منابع مشابه
Securing Cloud Environment
Cloud Computing has rapidly emerged as a new computing paradigm that arrays massive numbers of computers in centralized and distributed data centers to deliver web-based applications, application platforms, and services via a utility model. Cloud computing technologies include grid computing, utility computing and virtualization. It is very much essential to make computations of the virtual mac...
متن کاملSecuring PDAs in the Healthcare Environment
Wireless networks have become a key element in healthcare institutions for streamlining access to clinical information. With the advent of wireless technology, handheld devices such as PDAs, pagers and Pocket PCs are now being deployed into modern hospital systems. However, putting confidential data on the airwaves using wireless technology introduces significant risk and adds a new level of th...
متن کاملAn Introduction To Securing a Cloud Environment
While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud, the potential for personal and private data to be compromised will increase. Confidentiality, availability and integrity of data are at risk if appropriate measures are not put in place prior to s...
متن کاملSecuring Information in Peer-to-Peer Environment
As an emerging model of communication and computation, Peer-to-Peer(P2P) networking has recently gained significant acceptance in today’s internet computing, Suffers from the problem of securing information while transferring from one peer to other peer. In existing direct path was established between source and destination peer to secure the data. We analyzed the problem of security and constr...
متن کاملAn Introduction To Securing a Cloud Environment
While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud, the potential for personal and private data to be compromised will increase. Confidentiality, availability and integrity of data are at risk if appropriate measures are not put in place prior to s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Spectra
سال: 2012
ISSN: 2162-8793
DOI: 10.21061/spectra.v2i1.285