نتایج جستجو برای: security as a service

تعداد نتایج: 14071652  

Journal: :JSW 2016
Tushar Kanti Saha A. B. M. Shawkat Ali

Nowadays Cloud computing has made a revolutionary change in the concept of computation on the web. It has been able to provide low cost services to its users all over the world. Millions of users are using the service of cloud either by IaaS, PaaS and SaaS. Now the main concern of cloud service providers and users how to preserve security in these low cost services. Throughout this research we ...

Journal: :Security and Communication Networks 2015
Sang-Ho Na Eui-nam Huh

An underlying cloud computing feature, outsourcing of resources, makes the service-level agreement (SLA) a critical factor for quality of service (QoS), and many researchers have addressed the question of how an SLA can be evaluated. Lately, security SLAs have also received much attention to guarantee security in a user perspective and provide optimal and efficient security service in the secur...

2011
Ramaswamy Chandramouli

With the increasing maturity of various cloud service delivery models ( Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profile of each cloud service configuration is coming into focus. In this paper, we take up the example of a Public Infrastructure as a Service (Iaas) ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده ادبیات و علوم انسانی 1393

this study investigates the effect of teacher’s repetition as an input enhancement technique in explicit teaching of vocabulary items on efl learners’ later retrieval. to this end, 66 persian speaking english learners, aged 18 - 29, homogenized through a standard proficiency test (opt), were chosen and put into two experimental and control groups, each 33 learners. general service list (gsl), a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

Journal: :Journal of Internet Services and Applications 2013

ستایشنظر, مهرداد, نظام‌آبادی, حسین,

This paper addresses the bidding problem faced by a virtual power plant (VPP) in energy, spinning reserve service, and reactive power service market simultaneously. Therefore, a non-equilibrium model based on security constraints price-based unit commitment (SCPBUC), which is take into account the supply-demand balancing and security constraints of VPP, is proposed. By the presented model, VPP ...

2006
Aki Lassila

The purpose of this paper is to study how a software product company can expand its product-based business with the Software as a Service (SaaS) model in the mobile setting. In this research study we examine how the SaaS model can be implemented by a software company with existing PC-based software business and conduct a case study on F-Secure and its mobile security as a service offering. The ...

2012
Katie Wood

Cloud computing has promised to transform the ways in which we use and interact with information technology (IT). The claims of significant benefits for businesses by using cloud systems are being overshadowed with the increased concerns about security, particularly privacy. This paper explores the unresolved concerns that businesses and users are still facing in terms of ensuring their data re...

Journal: :CoRR 2013
Rashmi Rai G. Sahoo Shabana Mehfuz

Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید