A comparative study of cloud security ontologies

V Singh, SK Pandey - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
Cloud Security is one of the foremost concerns among related stakeholders. Each concern
brings diverse effects on discrete assets while analyzing the security issues in Cloud …

Logging system for cloud computing forensic environments

A Patrascu, VV Patriciu - Journal of Control Engineering and Applied …, 2014 - ceai.srait.ro
Cloud computing represents a rather new technology and a different paradigm in the field of
distributed computing that involves more and more researchers. We can see in this context …

Information fusion in a cloud-enabled environment

E Blasch, Y Chen, G Chen, D Shen… - High performance cloud …, 2014 - Springer
Recent advances in cloud computing pose interesting capabilities for information fusion
which have similar requirements of big data computations. With a cloud enabled …

Revisiting security ontologies

V Singh, SK Pandey - International Journal of Computer …, 2014 - search.proquest.com
Contemporary exploration of all stages of service models clearly proves the immense
significance of" Security in Cloud Computing", which being as obtuse as it is pertinent …

[PDF][PDF] Semantically enhanced cyber security over clouds: Methodological approach

R Šendelj, I Ognjanović - Proceedings of the International …, 2014 - academia.edu
Cloud computing is achieving increased popularity among both, researchers and
practitioners; while security is one of the major issues which reduces its growth and …

[PDF][PDF] Digital forensics in Cloud computing

A Pătraşcu, VV Patriciu - Advances in Electrical and Computer …, 2014 - researchgate.net
Cloud Computing is a rather new technology which has the goal of efficiently usage of
datacenter resources and offers them to the users on a pay per use model. In this equation …

Mechanism for linking and discovering structured cybersecurity information over networks

T Takahashi, Y Kadobayashi - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
To cope with the increasing amount of cyber threats, cyber security information must be
shared beyond organization borders. Assorted organizations have already started to provide …

[HTML][HTML] 云环境下基于信任的入侵防御研究

汪双兔, 韩坚华, 罗军 - 广东工业大学学报, 2014 - xml-data.org
云计算从提出以来就具备着动态性, 虚拟化和开放性, 频频出现的各种大型的云安全事故使得云
环境中的安全性受到质疑. 为了能够确保云环境的安全, 将入侵防御技术与可信计算的信任理论 …

Fpga-based fast response image analysis for autonomous or semi-autonomous indoor flight

R Ladig, K Shimonomura - … of the IEEE Conference on Computer …, 2014 - cv-foundation.org
Small aerial vehicles, like quadrotor, have a high potential to be helpful tools in first
response scenarios like earthquakes, landslides and fires. But even simple tasks like …

Cloud Sensor Ontology and Linked Data to Support Autonomicity in Cloud Application Platforms

R Dautov, I Paraskakis, M Stannett - … 29–October 1, 2014. Proceedings 5, 2014 - Springer
Cloud application platforms with their numerous deployed applications, platform and third-
party services are becoming increasingly complex, dynamic and data-intensive, and require …