Search results for "Security."

showing 10 items of 1645 documents

Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing

2013

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…

Class (computer programming)Emergency managementbusiness.industryEconomic shortageComputer securitycomputer.software_genreData scienceImportant researchCrowdsCrowd controlEmergency evacuationbusinessCrowd psychologyPsychologycomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection

2001

Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…

Class (computer programming)User profileNetwork securitybusiness.industryAnomaly-based intrusion detection systemComputer scienceIntrusion detection systemcomputer.software_genreMisuse detectionData analysisAnomaly detectionData miningbusinesscomputer
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Comparative analysis of architectures for monitoring cloud computing infrastructures

2015

The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…

Cloud computing securityComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingCloud computingcomputer.software_genreSet (abstract data type)Utility computingHardware and ArchitectureVirtual machineScalabilitybusinesscomputerSoftwareFuture Generation Computer Systems
researchProduct

Distributing Storage in Cloud Environments

2013

Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…

Cloud computing securityComputer sciencebusiness.industryCloud testingDistributed computingLocalityThe InternetCloud computingLoad balancing (computing)businessCloud storageOutsourcing2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum
researchProduct

Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review

2014

Cloud computing has received an increasing interest from enterprises since its inception. With its innovative Information Technology (IT) services delivery model, cloud computing could add technical and strategic business values to enterprises. However, it poses highly concerning, internal and external, issues. This paper presents a systematic literature review to explore cloud computing adoption processes in the context of enterprise users and the factors that affect these processes. This is achieved by reviewing 37 articles published about cloud computing adoption. Using the grounded theory approach, articles are classified into eight main categories: internal, external, evaluation, proof…

Cloud computing securityKnowledge managementbusiness.industryProof of conceptComputer scienceInformation systemInformation technologyCloud computingBusiness valuebusinessRisk managementGrounded theoryProceedings of the 4th International Conference on Cloud Computing and Services Science
researchProduct

A Literature Review on Cloud Computing Adoption Issues in Enterprises

2014

Part 3: Creating Value through Applications; International audience; Cloud computing has received increasing interest from enterprises since its inception. With its innovative information technology (IT) services delivery model, cloud computing could add technical and strategic business value to enterprises. However, cloud computing poses highly concerning internal (e.g., Top management and experience) and external issues (e.g., regulations and standards). This paper presents a systematic literature review to explore the current key issues related to cloud computing adoption. This is achieved by reviewing 51 articles published about cloud computing adoption. Using the grounded theory approa…

Cloud computing securityKnowledge managementbusiness.industry[SHS.INFO]Humanities and Social Sciences/Library and information sciencesCorporate governanceenterpriseInformation technologyCloud computingBusiness valueGrounded theorySystematic reviewInformation systemCloud computing[INFO]Computer Science [cs]businessadoption
researchProduct

An Overview of Cloud Computing Adoption Challenges in the Norwegian Context

2014

Cloud computing is dominating European countries' Information and Communication Technology (ICT) agenda. Although the European cloud market is mostly mature, there are still challenges to overcome. Norway is one of the European countries facing such challenges, despite it is a developed country in terms of quality of life and ICT development. This paper identifies the current state of cloud computing adoption challenges in Europe in general and Norway in specific, and the way they are addressed. This is achieved through analyzing research articles, reports published by consulting companies and official bodies, official online news articles, and documents published by official authorities. T…

Cloud computing securityManagement sciencebusiness.industryComputer sciencemedia_common.quotation_subjectContext (language use)Cloud computingNorwegianPublic relationslanguage.human_languageState (polity)Information and Communications TechnologylanguageNormativebusinessDeveloped countrymedia_common2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing
researchProduct

An Investigation of Security and Privacy for Human Bond Communications

2017

Cloud computing securityPrivacy softwarebusiness.industry020204 information systemsBondInternet privacy0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications02 engineering and technologyBusinessComputer securitycomputer.software_genrecomputerHuman Bond Communication
researchProduct

FederatedCloudSim

2014

Recent developments show that the standardization of cloud service descriptions and exchange leads the way for the rise of cloud federations. In these federations CSPs (cloud service providers) can use resources of other CSPs in the case of a lack of local resources or they can add remote services to their catalogue. Cloud federations again demand for cloud brokers which offer the resources and services of different CSPs transparently to the users. Research of cloud federations in the real world is very complex and expensive as distributed hard- and software scenarios are needed. Therefore we present FederatedCloudSim, a very flexible cloud simulation framework that can be used to simulate …

Cloud computing securityStandardizationbusiness.industryCloud simulationCloud computingCloud service providerComputer securitycomputer.software_genreGeographySoftwareService levelCloud testingbusinesscomputerProceedings of the 2nd International Workshop on CrossCloud Systems
researchProduct