[HTML][HTML] Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review
Abstract The evolution of Cloud Computing into a service utility, along with the pervasive
adoption of the IoT paradigm, has promoted a significant growth in the need of …
adoption of the IoT paradigm, has promoted a significant growth in the need of …
Security by design for big data frameworks over cloud computing
FM Awaysheh, MN Aladwan, M Alazab… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud deployment architectures have become a preferable computation model of Big Data
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
(BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a …
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …
widely used, especially for the development of cloud services and applications. They …
Toward the automation of threat modeling and risk assessment in IoT systems
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …
[HTML][HTML] Vulnerability to cyberattacks and sociotechnical solutions for health care systems: systematic review
P Ewoh, T Vartiainen - Journal of medical internet research, 2024 - jmir.org
Background Health care organizations worldwide are faced with an increasing number of
cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …
cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …
Cloud computing: developing contemporary computer science curriculum for a cloud-first future
Cloud Computing adoption has seen significant growth over the last five years. It offers a
diverse range of scalable and redundant service deployment models, including …
diverse range of scalable and redundant service deployment models, including …
Security-aware deployment optimization of cloud–edge systems in industrial iot
Cloud computing, edge computing, and the Internet of Things are significantly changing from
the original architectural models with pure provisioning of virtual resources (and services) to …
the original architectural models with pure provisioning of virtual resources (and services) to …
Lightweight cloud application sandboxing
Modern cloud applications can quickly grow to an elaborate and intricate tangle of services.
In this scenario, paying attention to security aspects is important to mitigate the impact of …
In this scenario, paying attention to security aspects is important to mitigate the impact of …
Systemic risk and vulnerability analysis of multi-cloud environments
M Reece, TE Lander Jr, M Stoffolano… - arXiv preprint arXiv …, 2023 - arxiv.org
With the increasing use of multi-cloud environments, security professionals face challenges
in configuration, management, and integration due to uneven security capabilities and …
in configuration, management, and integration due to uneven security capabilities and …
Scalable optimal deployment in the cloud of component-based applications using optimization modulo theory, mathematical programming and symmetry breaking
Automated deployment of component-based applications in the Cloud consists in the
allocation of virtual machines (VMs) offers from various Cloud Providers such that the …
allocation of virtual machines (VMs) offers from various Cloud Providers such that the …