The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the introduction of various hardware/software technologies such as Cloud Technologies or Virtualization technologies, there has been a great potential to reuse ICT resources. These technologies also provide various advantages including resource consumption reduction (in the use phase only or in the whole life cycle). In addition, there are additional potentials regarding the resource opacity...
Cloud computing has recently become popular information technologies in enterprises. More and more enterprises tend to move from traditional enterprise information systems (EIS) to private EIS. However, few studies have addressed the switching issues, especially in large enterprises. The purpose of this study is to investigate switching intentions from traditional EIS to private cloud EIS for large...
Certification has been proved as an essential mechanism for achieving different security properties in new systems. However, it has important advantages; among which we highlighted the increasing in users trust by means of attesting security properties, but it is important to consider that in most of cases the system that is subject of certification is considered to be monolithic, and this feature...
By nature, cloud computing systems are static, homogenous entities. They consist of multiple layers of hardware and software resources. These resources are organized into stacks which provide services to end users. Many service stacks are built from a single template. As a result, they consist of identical resources with identical configurations. This gives potential attackers the asymmetric advantage...
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things. Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit logs to demonstrate policy adherence and contractual/regulatory...
Enterprises use design best practices to build applications that leverage the linear scalability of the cloud. These include methods like data sharding, application sharding, denormalized data stores, thin binary images etc. The design practices itself involve reengineering an application to the cloud. Enterprises view reengineering activities as a business risk and a costly affair. As Service oriented...
Cloud computing has been a topic of keen interest in recent years, having been referred to as "the emerging paradigm for the last five years", "the most promising computational platform" and "the prevailing technique for next ten years". There has been a lot of discussion as to what new opportunities it can bring to markets, what benefits it can offer, and what system...
With the emergence of high-performance computing instances in the cloud, massive scale computations have become available to technically every organization. Digital libraries typically employ a data-intensive infrastructure, but given the resources, advanced services based on data and text mining could be developed. A fundamental issue is the ease of development and integration of such services. We...
The virtualization technology has been developed rapidly with the growth of the hardware supported virtualization technologies and the appearance of the various services. Many researchers are concentrating on developing the virtualization technologies which are recognized as the most significant core technology of the IT applications such as green IT and cloud computing. The major processor companies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.