To see the other types of publications on this topic, follow the link: Cloud risks.

Dissertations / Theses on the topic 'Cloud risks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cloud risks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Laukka, Lucas, and Carl Fransson. "Cloud risk analysis using OCTAVE Allegro : Identifying and analysing risks of a cloud service." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176731.

Full text
Abstract:
Cybersecurity is currently an important and relevant issue, as more and more industries are taking advantage of the accessibility of storing information online. To create a secure system one must know the potential risks and attacks on that system, making risk analysis a very potent tool. In this study, we performed such an analysis using the risk analysis method OCTAVE Allegro on a company providing a cloud-based service to find out what risks a cloud service provider might be exposed to, and the usefulness of said risk analysis method in this circumstance. We found that OCTAVE Allegro is sui
APA, Harvard, Vancouver, ISO, and other styles
2

Ambrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.

Full text
Abstract:
<p>With Cloud Computing becoming a popular term on the Information Technology (IT) market, security and accountability has become important issues to highlight. In our research we review these concepts by focusing on security risks with Cloud Computing and the associated services; Software, Platform and Infrastructure (SPI) and connecting them with a social study of trust.</p><p>The method that was conducted during our research was reviewing secondary literature, interviewing different experts regarding Cloud Computing and relating standards already established by ENISA, NIST, and CSA to the i
APA, Harvard, Vancouver, ISO, and other styles
3

Akrir, Khaled Ali Ahmed. "Cloud computing technology framework and reducing risks." Doctoral thesis, Česká zemědělská univerzita v Praze, 2015. http://www.nusl.cz/ntk/nusl-259675.

Full text
Abstract:
The thesis investigates, in a qualitative way, the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus of this research is on the identification of risk vectors that affect cloud computing and the creation of a framework that can help IT managers in their cloud adoption process. Economic pressures on businesses are creating a demand for an alternative delivery of the model that can provide flexible payments, dramatic cuts in capital investment, and reductions in operational cost. Cloud computing is positioned to take advantage of these
APA, Harvard, Vancouver, ISO, and other styles
4

Tomčová, Zuzana. "Guideline for assessing risks arising from adoption of a cloud service." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193938.

Full text
Abstract:
This thesis focuses on assessment of IT risks related to company's adoption of a cloud ser-vice. The goal of the thesis is to identify generally applicable set of IT risks, which will serve as a basis for the proposed risk assessment guideline. The work is organized as follows: Introduction and literature review is presented in the first chapter. The author provides theoretical background supporting better understand-ing of the topic in the Chapter two, where concept of the cloud computing and IT risk are described. A qualitative questionnaire is introduced and results of the participants' re-
APA, Harvard, Vancouver, ISO, and other styles
5

Yau, Yeung Pui Yan D. "An exploration of risks in using cloud accounting information systems in Australia." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/112366/1/Pui%20Yan_Yau%20Yeung_Thesis.pdf.

Full text
Abstract:
This thesis is an exploratory study on the risk management of using cloud accounting in Australia. Using the interview method, this research identifies the specific risks for the use of cloud accounting in organisations and proposes possible measures to mitigate those risks from the end-user perspective. This research provides an understanding on the special characteristics of cloud accounting information systems. The findings of this research will assist businesses with their decision-making in relation to the use of cloud accounting.
APA, Harvard, Vancouver, ISO, and other styles
6

Kommineni, Mohanarajesh, and Revanth Parvathi. "RISK ANALYSIS FOR EXPLORING THE OPPORTUNITIES IN CLOUD OUTSOURCING." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3656.

Full text
Abstract:
Context: Cloud Outsourcing is a new form of outsourcing which is not more under implementation and yet to be implemented. It is a form of outsourcing in which software organizations outsource the work to e-freelancers available throughout the world using cloud services via the Internet. Software organizations handovers the respective task to the cloud and from the cloud e-freelancers undertake the development of task and then return back the finished task to the cloud. Organizations recollect the finished task from the cloud and verify it and then pay to the e-freelancer. Objectives: The aim o
APA, Harvard, Vancouver, ISO, and other styles
7

Enslin, Zacharias. "Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20116.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2012.<br>ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consu
APA, Harvard, Vancouver, ISO, and other styles
8

Laprade, Craig. "Domain Name Service Trust Delegation in Cloud Computing: Exploitation, Risks, and Defense." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28156620.

Full text
Abstract:
The Domain Name Service (DNS) infrastructure is a global distributed database that links human readable domain names with the Internet Protocol (IP) addresses of the resources that power the internet. With the explosion of cloud computing over the past decade, increasing proportions of organizations' computing services have moved from on-premise solutions to cloud providers. These services range from complete DNS management to singular services such as E-mail or a payroll application. Each of these outsourced services requires a trust delegation, that is, the owning organization needs to adver
APA, Harvard, Vancouver, ISO, and other styles
9

Opara-Martins, Justice. "A decision framework to mitigate vendor lock-in risks in cloud (SaaS category) migration." Thesis, Bournemouth University, 2017. http://eprints.bournemouth.ac.uk/29907/.

Full text
Abstract:
Cloud computing offers an innovative business model to enterprise IT services consumption and delivery. However, vendor lock-in is recognised as being a major barrier to the adoption of cloud computing, due to lack of standardisation. So far, current solutions and efforts tackling the vendor lock-in problem have been confined to/or are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem existing in the cloud environment. Consequently, customers are unaware of proprietary standards which inhibit interoperability and portabil
APA, Harvard, Vancouver, ISO, and other styles
10

Vepuri, Harish, and Mohsin Rahman. "IMPLICATIONS OF CLOUD COMPUTING IN IT ORGANIZATIONS." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH. Forskningsmiljö Informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-16989.

Full text
Abstract:
Information technology (IT) in the recent decades has showcased immense evolution. This evolution has impacted not only the technological sector of the society but also the socio-political and economic sectors. One such archetype that has gained popular momentum in the recent years is cloud computing. Still in its developmental stages, cloud computing is the latest offspring of computing services and has invariably challenged the traditional aspects of computing services across the IT Organizations in the world. Thus, adopted by a number of developed as well as developing countries, cloud comp
APA, Harvard, Vancouver, ISO, and other styles
11

Ipland, Frederick Ferdinand. "An investigation to determine incremental risks to software as a service from a user’s perspective." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/18086.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2011.<br>ENGLISH ABSTRACT: Software as a Service (SaaS) – which is a deployment model of cloud computing – is a developing trend in technology that brings with it new potential opportunities and consequently potential risk to enterprise. These incremental risks need to be identified in order to assist in risk management and therefore information technology (IT) governance. IT governance is a cornerstone of enterprise-wide corporate governance. For many entities corporate governance has become a statutory requirement, due to the implementation of l
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Hassany, Ibrahim. "Applying the ENISA IT Risk Assessment for Cloud Computing on Small & Medium Enterprises. A Case Study of Policy/Organizational, Technical and Legal Risks." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Annamalai, Neelambari. "Information Security Guidelines for Organizations Intending to Adopt Cloudsourcing." Thesis, KTH, Data- och systemvetenskap, DSV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155453.

Full text
Abstract:
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also
APA, Harvard, Vancouver, ISO, and other styles
14

Elrajeh, Dima, and Marwan Issaks. "Bekymmer och lösningar för att lagra data i moln." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-67248.

Full text
Abstract:
Syftet med denna tekniska rapport är att studera följande aspekter: ekonomiska, återanvändning av kod och tidsåtgång för att publicera osv till flera molntjänstleverantörer för att uppnå bättre redundans. Webapplikationen kommer att publiceras till Azure, Amazon Cloud och Google Cloud. Avhandlingen täcker de vanligaste problemen som företag kan stöta på när de ska migrera sin verksamhet till molnet. De interna och yttre hot som datakorruption, skadlig insider, osäker autentisering i API: er, beteendeavbrott, dataöverträdelser, fysiska skador på datacenter och befintliga lösningar diskuteras dj
APA, Harvard, Vancouver, ISO, and other styles
15

Hultman, Erik, and Jerri Kangasniemi. "Molnets popularitet i organisationer trots kända risker : En fallstudie om vilka faktorer som motiverat en organisation att övergå till molnet som IS-infrastruktur." Thesis, Linköpings universitet, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131629.

