بحث بسيط
السجلات المعروضة 701 -- 710 من 752
An integrated development environment for the creation and delivery of m-Learning objects
(
IEEE Computer Society
, 2014 , Conference Paper)
We live in a new era where education is not anymore restricted to grouping individuals in a room and feeding them information. We also live in the same era where we deal with our handheld devices more than any other normal ...
Multi-cloud distribution of virtual functions and dynamic service deployment: OpenADN perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Network Function Virtualization (NFV) and Service Chaining (SC) are novel service deployment approaches in the contemporary cloud environments for increased flexibility and cost efficiency to the Application Service Providers ...
Identifying contextual properties of software architecture in cloud computing
(
IEEE
, 2011 , Conference Paper)
This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
Compliance checking for usage-constrained credentials in trust negotiation systems
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
Traceability for adaptive information security in the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
Profile-based security assurances for service software
(
Springer Verlag
, 2011 , Conference Paper)
In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...