Search results for "pilvipalvelut"

showing 10 items of 54 documents

Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…

2019

Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…

0209 industrial biotechnologyInformation Systems and ManagementulkoistaminenProcess (engineering)Business processcloud-based accounting information systemsaccountingsmall and medium-sized enterprisesAccountingCloud computing02 engineering and technologyAsset specificitytransaction costsManagement Information SystemsOutsourcingpilvipalvelut020901 industrial engineering & automationAccounting0502 economics and businessTransaction costkirjanpitobusiness.industrytransaktiokustannukset05 social scienceseconomics050201 accountingkustannuksetVariety (cybernetics)outsourcingAccounting information systembusinesspienet ja keskisuuret yrityksetFinance
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Fa…

2022

Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication and authorisation, respectively. OAuth authorisation involves four parties: client, resource owner, resource server, and authorisation server. The resource owner can access the resource server using the specific client after the authorisation server has authorised the access. The authorisation is presented using a cryptographically signed Access Token, which includes the identity of the resource owner, client, and resource. During the authorisation, Azure AD assigns Ac…

Azure Active DirectoryauthorisationpilvipalvelutpääsynvalvontatodentaminenOIDCOAuthauthenticationprivilege escalationsecurityFRTtietoturvaAzure AD
researchProduct

Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint

2019

Mobile Edge Computing (MEC) is an important and effective platform to offload the computational services of modern mobile applications, and has gained tremendous attention from various research communities. For delay and resource constrained mobile devices, the important issues include: 1) minimization of the service latency; 2) optimal revenue maximization; 3) high quality-of-service (QoS) requirement to offload the computational service offloading. To address the above issues, an adaptive service offloading scheme is designed to provide the maximum revenue and service utilization to MEC. Unlike most of the existing works, we consider both the delay-tolerant and delay-constraint services i…

Computer Networks and CommunicationsComputer scienceCloud computing02 engineering and technologypilvipalvelutmobiililaitteet0203 mechanical engineeringServer0202 electrical engineering electronic engineering information engineeringRevenueesitysanalyysiperformance analysisEdge computingta113suorituskykyMobile edge computingbusiness.industry020206 networking & telecommunications020302 automobile design & engineeringComputer Science Applicationsadaptive service offloadingHardware and ArchitectureSignal Processingmobile edge computingrevenue maximizationbusinessMobile deviceInformation SystemsComputer networkIEEE Internet of Things Journal
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Cargo-Cult Containerization : A Critical View of Containers in Modern Software Development

2022

Software is increasingly developed and deployed using containers. While the concept of a container is conceptually straightforward, there are various issues to be considered while using them, ranging from technical details inside containers to the orchestration of containers that jointly form a meaningful application. In recent years, the use of containers has become so prevalent that developers have a tendency to resort to cargo-cult containerization - ritual adherence to the use of containers just because so many others are doing the same thing. In this paper, we study advantages and downsides of containers in modern-day software development. We foresee the use of containers to spread int…

DevOpsdesign principlesvirtualisointicontainer orchestrationcontainerizationsoftware containersohjelmistotuotanto113 Computer and information sciencessoftware designohjelmistosuunnittelupilvipalvelutohjelmistoarkkitehtuuriohjelmistokehityscontinuous software engineering
researchProduct

SHAPES secure cloud platform for healthcare solutions and services

2020

The SHAPES project is an ambitious endeavour that gathers stakeholders from across Europe to create, deploy and pilot at large-scale a EU-standardised open platform incorporating and integrating a broad range of solutions, including technological, organisational, clinical, educational and societal, to enable the ageing population of Europe to remain healthy, active and productive, as well as to maintain a high quality of life and sense of wellbeing for the longest time possible. Not only each digital solution will be ethical, legal and appropriate for users, but also the results will align with the full and ethically responsible end-to-end exploitation of the new functionalities empowered b…

EHealthhyvinvointiteknologiabusiness.industryComputer scienceCloud computingComputingMilieux_LEGALASPECTSOFCOMPUTINGComputer securitycomputer.software_genreSHAPES projectcloud servicespilvipalvelutcross-border healthcarehealthy agingwell-beingHealth careteleterveydenhuoltobusinesskyberturvallisuuscomputer
researchProduct

IEEE Access Special Section Editorial : Cloud and Big Data-Based Next-Generation Cognitive Radio Networks

2019

In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the resource allocation and interference ma…

General Computer Sciencebusiness.industryComputer scienceBig dataGeneral EngineeringCloud computingInterference (wave propagation)Spectrum managementpilvipalvelutlangaton tiedonsiirtoCognitive radioResource allocationResource allocation (computer)General Materials Sciencelcsh:Electrical engineering. Electronics. Nuclear engineeringkognitiivinen radiobusinesslcsh:TK1-9971Information exchangeComputer network
researchProduct

Toiminnanohjausjärjestelmä pilvessä vai yrityksen sisällä : ei-toiminnallisten ominaisuuksien vertailu

2018

ERP-järjestelmät ovat yrityksen menestyksen kannalta tärkeä osa, etenkin isoissa yrityksissä. Niiden tarkoituksena on käsitellä, kerätä, analysoida ja tuottaa dataa yrityksen tarpeisiin. ERP-järjestelmien ongelmana on korkeat lisenssikustannukset ja niiden tarvitsema kallis infrastruktuuri. Pilviteknologian kehitys on tuonut mahdollisuuden myös pienille- ja keskisuurille yrityksille hankkia ERP-järjestelmä. Pilvipohjaiset ERP-järjestelmät ovat kustannustehokkaita, joustavia ja helposti skaalautuvia, joten ne soveltuvat erityisen hyvin pienille yrityksille. Tässä kandidaatintutkielmassa, joka on tehty kirjallisuuskatsauksena, on tarkoitus tehdä vertailua perinteisen ERP-järjestelmien ja pilv…

PilvipalvelutSaaSEi-toiminnalliset ominaisuudetERPVaatimusmäärittely
researchProduct

Immateriaalioikeuksien hallinta pilvipalveluissa teknologian ja pilvipalveluiden ominaispiirteiden näkökulmasta

2016

Pilvipalvelut tarjoavat yksityisille kuluttajille ja organisaatioille mahdollisuuden kasvattaa tehokkuutta. Vaikka pilvipalvelut tarjoavat etuja, on niihin liittyviä omistus- ja immateriaalioikeuksia käsitelty alan kirjallisuudessa joko vähän tai niitä on käsitelty muun tietoturvan ohella. Tässä tutkielmassa pyritään löytämään niitä pilvipalveluille ominaisia piirteitä, jotka vaikuttavat immateriaali- ja omistusoikeuksien määräytymiseen kirjallisuuskatsauksen avulla ja vastaamaan mitä pilvipalvelun potentiaalisen asiakkaan tulisi tehdä pitääkseen nämä omistus- ja immateriaalioikeudet itsellään. Tutkielman tuloksia ovat kirjallisuuskatsauksen avulla tehty pilvipalveluiden ominaispiirteiden j…

Pilvipalvelutimmateriaalioikeuksien hallintaimmateriaalioikeudetpilvipalvelujen teknologiaomistusoikeus
researchProduct