D Gritzalis, M Kandias, V Stavrou… - Proc. of the History of …, 2014 - infosec.aueb.gr
Web 2.0 and Social media have widened society's opportunities for communication amusement and networking, while enabling internet users to contribute online content. The …
A Amini, N Jamil - Journal of Physics: Conference Series, 2018 - iopscience.iop.org
Cloud computing is a popular paradigm in information technology and computing as it offers numerous advantages in terms of economical saving and minimal management effort …
Migrating data, applications or services to the cloud exposes a business to a number of new threats and vulnerabilities, which need to be properly assessed. Assessing privacy risk in …
Y Wu, Y Lyu, Y Shi - Tsinghua Science and Technology, 2019 - ieeexplore.ieee.org
With ever greater amounts of data stored in cloud servers, data security and privacy issues have become increasingly important. Public cloud storage providers are semi-trustworthy …
A Faizi, A Padyab, A Naess - Information & Computer Security, 2022 - emerald.com
Purpose This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in …
AS Sendi, M Cheriet - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing has recently emerged compelling paradigm by introducing several characteristics such as on-demand self-service, broad network access, resource pooling …
Cloud migration is a complex decision because of the multiple parameters that contribute for or against it (eg available budget, costs, performance, etc.). One of these parameters is …
Security and privacy concerns represent a significant hindrance to the widespread adoption of cloud computing services. While cloud adoption mitigates some of the existing information …
F Baiardi, F Tonelli - European Journal for Security Research, 2021 - Springer
Digital twins are virtual replicas to simulate the behavior of physical devices before they are built and to support their maintenance. We extend this technology to cybersecurity and …