scispace - formally typeset
Book ChapterDOI

An Analysis of Security Related Issues in Cloud Computing

TLDR
The main objective of the paper is to provide an overall security perspective in cloud Computing and highlight the security concerns and other issues.
Citations
More filters
Journal ArticleDOI

Emerging Issues & Challenges in Cloud Computing—A Hybrid Approach

TL;DR: The findings show that some issues and challenges that practitioners consider important are understudied such as software related issues, and challenges pertaining to learning fast-evolving technologies.
Journal ArticleDOI

A decision-based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management

TL;DR: A strategy to schedule dependent tasks called pre-emptive fair scheduling algorithm (PFSA) is proposed, which aims to ensure higher utilisation of virtual machines (VMs) by reducing the idle time and to minimise the number of times aPre-empted task is submitted to the virtual machine.
Proceedings ArticleDOI

E-government cloud computing proposed model: Egyptian E_Government Cloud Computing

TL;DR: An abstract hybrid model to adapt e-government to cloud computing in Egypt that minimizes the risk associated with those concerns and a set of recommended implementation practices and specification are suggested that ensure the risk minimization of the above concerns.
Book ChapterDOI

Data Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation

TL;DR: This chapter discusses specific requirements and characteristics of cloud IDS in the light of traditional IDS, and introduces the first public dataset of its kind for cloud intrusion detection, which consists of several terabytes of data.
Journal ArticleDOI

OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing

TL;DR: A load balancing mechanism called Osmosis Load Balancing (OLB), which works on the principle of osmosis to reschedule the tasks in virtual machines, based on the Distributed Hash Table with a chord overlay mechanism.
References
More filters
Journal ArticleDOI

Recursive functions of symbolic expressions and their computation by machine, Part I

TL;DR: A programming system called LISP (for LISt Processor) developed for the IBM 704 computer by the Artificial Intelligence group at M.I.T. was designed to facilitate experiments with a proposed system called the Advice Taker, whereby a machine could be instructed to handle declarative as well as imperative sentences and could exhibit "common sense" in carrying out its instructions.

Recursive Functions of Symbolic Expressions and their Computation by Machine

TL;DR: A programming system called LISP (for LISt Processor) has been developed for the IBM 704 computer by the Artificial Intelligence group at M.I.T. as mentioned in this paper, where a machine could be instructed to handle declarative as well as imperative sentences and could exhibit "common sense" in carrying out its instructions.
Proceedings ArticleDOI

Towards accountable management of identity and privacy: sticky policies and enforceable tracing services

TL;DR: This document describes an innovative approach and related mechanisms to enforce users' privacy by putting users in control and making organizations more accountable that leverages identity-based encryption (IBE) and TCPA technologies.
Journal ArticleDOI

Risks of the passport single signon protocol

TL;DR: The Passport single signon protocol is examined, several risks and attacks are identified, and a flaw that was discovered in the interaction of Passport and Netscape browsers that leaves a user logged in while informing him that he has successfully logged in.
Proceedings ArticleDOI

Security analysis of the SAML single sign-on browser/artifact profile

TL;DR: This work presents a security analysis of the SAML single sign-on browser/artifact profile, which is the first one for such a protocol standard and reveals several flaws in the specification that can lead to vulnerable implementations.