Littérature scientifique sur le sujet « Clod computing »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Clod computing ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Clod computing"
Et. al., Pavithra G,. « A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 2 (10 avril 2021) : 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Texte intégralOdhiambo, Fredrick, Thomas Mose et Tobias Mwalili. « Precursors of Cloud Computing Adoption in Selected Banks in Kenya ». International Journal of Technology and Systems 7, no 2 (27 octobre 2022) : 56–94. http://dx.doi.org/10.47604/ijts.1676.
Texte intégralEt. al., Krishan Tuli ,. « Comparisons of Energy Efficiency Management Techniques in Cloud Based Environment ». Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no 2 (11 avril 2021) : 491–99. http://dx.doi.org/10.17762/turcomat.v12i2.858.
Texte intégralALEXANDER, E. B. « BULK DENSITY EQUATIONS FOR SOUTHERN ALASKA SOILS ». Canadian Journal of Soil Science 69, no 1 (1 février 1989) : 177–80. http://dx.doi.org/10.4141/cjss89-017.
Texte intégralSahare, Shubhangi, et Dr D. V. Rojatkar. « Cloud Computing ». International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 octobre 2017) : 786–89. http://dx.doi.org/10.31142/ijtsrd4685.
Texte intégralAnjaneyulu, P., et Mr S. Srinivasa Reddy. « Cloud Computing Adoption Approach towards Securing Data in Cloud Computing ». International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 juin 2018) : 390–93. http://dx.doi.org/10.31142/ijtsrd12995.
Texte intégralKim, Dong-Ho, Jung-Hoon Lee et Yang-Pyo Park. « A Study of Factors Affecting the Adoption of Cloud Computing ». Journal of Society for e-Business Studies 17, no 1 (28 février 2012) : 111–36. http://dx.doi.org/10.7838/jsebs.2012.17.1.111.
Texte intégralM, Arun Prasath, et Mrs T. Sathiyabama. « Virtualization in Cloud Computing ». International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (31 octobre 2018) : 875–77. http://dx.doi.org/10.31142/ijtsrd18665.
Texte intégralMathkunti, Nivedita M. « Cloud Computing : Security Issues ». International Journal of Computer and Communication Engineering 3, no 4 (2014) : 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.
Texte intégralZhang, Yan. « Web Data Mining Technology on Cloud Computing ». Applied Mechanics and Materials 543-547 (mars 2014) : 3490–93. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3490.
Texte intégralThèses sur le sujet "Clod computing"
Lebedeva, A. O. « Cloud computing ». Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33692.
Texte intégralBegic, Dina. « Cloud Computing ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5697/.
Texte intégralMatteazzi, Piergiorgio <1969>. « Cloud computing ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6952.
Texte intégralGorelik, Eugene. « Cloud computing models ». Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79811.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (p. 79-80).
Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade - factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies. Accordingly, the demand for cloud computing has forced the development of new market offerings, representing various cloud service and delivery models. These models significantly expand the range of available options, and task organizations with dilemmas over which cloud computing model to employ. This thesis poses analysis of available cloud computing models and potential future cloud computing trends. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid). Cloud computing paradigms are discussed in the context of technical, business, and human factors, analyzing how business and technology strategy could be impacted by the following aspects of cloud computing: --Architecture --Security --Costs --Hardware/software trends (commodity vs. brands, open vs. closed-source) --Organizational/human Factors To provide a systematic approach to the research presented in this paper, cloud taxonomy is introduced to classify and compare the available cloud service offerings. In particular, this thesis focuses on the services of a few major cloud providers. Amazon Web Services (AWS) will be used as a base in many examples because this cloud provider represents approximately 70% of the current public cloud services market. Amazon's AWS has become a cloud services trend-setter, and a reference point for other cloud service providers. The analysis of cloud computing models has shown that public cloud deployment model is likely to stay dominant and keep expanding further. Private and Hybrid deployment models are going to stay for years ahead but their market share is going to continuously drop. In the long-term private and Hybrid cloud models most probably will be used only for specific business cases. IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and platform services rather than infrastructure. In the near future we can expect significant number of market consolidations with few large players retaining market control at the end.
by Eugene Gorelik.
