DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds
J Povedano-Molina, JM Lopez-Vega… - Future Generation …, 2013 - Elsevier
One of the most important features in Cloud environments is to know the status and the
availability of the physical resources and services present in the current infrastructure. A full …
availability of the physical resources and services present in the current infrastructure. A full …
Leveraging cloud computing for the semantic web: review and trends
Semantic and cloud computing technologies have become vital elements for developing
and deploying solutions across diverse fields in computing. While they are independent of …
and deploying solutions across diverse fields in computing. While they are independent of …
Semantic web technologies in cloud computing: a systematic literature review
During the last years we have seen a dramatic increase of new Cloud providers,
applications, services, management platforms, data, etc. reaching a level of complexity that …
applications, services, management platforms, data, etc. reaching a level of complexity that …
Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
P Kumar, A Kumar Bhatt - IET Communications, 2020 - Wiley Online Library
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
Semantic-aware security orchestration in SDN/NFV-enabled IoT systems
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-
Defined Networking (SDN) technologies, thereby strengthening their overall flexibility …
Defined Networking (SDN) technologies, thereby strengthening their overall flexibility …
Multi-tenant attribute-based access control for cloud infrastructure services
Cloud Computing is developed as a new wave of ICT technologies, offering a common
approach to on-demand provisioning of computation, storage and network resources that …
approach to on-demand provisioning of computation, storage and network resources that …
Cloud identity management: A survey on privacy strategies
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
DYVERSE: dynamic vertical scaling in multi-tenant edge environments
Multi-tenancy in resource-constrained environments is a key challenge in Edge computing.
In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge'environments …
In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge'environments …
[PDF][PDF] Applications of access control as a service for software security
P Dašić, J Dašić, B Crvenković - International Journal of Industrial …, 2016 - researchgate.net
Cloud technology has been around for some time now and is gaining increased influence in
almost every aspect of information technology services. As a consequence of above stated …
almost every aspect of information technology services. As a consequence of above stated …
A reference architecture for provisioning of tools as a service: meta-model, ontologies and design elements
Software Architecture (SA) plays a critical role in designing, developing and evolving cloud-
based platforms that can be used to provision different types of services for consumers on …
based platforms that can be used to provision different types of services for consumers on …