Sciweavers

669 search results - page 67 / 134
» Managing the Risk of IT Outsourcing
Sort
View
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 5 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
HICSS
2003
IEEE
135views Biometrics» more  HICSS 2003»
15 years 5 months ago
Market Entry Strategies of Application Service Providers: Identifying Strategic Differentiation
In the last few years there has been much interest in the delivery of software-as-a-service. The concept of the remote delivery of software by Application Service Providers (ASPs)...
Bhavini Desai, Vishanth Weerakkody, Wendy Currie, ...
SAC
2009
ACM
15 years 4 months ago
Fast networking with socket-outsourcing in hosted virtual machine environments
This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a...
Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyu...
ICDCS
2011
IEEE
13 years 11 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
PDP
2010
IEEE
15 years 6 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...