Sciweavers

392 search results - page 7 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 1 months ago
Decision Support Tools for Cloud Migration in the Enterprise
— This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of...
Ali Khajeh-Hosseini, Ian Sommerville, Jurgen Bogae...
TRUST
2010
Springer
14 years 3 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
CCS
1994
ACM
14 years 2 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
MIDDLEWARE
2009
Springer
14 years 4 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...