S.M.in Engineering and Management
Sousa, Francisco Cordeiro de. « Mainroad : cloud computing ». Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10316.
Texte intégralImine, Youcef. « Cloud computing security ». Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Texte intégralThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
TAPANELLI, Pietro. « Cloud computing contracts ». Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.
Texte intégralAliperti, Francesco. « Il Cloud Computing ». Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2595.
Texte intégralAccording to the definition of National Institute of Standards and Technology (NIST) dell’U.S. Departement of Commerce, cloud computing consists of a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and service) that can be rapidely provisioned and released with minimal management effort or service provider interaction; a new form of storage and data processing on a virtual platform. The first chapter define the phenomenon, describing the models and typologies, highlighting the benefits and the risks, as well as the legal problems associated with it. In particular, as the data and their processing are the object of the services offered by the cloud system, it is of particular importance that those aspects of the protection of the personal data of cloud service users are clarified as necessary, preliminary, a policy of prevention, aimed at informing about the risks. These issues are highlighted by the Guarantor for the Protection of Personal Data, which, more than once, has intervened in order to encourage a conscious and correct use of the cloud system. In the second chapter, the right to privacy is investigated in the current context of technological evolution. Some fundamental judgments of European jurisprudence are reviewed (judgments: Lindqvist, Costeja, Scherms) on the protection of privacy in the internet, highlighting the points of contact and distance to the Italian one, with reference also to a recent judgment of the Spanish High Tribunal. It is noted, however, that in the diversity of solutions offered, conflict between the various interests at stake can only be solved by reason of their careful balancing. Looking back on its evolution, it is clear that the right in question (which has expanded its content by including the right to the protection of personal data), in the light of what the European Court of Justice has stated, is not absolute prerogative, but must be considered in the light of its social function. The following is a review of European Regulation 2016/679 (which will be directly applicable in all EU countries from 25 May 2018), as it represents the instrument for formalizing the new digital course for the protection of Personal data, at Community and non-EU level. In particular, they analyze the novelties it introduces and the archives on which it relies on the entire privacy system. It is also intended to specify the spatial scope of application, in the light of the criteria set out in Article 3 thereof. In the third chapter, focusing on the most significant aspect of the technology under discussion (the clear separation between data ownership and processing and possession and control of data), the research analyzes the topic of ‘processing’ personal data the light of the opinions of the Italian and European Regulatory Authority (Art. 29 Group) and, in particular, of the recent European Regulation 2016/679 and of the Code of Conduct, 26 September 2016 of the CISPE. The topic that inevitably interfere with cloud technology, especially today, in a context where the scope for sharing and personal data collection has increased significantly, allowing both private companies and public authorities to use personal data, such as in the pursuit of their activities. This also in view of the fact that cloud services allow to ‘process’ and ‘store’ data on server systems deployed in different parts of the planet, where it is necessary to verify the existence of an ‘adequate level of protection’ in order to ensure to the party concerned a ‘substantially equivalent’ protection to that guaranteed within the Union. To this end, the essential premise for which it is necessary to inform about the risks is to clarify, in the light of the provisions of the Privacy Policy 2016 and of the Code of Conduct, 26 September 2016 of CISPE, issues such as: roles and obligations between controller and processor; the informational omissions of the service provider and the user’s unknowingness; keeping data in cloud computing and transferring them to a ‘third country’ after the judgments of the Court of Justice; the question of the portability of their data on other Csp (problem of the c.d. ‘vendor lock-in’); the data breach notification and the data protection in the relationship between constumer and provider. [edited by Author]
XXIX n.s.
Cordone, Luigi. « L’evoluzione del Cloud Computing : Il Serverless Computing ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Trouver le texte intégralDatla, Dinesh. « Wireless Distributed Computing in Cloud Computing Networks ». Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.
