Search
Now showing items 41-47 of 47
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
A machine learning-based optimization approach for pre-copy live virtual machine migration
(
Springer
, 2023 , Article)
Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ...