An effective security measures for nuclear power plant using big data analysis approach

S Lee, JH Huh - The Journal of Supercomputing, 2019 - Springer
Among the many hacking attempts carried out against information systems for the past few
years, cyber-attacks that could lead to a national-level threat included attacks against …

[PDF][PDF] Trust as an integral part for success of cloud computing

F Meixner, R Buettner - 2012 - prof-buettner.de
Cloud computing has become a hot topic in research in the enterprise and consumer sector.
It is clear to everyone that the opportunities and applications of cloud computing are …

Non-deterministic security driven meta scheduler for distributed cloud organizations

A Jakóbik, D Grzonka, F Palmieri - Simulation Modelling Practice and …, 2017 - Elsevier
Security is a very complex and challenging problem in Cloud organizations. Ensuring the
security of operations within the cloud by also enforcing the users' own security …

Big data security

A Jakóbik - Resource Management for Big Data Platforms …, 2016 - Springer
The chapter presents wide variety of topics concerning security in Big Data systems. Security
from end user side, data owner, and data uploader point of view is considered. Selected …

Hybrid ant particle swarm genetic algorithm (APSGA) for task scheduling in cloud computing

Arzoo, A Kumar - … Technology for Competitive Strategies (ICTCS 2021) …, 2022 - Springer
In cloud computing technology, task scheduling is one of the research challenges. For these
various algorithms, works such as particle swarm optimization (PSO), firefly algorithm, ant …

Evaluation index system of cloud service and the purchase decision-making process based on AHP

G Nie, Q She, D Chen - Proceedings of the 2011 International Conference …, 2011 - Springer
Aiming at the problems existing in the current study on cloud service purchase decision,
especially the evaluation index system is inadequate, as well as the quantification of …

Security infrastructure for on-demand provisioned cloud infrastructure services

Y Demchenko, C Ngo, C de Laat… - 2011 IEEE Third …, 2011 - ieeexplore.ieee.org
Providing consistent security services in on-demand provisioned Cloud infrastructure
services is of primary importance due to multi-tenant and potentially multi-provider nature of …

[HTML][HTML] The design of a redundant array of independent net-storages for improved confidentiality in cloud computing

MG Jaatun, G Zhao, AV Vasilakos, ÅA Nyre… - Journal of Cloud …, 2012 - Springer
Abstract This article describes how a Redundant Array of Independent Net-storages (RAIN)
can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits …

[PDF][PDF] Cloud Computing Security Models, Architectures, Issues and Challenges: A Survey: A Survey

MA Shahid, M Sharif - SmartCR, 2015 - researchgate.net
Cloud computing a new recently emerged environment for the hosting and delivery of IT
services over a network typically includes on-demand, reliable, customized, self service …

Design choices underlying the software as a service (SaaS) business model from the user perspective: Exploring the fourth wave of outsourcing

A Joha, M Janssen - Journal of Universal Computer Science, 18 …, 2012 - repository.tudelft.nl
Software as a Service (SaaS) can be viewed as the fourth wave of outsourcing. SaaS is a
relatively new type of service delivery model in which a service provider delivers its services …