Search results for "cloud computing."

showing 10 items of 325 documents

Towards a Better Understanding of the Dynamics of Platform as a Service Business Models

2014

Platform as a Service (PaaS) solutions are changing the way software is produced, distributed, used, and priced. However, there has been little research into understanding the dynamics of PaaS business models and how these business models should be designed to establish a flourishing ecosystem around these platforms. Using design science research (DSR) we first identified the main design elements of PaaS business models as well as their relationships by investigating 24 PaaS providers. The resulting classification scheme as well as the qualitative systems dynamics model (in form of a causal loop diagram (CLD)) facilitates a better understanding of the adoption dynamics of PaaS business mode…

Information managementta113Process managementComputer scienceArtifact-centric business process modelbusiness.industryManagement scienceCloud computingBusiness process modelingBusiness modelSoftwareUnified Modeling Languagebusinesscomputercomputer.programming_language
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector

2020

In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two larg…

Information securityScope (project management)business.industryCorporate governanceControl (management)Cloud sourcingCloud computingInformation securityBusiness agilityOutsourcingCloud sourcing; Information security; IT governanceParadigm shiftIT governanceBusinessIndustrial organization
researchProduct

Combining fuzzy C-mean and normalized convolution for cloud detection in IR images

2009

An important task for the cloud monitoring in several frameworks is providing maps of the cloud coverage. In this paper we present a method to detect cloudy pixels for images taken from ground by an infra-red camera. The method is a three-steps algorithm mainly based on a Fuzzy C-Mean clustering, that works on a feature space derived from the original image and the output of the reconstructed image obtained via normalized convolution. Experiments, run on several infra-red images acquired under different conditions, show that the cloud maps returned are satisfactory. © 2009 Springer Berlin Heidelberg.

Infra-red imagePixelSettore INF/01 - InformaticaComputer sciencebusiness.industryFeature vectorFuzzy setComputer Science (all)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCloud computingFuzzy logicImage (mathematics)Theoretical Computer ScienceNormalized convolutionComputer Science::Computer Vision and Pattern RecognitionFuzzy setComputer visionCloudiness maskArtificial intelligenceCluster analysisbusinessAstrophysics::Galaxy Astrophysics
researchProduct

Succeeding with Building Information Modeling: A Case Study of BIM Diffusion in a Healthcare Construction Project

2014

Technological innovations such as Building Information Modeling (BIM) offer opportunities to improve collaborative work and integration in the architecture, engineering and construction industry. However, research to date has documented how many organizations struggle with how to work based on this new technology, and many implementations fail. In this paper we present a case study of a major healthcare construction project in which the use of BIM was paramount, and where designers claim to have succeeded in integrated design. The designers organized their digital collaboration by establishing 1) change agents; 2) a cloud computing infrastructure; 3) new roles and responsibilities; 4) BIM c…

Integrated designCollaborative softwareEngineeringEngineering managementKnowledge managementBuilding information modelingbusiness.industryLearning environmentInformation systemCloud computingArchitecturebusinessImplementation2014 47th Hawaii International Conference on System Sciences
researchProduct

2020

The growth of cloud-based services is mainly supported by the core networking infrastructures of large-scale data centers, while the scalability of these services is influenced by the performance and dependability characteristics of data centers. Hence, the data center network must be agile and reconfigurable in order to respond quickly to the ever-changing application demands and service requirements. The network must also be able to interconnect the big number of nodes, and provide an efficient and fault-tolerant routing service to upper-layer applications. In response to these challenges, the research community began exploring novel interconnect topologies, namely: Flecube, DCell, Ficonn…

InterconnectionComputer Networks and CommunicationsNetwork packetbusiness.industryComputer scienceQuality of service020206 networking & telecommunicationsCloud computing02 engineering and technologyTopologyNetwork topologyAverage path lengthBottleneckComputer Science ApplicationsScalabilityNode (computer science)0202 electrical engineering electronic engineering information engineeringDependabilityData centerElectrical and Electronic EngineeringbusinessSoftwareIEEE/ACM Transactions on Networking
researchProduct

IoT-Based Home Monitoring: Supporting Practitioners' Assessment by Behavioral Analysis.

2019

This paper introduces technical solutions devised to support the Deployment Site - Regione Emilia Romagna (DS-RER) of the ACTIVAGE project. The ACTIVAGE project aims at promoting IoT (Internet of Things)-based solutions for Active and Healthy ageing. DS-RER focuses on improving continuity of care for older adults (65+) suffering from aftereffects of a stroke event. A Wireless Sensor Kit based on Wi-Fi connectivity was suitably engineered and realized to monitor behavioral aspects, possibly relevant to health and wellbeing assessment. This includes bed/rests patterns, toilet usage, room presence and many others. Besides hardware design and validation, cloud-based analytics services are intro…

IoTComputer sciencesmart homeCloud computing02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Use caseElectrical and Electronic EngineeringInstrumentationToiletbusiness.industryEvent (computing)020206 networking & telecommunicationsData scienceAtomic and Molecular Physics and Opticsanomaly detectioncontinuous monitoring3. Good healthactive assisted living (AAL)behavioural analysisSoftware deploymentAnalyticsbusiness030217 neurology & neurosurgerySensors (Basel, Switzerland)
researchProduct

Lecture Notes in Real-Time Intelligent Systems

2018

Intelligent computing refers greatly to artificial intelligence with the aim at making computer to act as a human. This newly developed area of real-time intelligent computing integrates the aspect of dynamic environments with the human intelligence. This book presents a comprehensive practical and easy to read account which describes current state-of-the art in designing and implementing real-time intelligent computing to robotics, alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowd sourcing, broadband systems, cloud computing, streaming data and many other applications areas. The solutions discussed in this book will encourage the resear…

IoTMultimediaComputer scienceRemote Access ControlIntelligent decision support systemStreaming DataCloud Computingcomputer.software_genreIntelligent SystemsMulti-agent SystemsNetworkingMobile Smart SystemsCrowdsourcingcomputerBroadband Systems
researchProduct