Texte intégralPh. D.
Livres sur le sujet "Clod computing"
Khosravi, Mohammad R., Qiang He et Haipeng Dai, dir. Cloud Computing. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99191-3.
Texte intégralAvresky, Dimiter R., Michel Diaz, Arndt Bode, Bruno Ciciani et Eliezer Dekel, dir. Cloud Computing. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12636-9.
Texte intégralReinheimer, Stefan, dir. Cloud Computing. Wiesbaden : Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20967-4.
Texte intégralLeung, Victor C. M., et Min Chen, dir. Cloud Computing. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05506-0.
Texte intégralLeung, Victor C. M., et Min Chen, dir. Cloud Computing. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14254-8.
Texte intégralAntonopoulos, Nick, et Lee Gillam, dir. Cloud Computing. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54645-2.
Texte intégralFaynberg, Igor, Hui-Lan Lu et Dor Skuler, dir. Cloud Computing. Chichester, UK : John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118736074.
Texte intégralJaatun, Martin Gilje, Gansen Zhao et Chunming Rong, dir. Cloud Computing. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10665-1.
Texte intégralBaun, Christian, Marcel Kunze, Jens Nimis et Stefan Tai. Cloud Computing. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20917-8.
Texte intégralYousif, Mazin, et Lutz Schubert, dir. Cloud Computing. Cham : Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03874-2.
Texte intégralChapitres de livres sur le sujet "Clod computing"
Shin, Byeong-Seok, et Ei-Kyu Choi. « An Efficient CLOD Method for Large-Scale Terrain Visualization ». Dans Entertainment Computing – ICEC 2004, 592–97. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28643-1_78.
Texte intégralKohne, Andreas. « Cloud Computing ». Dans Cloud-Föderationen, 19–28. Wiesbaden : Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20973-5_2.
Texte intégralZhu, Xiaoming, Bingying Song, Yingzi Ni, Yifan Ren et Rui Li. « Cloud Computing—From Offline Computing to Cloud Computing ». Dans Business Trends in the Digital Era, 23–42. Singapore : Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1079-8_2.
Texte intégralZhao, Liang, Sherif Sakr, Anna Liu et Athman Bouguettaya. « Cloud Computing ». Dans Cloud Data Management, 9–20. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04765-2_2.
Texte intégralVogel, Robert, Tarkan Koçoğlu et Thomas Berger. « Cloud Computing ». Dans Desktopvirtualisierung, 119–37. Wiesbaden : Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9768-8_9.
Texte intégralOppitz, Marcus, et Peter Tomsu. « Cloud Computing ». Dans Inventing the Cloud Century, 267–318. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61161-7_11.
Texte intégralMurugesan, San, et Irena Bojanova. « Cloud Computing ». Dans Encyclopedia of Cloud Computing, 1–14. Chichester, UK : John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch1.
Texte intégralBarton, Thomas. « Cloud Computing ». Dans E-Business mit Cloud Computing, 41–52. Wiesbaden : Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-8348-2426-4_4.
Texte intégralMöhring, Michael, Barbara Keller et Rainer Schmidt. « Cloud-Computing ». Dans CRM in der Public Cloud, 11–19. Wiesbaden : Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-19724-7_3.
Texte intégralLele, Ajey. « Cloud Computing ». Dans Disruptive Technologies for the Militaries and Security, 167–85. Singapore : Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.
Texte intégralActes de conférences sur le sujet "Clod computing"
Marin, Dramnescu, et Vladimir Enachescu. « THE ADVANTAGES OF USING CLOUD COMPUTING IN EDUCATIONAL ENVIRONMENT ». Dans eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-057.
Texte intégralParne, Prudhvi. « Cloud Computing Strategy and Impact in Banking/Financial Services ». Dans 5th International Conference on Computer Science and Information Technology (COMIT 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111704.
