Cloud computing
A Sunyaev, A Sunyaev - … computing: Principles of distributed systems and …, 2020 - Springer
Cloud computing is an evolution of information technology and a dominant business model
for delivering IT resources. With cloud computing, individuals and organizations can gain on …
for delivering IT resources. With cloud computing, individuals and organizations can gain on …
Trust is good, control is better: Creating secure clouds by continuous auditing
Cloud service certifications (CSC) attempt to assure a high level of security and compliance.
However, considering that cloud services are part of an ever-changing environment, multi …
However, considering that cloud services are part of an ever-changing environment, multi …
Designing monitoring systems for continuous certification of cloud services: Deriving meta-requirements and design guidelines
Continuous service certification (CSC) involves the consistently gathering and assessing
certification-relevant information about cloud service operations to validate whether they …
certification-relevant information about cloud service operations to validate whether they …
[图书][B] Cloud as a service: Understanding the service innovation ecosystem
E Castro-Leon, R Harmon - 2016 - books.google.com
See how the principles of Service Science govern the dynamics driving the adoption of
cloud computing in the industry. Cloud as Service shows you how the evolution of enterprise …
cloud computing in the industry. Cloud as Service shows you how the evolution of enterprise …
Towards continuous security certification of software-as-a-service applications using web application testing techniques
P Stephanow, K Khajehmoogahi - 2017 IEEE 31st International …, 2017 - ieeexplore.ieee.org
Continuous security certification of software-asa-service (SaaS) aims at continuously, ie
repeatedly and automatically validating whether a SaaS application adheres to a set of …
repeatedly and automatically validating whether a SaaS application adheres to a set of …
Third-party auditing for cloud service providers in multicloud environment
T Indhumathil, N Aarthy, VD Devi… - 2017 Third …, 2017 - ieeexplore.ieee.org
Cloud Computing provides organizations enabling ubiquitous, on-demand access to a
shared pool of configurable computing with limited management effort. However …
shared pool of configurable computing with limited management effort. However …
Cloud Computing.: Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor Innentäter-Angriffen de lege lata und de lege ferenda.
D Müller - 2020 - torrossa.com
Cloud Computing. Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …
[PDF][PDF] A Transparent Certification Scheme Based on Blockchain for Service-Based Systems
N Bena, M Pedrinazzi, M Anisetti… - … Conference on Web …, 2024 - perso.liris.cnrs.fr
Modern service-based systems are characterized by applications composed of
heterogeneous services provided by multiple, untrusted providers, and deployed along the …
heterogeneous services provided by multiple, untrusted providers, and deployed along the …
Continuous test-based certification of cloud services
P Stephanow-Gierach - 2018 - mediatum.ub.tum.de
This thesis introduces a framework to design and represent minimally invasive tests to
support continuous certification of cloud services. Five example scenarios are presented to …
support continuous certification of cloud services. Five example scenarios are presented to …
Human and Organizational Threat Profiling Using Machine Learning
P Kumara, KGS Dananjaya… - … on Advancements in …, 2021 - ieeexplore.ieee.org
The usage of online social networking sites is increasing rapidly. But the downside is that
the growth of various kinds of ongoing social media threats such as fake profiles …
the growth of various kinds of ongoing social media threats such as fake profiles …