Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 1

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  ROTA
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available remote Four Dimensional Security and Vulnerability Matrix for Cloud (4-SVM)
EN
Cloud computing is a catchphrase for today's ICT world. The emerging trend of ``Everything as a service'' has made this rapid growing technology a very admired and highly demanding technology for a must adapted one. With the virtues of 24x7 service availability, multi tenancy, utility, speed, high productivity, agility, scalability of this technology, it has been proved as an emerging trend for the ICT industry as well as the academia. Today the rapid data analytics is changing the way companies try to win, and hence enabling them to generate instantaneous insights for supporting their most important business processes.In present technological era, cloud combining with IOT or Big Data, or highly popular commercial ERP solutions, namely SAP cloud, has touched the height of technological growth but one of the major reasons for the trepidation of its widespread adaptability is the security and authentication breach in cloud technology. Being used in highly commercial solutions, the security issues play a major role.Threat or vulnerability is more important to qualify rather than being quantified only. This paper is a proposal showing a quantifiable approach, focuses on several threats and security breaches and countermeasures their impact concentrating on a cloud based solutions, with the philosophy of the inevitability of testing on cloud security References
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.