[go: up one dir, main page]

Soares et al., 2013 - Google Patents

Cloud security: state of the art

Soares et al., 2013

Document ID
15189630455948310068
Author
Soares L
Fernandes D
Gomes J
Freire M
Inácio P
Publication year
Publication venue
Security, Privacy and Trust in Cloud Systems

External Links

Snippet

Throughout the end of the first half and during the second half of the past century, advances in technology allowed scientists to develop computer systems. In the beginning, mostly between the forties and the sixties, single computers would fill large rooms with electronics …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power Management, i.e. event-based initiation of power-saving mode
    • G06F1/3234Action, measure or step performed to reduce power consumption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication

Similar Documents

Publication Publication Date Title
Subashini et al. A survey on security issues in service delivery models of cloud computing
Akhtar et al. A comprehensive overview of privacy and data security for cloud storage
Ardagna et al. From security to assurance in the cloud: A survey
Fernandes et al. Security issues in cloud environments: a survey
Mather et al. Cloud security and privacy: an enterprise perspective on risks and compliance
Soares et al. Cloud security: state of the art
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
Yusop et al. Analysis of insiders attack mitigation strategies
Abuhussein et al. Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
Kumar et al. Assurance of data security and privacy in the cloud: A three-dimensional perspective
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
US11924241B1 (en) Real-time mitigative security architecture
Meetei et al. Security issues in cloud computing
Farhadi et al. A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
Sureshkumar et al. A study of the cloud security attacks and threats
Krishnan Security and Privacy in Cloud Computing
Bulusu et al. A study on cloud computing security challenges
Kajiyama Cloud computing security: how risks and threats are affecting cloud adoption decisions
Malomo et al. A survey on recent advances in cloud computing security
Yadav et al. Security and privacy concerns in cloud computing
Ali et al. Emerging trends in cloud computing paradigm: An extensive literature review on cloud security, service models, and practical suggestions
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Binu et al. A survey of traditional and cloud specific security issues
Yadav et al. A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security
Deshpande et al. Optimization of security as an enabler for cloud services and applications