Search results for "Pilvipalvelut"
showing 10 items of 54 documents
Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…
2019
Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
2017
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…
Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Fa…
2022
Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication and authorisation, respectively. OAuth authorisation involves four parties: client, resource owner, resource server, and authorisation server. The resource owner can access the resource server using the specific client after the authorisation server has authorised the access. The authorisation is presented using a cryptographically signed Access Token, which includes the identity of the resource owner, client, and resource. During the authorisation, Azure AD assigns Ac…
Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint
2019
Mobile Edge Computing (MEC) is an important and effective platform to offload the computational services of modern mobile applications, and has gained tremendous attention from various research communities. For delay and resource constrained mobile devices, the important issues include: 1) minimization of the service latency; 2) optimal revenue maximization; 3) high quality-of-service (QoS) requirement to offload the computational service offloading. To address the above issues, an adaptive service offloading scheme is designed to provide the maximum revenue and service utilization to MEC. Unlike most of the existing works, we consider both the delay-tolerant and delay-constraint services i…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Cargo-Cult Containerization : A Critical View of Containers in Modern Software Development
2022
Software is increasingly developed and deployed using containers. While the concept of a container is conceptually straightforward, there are various issues to be considered while using them, ranging from technical details inside containers to the orchestration of containers that jointly form a meaningful application. In recent years, the use of containers has become so prevalent that developers have a tendency to resort to cargo-cult containerization - ritual adherence to the use of containers just because so many others are doing the same thing. In this paper, we study advantages and downsides of containers in modern-day software development. We foresee the use of containers to spread int…
SHAPES secure cloud platform for healthcare solutions and services
2020
The SHAPES project is an ambitious endeavour that gathers stakeholders from across Europe to create, deploy and pilot at large-scale a EU-standardised open platform incorporating and integrating a broad range of solutions, including technological, organisational, clinical, educational and societal, to enable the ageing population of Europe to remain healthy, active and productive, as well as to maintain a high quality of life and sense of wellbeing for the longest time possible. Not only each digital solution will be ethical, legal and appropriate for users, but also the results will align with the full and ethically responsible end-to-end exploitation of the new functionalities empowered b…
IEEE Access Special Section Editorial : Cloud and Big Data-Based Next-Generation Cognitive Radio Networks
2019
In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the resource allocation and interference ma…
Toiminnanohjausjärjestelmä pilvessä vai yrityksen sisällä : ei-toiminnallisten ominaisuuksien vertailu
2018
ERP-järjestelmät ovat yrityksen menestyksen kannalta tärkeä osa, etenkin isoissa yrityksissä. Niiden tarkoituksena on käsitellä, kerätä, analysoida ja tuottaa dataa yrityksen tarpeisiin. ERP-järjestelmien ongelmana on korkeat lisenssikustannukset ja niiden tarvitsema kallis infrastruktuuri. Pilviteknologian kehitys on tuonut mahdollisuuden myös pienille- ja keskisuurille yrityksille hankkia ERP-järjestelmä. Pilvipohjaiset ERP-järjestelmät ovat kustannustehokkaita, joustavia ja helposti skaalautuvia, joten ne soveltuvat erityisen hyvin pienille yrityksille. Tässä kandidaatintutkielmassa, joka on tehty kirjallisuuskatsauksena, on tarkoitus tehdä vertailua perinteisen ERP-järjestelmien ja pilv…
Immateriaalioikeuksien hallinta pilvipalveluissa teknologian ja pilvipalveluiden ominaispiirteiden näkökulmasta
2016
Pilvipalvelut tarjoavat yksityisille kuluttajille ja organisaatioille mahdollisuuden kasvattaa tehokkuutta. Vaikka pilvipalvelut tarjoavat etuja, on niihin liittyviä omistus- ja immateriaalioikeuksia käsitelty alan kirjallisuudessa joko vähän tai niitä on käsitelty muun tietoturvan ohella. Tässä tutkielmassa pyritään löytämään niitä pilvipalveluille ominaisia piirteitä, jotka vaikuttavat immateriaali- ja omistusoikeuksien määräytymiseen kirjallisuuskatsauksen avulla ja vastaamaan mitä pilvipalvelun potentiaalisen asiakkaan tulisi tehdä pitääkseen nämä omistus- ja immateriaalioikeudet itsellään. Tutkielman tuloksia ovat kirjallisuuskatsauksen avulla tehty pilvipalveluiden ominaispiirteiden j…