Kadam, 2011 - Google Patents
Security issues in cloud computing a transparent viewKadam, 2011
View PDF- Document ID
- 14717924584284463522
- Author
- Kadam Y
- Publication year
- Publication venue
- International Journal of Computer Science Emerging Technology
External Links
Snippet
Cloud Computing is the next generation Architecture of the most IT enterprise. It made possible, the application to run without the burden of local hardware and software. It moved the data and the application software of the various enterprises to the centralized large data …
- 230000001154 acute 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
- G06Q10/1053—Employment or hiring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/103—Workflow collaboration or project management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kadam | Security issues in cloud computing a transparent view | |
Subashini et al. | A survey on security issues in service delivery models of cloud computing | |
Khan et al. | Establishing trust in cloud computing | |
Younis et al. | Secure cloud computing for critical infrastructure: A survey | |
Soares et al. | Cloud security: state of the art | |
Kumar et al. | Assurance of data security and privacy in the cloud: A three-dimensional perspective | |
Kolevski et al. | Cloud computing data breaches a socio-technical review of literature | |
Bulusu et al. | A study on cloud computing security challenges | |
Krishnan | Security and Privacy in Cloud Computing | |
Taneja et al. | Information Security in cloud computing: A Systematic Literature Review and analysis | |
Goyal | Security Concerns In the World of Cloud Computing. | |
Silva | Web 3.0 and Cybersecurity–Short Paper | |
Bennasar et al. | An overview of the state-of-the-art of cloud computing cyber-security | |
Ahmed et al. | A generalized threat taxonomy for cloud computing | |
Chopra et al. | Cloud computing: Elementary threats and embellishing countermeasures for data security | |
Tiwari et al. | A review of data security and privacy issues over SaaS | |
Bennasar et al. | State-of-The-Art of cloud computing cyber-security | |
Singh et al. | Compliance and regulatory standards for cloud computing | |
Barrow et al. | Security in Cloud computing for service delivery models: Challenges and solutions | |
Okonofua et al. | Cybersecurity: An analysis of the protection mechanisms in a cloud-centered environment | |
Bala | Cloud computing and database security | |
Kate Tomchik | Comparison of the IaaS Security Available from the Top Three Cloud Providers | |
Moazzeni | Cloud Computing: Investigate Gaps of Security in Public Cloud | |
Τσάβος | Risk assessment and risk management in a cloud based company | |
Brinkerhoff | Nine dangerous myths about identity governance |