virtualized resources, lowering the market entry threshold to new players and enabling provisioning of new services. Nevertheless, it is not massively...
The paper focuses on Cloud Computing, which is emerged as an important technology for e-commerce industries. The authors, firstly, outline what cloud computing is, the state of the art of cloud research in e-commerce, and various existing cloud based e-commerce model; secondly, propose a conceptual cloud-based e-commerce model for developing e-commerce applications in Bangladesh. The proposed cloud-based...
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
Excellence in IT is both a driver and a key enabler of the digital transformation. The digital transformation changes the way we live, work, learn, communicate, and collaborate. The Internet of Things (IoT) fundamentally influences today's digital strategies with disruptive business operating models and fast changing markets. New business information systems are integrating emerging Internet of Things...
This paper deals with the future development of cloud computing. A detailed SWOT Analysis examines the most important factors to be considered for the future of cloud computing. Based on the outcomes, the real value of cloud computing is discussed, followed by the challenges for the future development of cloud computing. Those points finally lead to a statement regarding whether cloud computing represents...
This paper analyses the security of the ICT model based on Cloud Computing (CC) in SMEs in Tanzania and Poland. Small and medium enterprise are very significant in the economy of any country. With the fast growth of technology, SMEs significance in all countries have even become more important. Through the rapid spread of Information and Communication Technologies (ICT) and ever decreasing prices...
Cloud computing in the past few years has grown from a promising business idea to one of the fastest growing field of the IT industry. Still the IT organization is concern about critical issues (like security, data loss) existing with the implementation of cloud computing, related to security in particular. Consequently issues arise due to client switching to cloud computing. This paper briefs about...
Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want...
Nowadays, due to growth and diversity of possessions (e.g. computers, mobile phones, smart cars, etc.), cloud computing has become popular among people. Users access cloud for different reasons such as searching for information, downloading specific files, and executing remote applications. This designated technology takes advantage of a clustered environment and multi-pathway of communication. This...
The cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management...
The first workshop on compliance, evolution, and security in cross-organizational processes (CeSCoP 2014) is held in conjunction with the 18th IEEE International Enterprise Computing Conference (EDOC 2014), in Ulm, Germany. The workshop purpose is to offer a portal for researchers and practitioners to discuss and contribute research on cross-organizational processes. The CeSCoP 2014 program includes...
High Performance Computing (HPC) techniques are essential in complex systems such as Socio-Technical Systems (STSs), where humans and organizations are elements of the same system along with technical infrastructures and hardware/software components. For example, several HPC approaches have been successfully applied to support and facilitate distribution or aggregation of computation power among independent...
Cloud based applications demand a higher level of security, privacy, and reliability toward a more cost effective solution. One of the challenges for the users of cloud-based services and applications is finding the most trusted provider for the minimum cost. The trusted providers from each customer can have different interpretation, or with different priority of the meaning. Furthermore, a tier-1...
Advances in computer technologies facilitate the implementation of inter-organizational business processes. At the same time, managing the security of these processes is increasingly difficult. Compliance with high level specifcations, like normatives and pre-agreed protocols, rules and requirements, is difficult to validate. Here we discuss how Conformance Checking, a specific area of Process Mining,...
In this paper, we have proposed a framework for cloud data security which is capable of securing users' data, such that malicious user is detected quickly. The domain remains unaffected in worst case scenario. In this method, we have introduced a new constant value for classification that can automatically be redirected to access the requests for the corresponding cluster. Each service type has its...
Cloud computing moves the application software, platform and infrastructure into the large data centers which are maintained at the centralized location. The Cloud Service User (CSU) requests the resources from the cloud for their current requirements without investing the money. It is a pay-as-you-go-basis which means that the CSU pay what they actually consumed. If the Cloud Service Provider (CSP)...
In this paper we propose a new approach for managing capability within organisations that are engaged in identity-attribution or identity-enrichment exercises. Specifically, we believe that a modelling framework which uses a bottom-up data-driven approach encapsulates the most appropriate abstraction of capability. In particular, that this should be agnostic (but aware) of the type of capability provider...
Cloud computing making ubiquitous influence in today's ever growing and on-demand IT world. Cloud delivers the next-generation computing paradigm that showcases the possibilities of apt resource sharing, true elasticity, and maximum resource utilization as compared to any of its early competitors. In addition to its technicality, corporates are also fascinated with its attractive tag of 'pay-as-you-use'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.