Soares et al., 2013 - Google Patents
Cloud security: state of the artSoares et al., 2013
- Document ID
- 15189630455948310068
- Author
- Soares L
- Fernandes D
- Gomes J
- Freire M
- Inácio P
- Publication year
- Publication venue
- Security, Privacy and Trust in Cloud Systems
External Links
Snippet
Throughout the end of the first half and during the second half of the past century, advances in technology allowed scientists to develop computer systems. In the beginning, mostly between the forties and the sixties, single computers would fill large rooms with electronics …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3234—Action, measure or step performed to reduce power consumption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Subashini et al. | A survey on security issues in service delivery models of cloud computing | |
Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
Ardagna et al. | From security to assurance in the cloud: A survey | |
Fernandes et al. | Security issues in cloud environments: a survey | |
Mather et al. | Cloud security and privacy: an enterprise perspective on risks and compliance | |
Soares et al. | Cloud security: state of the art | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
Yusop et al. | Analysis of insiders attack mitigation strategies | |
Abuhussein et al. | Evaluating security and privacy in cloud computing services: A Stakeholder's perspective | |
Kumar et al. | Assurance of data security and privacy in the cloud: A three-dimensional perspective | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
US11924241B1 (en) | Real-time mitigative security architecture | |
Meetei et al. | Security issues in cloud computing | |
Farhadi et al. | A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures | |
Sureshkumar et al. | A study of the cloud security attacks and threats | |
Krishnan | Security and Privacy in Cloud Computing | |
Bulusu et al. | A study on cloud computing security challenges | |
Kajiyama | Cloud computing security: how risks and threats are affecting cloud adoption decisions | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Yadav et al. | Security and privacy concerns in cloud computing | |
Ali et al. | Emerging trends in cloud computing paradigm: An extensive literature review on cloud security, service models, and practical suggestions | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Binu et al. | A survey of traditional and cloud specific security issues | |
Yadav et al. | A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security | |
Deshpande et al. | Optimization of security as an enabler for cloud services and applications |