Intelligent heart disease prediction system using data mining techniques

S Palaniappan, R Awang - 2008 IEEE/ACS international …, 2008 - ieeexplore.ieee.org
The healthcare industry collects huge amounts of healthcare data which, unfortunately, are
not"; mined"; to discover hidden information for effective decision making. Discovery of …

State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment

MK Srinivasan, K Sarukesi, P Rodrigues… - Proceedings of the …, 2012 - dl.acm.org
Cloud computing has taken center stage in the present business scenario due to its pay-as-
you-use nature, where users need not bother about buying resources like hardware …

Cloud implementation security challenges

M Bamiah, S Brohi, S Chuprat… - … Conference on Cloud …, 2012 - ieeexplore.ieee.org
Cloud computing offers significant features such as resource pooling, scalability, on-demand
self service, availability, and reliability to organizations to improve their quality of services …

ecloudids tier-1 ux-engine subsystem design and implementation using self-organizing map (som) for secure cloud computing environment

MK Srinivasan, K Sarukesi, A Keshava… - Recent Trends in …, 2012 - Springer
Cloud computing is becoming more influential as a technical-cum-business model in the
present scenario of enterprise business computing. It attracts the customers with its glossy …

State-of-the-art big data security taxonomies

MK Srinivasan, P Revathy - Proceedings of the 11th Innovations in …, 2018 - dl.acm.org
Today's businesses accumulate an astonishing amount of digital data, which can be
leveraged to unlock new sources of economic value and provide fresh insights into business …

eCloudIDS–Design Roadmap for the Architecture of Next-generation Hybrid Two-tier Expert Engine-based IDS for Cloud Computing Environment

MK Srinivasan, K Sarukesi, A Keshava… - Recent Trends in …, 2012 - Springer
Cloud computing is a new hype and a buzz word in today's business computing world due to
its pay-as-you-use model. Organizations are at the edge of a computing revolution which …

Practitioner's guide for building effective complex enterprise architecture in digital transformation: An experience-based industry best practices summary

S Vobugari, MK Srinivasan… - 2017 3rd International …, 2017 - ieeexplore.ieee.org
Enterprise software architectures have profound influence on present day digital
transformations in any complex software systems building and overall performance …

ECloudIDS tier-1 icloudidm layer-i (icloudidm-li) subsystem design and implementation through user-centric identity management approach for secure cloud …

MK Srinivasan, K Sarukesi… - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
Cloud computing making ubiquitous influence in today's ever growing and on-demand IT
world. Cloud delivers the next-generation computing paradigm that showcases the …

Architectural design for iCloudIDM Layer-II (iCloudIDM-LII) Subsystem of eCloudIDS generic security framework

MK Srinivasan, K Sarukesi… - … Conference on Advances …, 2013 - ieeexplore.ieee.org
Cloud computing is becoming a key driver in supporting all on-demand needs of corporate
IT today. Cloud promises extensive mechanisms for apt resource sharing, maximum …

[PDF][PDF] IAM Performance Measurement: The Virtuous Circle of Capability Maturity

S Hutchison - researchgate.net
Identity and Access Management (IAM) designates the organizational and technological
system that organizations set up to manage digital identities throughout their life cycle and …