Establishing User-centric Cloud Service Registries
نویسندگان
چکیده
منابع مشابه
User-Centric Cloud Service Broker
Cloud computing technology has gained enormous attention due to its promising capabilities such as virtualization, elasticity and the pay-per-use paradigm. Theoretically, cloud computing can offer Everything as a Service (XaaS). Selecting suitable cloud services matching the Quality-of-Service (QoS) requirements of the user is one of the prominent problems in the literature. A considerable numb...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملUser centric cloud service model in public sectors: Policy implications of cloud services
This study examines the acceptance of cloud computing services in government agencies by focusing on the key characteristics that affect behavioral intent. The study expanded upon the technology acceptance model by incorporating contextual factors such as availability, access, security, and reliability. The research model was empirically verified by investigating the perception of users working...
متن کاملUser-Centric Smart Services in the Cloud
In this chapter we describe our vision for the next generation of IT services. Services will be automatically discovered, procured and integrated with the service consumer‟s technical environment. This whole process will be determined by the policies defined by the consumer and will be transparent to the consumer. We also define the new applications of Policy Manager, Service Manager, Service P...
متن کاملSelf-service Privacy: User-Centric Privacy for Network-Centric Identity
User privacy has become a hot topic within the identity management arena. However, the field still lacks comprehensive frameworks even though most identity management solutions include built-in privacy features. This study explores how best to set up a single control point for users to manage privacy policies for their personal information, which may be distributed (scattered) across a set of n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Generation Computer Systems
سال: 2018
ISSN: 0167-739X
DOI: 10.1016/j.future.2018.03.010