Texte intégralNowocin, Walter. « Benefits of the Cloud for Calibration Management Software Systems ». Dans NCSL International Workshop & Symposium. NCSL International, 2021. http://dx.doi.org/10.51843/wsproceedings.2021.05.
Texte intégralMurtala, M. M., et Olumide Babatope Longe. « Data Security in Decentralized Cloud Systems : A Case for the Deployment of Blockchain Technology. » Dans 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p13.
Texte intégralMoravcik, Marek, Pavel Segec, Jana Uramova et Martin Kontsek. « Teaching cloud computing in cloud computing ». Dans 2017 15th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2017. http://dx.doi.org/10.1109/iceta.2017.8102512.
Texte intégralAlkamil, Ethar H. K., Ammar A. Mutlag, Haider W. Alsaffar et Mustafa H. Sabah. « The Role of Hybrid IoT with Cloud Computing and Fog Computing to Help the Oil and Gas Industry Recover from Covid-19 and Face Future Challenges ». Dans SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/206067-ms.
Texte intégralWu, Dazhong, Xi Liu, Steve Hebert, Wolfgang Gentzsch et Janis Terpenny. « Performance Evaluation of Cloud-Based High Performance Computing for Finite Element Analysis ». Dans ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46381.
Texte intégralMoloja, Dina, et Ephias Ruhode. « Factors affecting Cloud Computing adoption in Higher Learning Institutions in South Africa : A case of Matjhabeng TVET Colleges ». Dans Sixth International Conference on Higher Education Advances. Valencia : Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11243.
Texte intégralWu, Dazhong, J. Lane Thames, David W. Rosen et Dirk Schaefer. « Towards a Cloud-Based Design and Manufacturing Paradigm : Looking Backward, Looking Forward ». Dans ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-70780.
Texte intégralRayapati, Siri Varshini, Sravya Muttavarapu, Navya Nagasuri et Sunita Singhal. « Security in Cloud Technologies : A Brief Overview ». Dans International Research Conference on IOT, Cloud and Data Science. Switzerland : Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-4pq758.
Texte intégralRapports d'organisations sur le sujet "Clod computing"
Weber, Arnd, dir. Impacts of Cloud Computing (STOA Cloud Computing Del.3). Vienna : self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-3.
Texte intégralWeber, Arnd, dir. Foundations of Cloud Computing (STOA Cloud Computing Del.2). Vienna : self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-2.
Texte intégralTakai, Teresa M. Cloud Computing Strategy. Fort Belvoir, VA : Defense Technical Information Center, juillet 2012. http://dx.doi.org/10.21236/ada563989.
Texte intégralHochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Fort Belvoir, VA : Defense Technical Information Center, août 2011. http://dx.doi.org/10.21236/ada549202.
Texte intégralSeybold, Patricia. Cloud Computing in 2015. Boston, MA : Patricia Seybold Group, décembre 2013. http://dx.doi.org/10.1571/ta12-13-13cc.
Texte intégralKim, Anya, et Ira S. Moskowitz. Incentivized Cloud Computing : A Principal Agent Solution to the Cloud Computing Dilemma. Fort Belvoir, VA : Defense Technical Information Center, septembre 2010. http://dx.doi.org/10.21236/ada530441.
Texte intégralWeber, Arnd, dir. Cloud Computing - European Perspectives on impacts and potentials of Cloud Computing and Social Network Sites (STOA Cloud Computing Del.1). Vienna : self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-1.
Texte intégralHogan, Michael, Fang Liu, Annie Sokol et Jin Tong. NIST cloud computing standards roadmap :. Gaithersburg, MD : National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-291v1.
Texte intégralLiu, Fang, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger et Dawn Leaf. NIST cloud computing reference architecture. Gaithersburg, MD : National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-292.
Texte intégralde Vaulx, Frederic, Eric Simmon et Robert Bohn. Cloud computing service metrics description. Gaithersburg, MD : National Institute of Standards and Technology, avril 2017. http://dx.doi.org/10.6028/nist.sp.500-307.
Texte intégral