The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi authorities' implementation of cloud computing. Although...
Cloud computing has recently become popular information technologies in enterprises. More and more enterprises tend to move from traditional enterprise information systems (EIS) to private EIS. However, few studies have addressed the switching issues, especially in large enterprises. The purpose of this study is to investigate switching intentions from traditional EIS to private cloud EIS for large...
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing...
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the...
More and more people prefer to obtain information from cloud. Different users tend to access different resources they interested at anytime across different networks by a variety of equipments. As same as the traditional management of file, the lifecycle theory is still suitable the electronic data in cloud computing. Firstly, we analyze the motivation of access control in cloud, and summarize the...
The paper explores the issues and challenges for Trust and Reputation arising from Cloud Computing, Cyber Physical Systems and Social Media. It develops the Semantics of Trust and Reputation Systems and the use of Big Data Predictive Analytics for Trust and Reputation Prediction.
Cloud computing is a model delivery of infrastructure, platform and software services over the net. The lack of standardization of heterogeneous Cloud service descriptions makes service discovery and selection very complex tasks for Cloud users. To ease this complexity, it is crucial to describe the various Cloud service pertinent information in a homogeneous model. To provide for such model, this...
Certification has been proved as an essential mechanism for achieving different security properties in new systems. However, it has important advantages; among which we highlighted the increasing in users trust by means of attesting security properties, but it is important to consider that in most of cases the system that is subject of certification is considered to be monolithic, and this feature...
Trust is the cornerstone of success in any relationship between two or more parties. Current technologies to include cloud computing, social networking, and mobile applications, coupled with the explosion in storage and processing power, are evolving large-scale marketplaces for a wide variety of resources and services. In such marketplaces, users (consumer, provider and broker) are largely autonomous...
The concept of the cloud is no longer limited to providing remote hardware or platform support with the development of cloud computing technology. Instead, it encapsulates all aspects of the content in computer field into service invoked by others. As an important part of software, data resource has become core services to the cloud platform in areas such as collaborative manufacturing and collaborative...
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly...
For the matching relation between the logistics cloud service and logistics task in cloud logistics systems, the description method of logistics cloud service based on context was proposed. Firstly, build the concept model of logistics cloud service, then designed cloud logistics domain context ontology and analyzed the description of logistics cloud service by introducing the definition of context,...
Big Data is one of the key enabling technologies in smart manufacturing, where manufacturing companies aim at leveraging the data generated throughout their processes. The potential of Big Data Analytics is particularly significant in the context of manufacturing companies distributed worldwide. These companies own several manufacturing plants operating the same process in different environments and...
We are on a new era of interaction between persons, physical spaces. Users want that those spaces smartly adapt to their preferences in a transparent way. This paper describes the process of planning, reasoning, modeling of a Smart Environment with domestic, industrial application, taking advantage of emerging wearable devices on the market (smart watches, fitness trackers, etc.), newer wireless communication...
Metadata enables organizations or individuals to create and associated data that can help to define richer details about the world and events around it. For the cloud environment, metadata demands identification of associative capacity of information. At the same time, the system should be flexible, scalable and capable of supporting efficient searching mechanism over disparate information generated...
With advances of cloud computing, seamless video streaming from video server to cloud client has been one of technical challenges for multimedia cloud applications. Especially in case that Desktop-as-a-Service (DaaS) as a major cloud application is deployed via wireless networks, it could raise a new set of issues to be addressed. To solve the problem, we propose a Cloud-based Context-aware HTTP Adaptive...
Interaction and communication between IoT devices are a new service trend in Internet of Things (IoT). With the connectivity and resources of an IoT device/ service, various scenarios can be provided to build interaction between IoT devices. To make those interactions more effective and efficient, an effective device interaction service for IoT is proposed. The proposed service uses temporal relationship...
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the...
With the emergence of Docker, it becomes easier to encapsulate applications and their dependencies into lightweight Linux containers and make them available to the world by deploying them in the cloud. Compared to hypervisor-based virtualization approaches, the use of containers provides faster start-ups times and reduces the consumption of computer resources. However, Docker lacks of deployability...
Cloud computing is now extremely popular because of its use of elastic resources to provide optimized, cost-effective and on-demand services. However, clouds may be subject to challenges arising from cyber attacks including DoS and malware, as well as from sheer complexity problems that manifest themselves as anomalies. Anomaly detection techniques are used increasingly to improve the resilience of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.