Full text
Abstract:
Antalet företag som använder någon form av molnbaserade affärssystem växer ständigt och molnbaserade tjänster innebär ofta stora ekonomiska fördelar kontra ett traditionellt affärssystem, i och med att det dramatiskt minskar kostnader i form av stora investeringar såsom hårdvara och infrastruktur. Molnbaserade system är dock inte utan kontroverser med, i media, välrapporterade attacker som skett de senaste åren där stora företag som Apple, Target, Home Depot, Sony och det amerikanska skatteverkets (IRS) molnbaserade system varit måltavlor. Därför har vi i den här interpretativa fallstudien val
APA, Harvard, Vancouver, ISO, and other styles
16

Emma, Lindgren, and Rosén Kajsa. "Riskhantering vid ett systembyte." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20243.

Full text
Abstract:
I och med den teknologiska utvecklingen som sker i dagens samhälle blir hotellbranschen mer digitaliserad. Riskhantering får därför en större plats i organisationer som implementerar POS-system. Då dessa system konstrueras på många olika sätt och varierar i komplexitet bildas risker. Studien visar att det inte finns ett specifikt och korrekt tillvägagångssätt för att riskhanteringen ska bli fulländad. Hotellet behöver därför en övergripande strategi för hur risker ska hanteras för att överleva på längre sikt. Syftet med studien var att ta fram ett förslag på hur riskhantering kan organiseras v
APA, Harvard, Vancouver, ISO, and other styles
17

Adamsson, Kevin, and Fredrik Forsberg. "Riskhantering av molnbaserade affärssystem : En studie inom bilhandeln." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96727.

Full text
Abstract:
Titel: Riskhantering av molnbaserade affärssystem Författare: Fredrik Forsberg &amp; Kevin Adamsson Handledare: Pia Nylinder Examinator: Petter Boye Kurs: Företagsekonomi, Kandidatuppsats inom ekonomistyrning/redovisning Kurskod: 2FE75E Frågeställning: Hur arbetar företag inom bilförsäljningsbranschen med riskhanteringen av molnbaserade affärssystem? Syfte: Studiens syfte är att undersöka vilka risker molnbaserade affärssystem medför och hur företag inom bilhandeln arbetar för att hantera riskerna. Metod: För att uppfylla studiens mål har vi använt oss av den abduktiva ansatsen. Semistrukture
APA, Harvard, Vancouver, ISO, and other styles
18

Guillaume, Fumeaux. "Public Software as a Service a Business-Driven Guidance for Risk Control." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60510.

Full text
Abstract:
Because cloud computing adoption grows day-by-day, it is essential for theexecutives of a company to be able to rely on a risks management guidanceto fully grasp all the aspects concerning cloud computing security.The concerns of the industry, the security standards, the official guidelines,and the European laws about the security when using cloud serviceshave been analyzed. The risks, the measures, and the obligations have beengathered. This paper, with all these information collected, describes how torun a risk management for public SaaS security keeping a business-drivenmindset. While runni
APA, Harvard, Vancouver, ISO, and other styles
19

Denys, Paul. "Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5726.

Full text
Abstract:
The emergence and subsequent growth of Cloud computing has brought with it a great deal of change in the manner in which the world undertakes to compute and store information. This new technology has brought with it immense possibilities as far as processing of information and the pooling of resources is concerned. This potential has also been noticed by the public sector, as Governments all over the world have undertaken to introduce what has come to be known as e-Government, the provisioning of Government services and communications via Web based applications, rather than the traditional mea
APA, Harvard, Vancouver, ISO, and other styles
20

Zogaj, Drilon. "Riskhantering för molnbaserade affärssystem i stora organisationer : En studie om hur stora organisationer hanterar säkerhetsrisker som kan uppstå vid nyttjandet av molnbaserade affärssystem." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41338.

Full text
Abstract:
Framväxten av molntjänster är en trend som påverkar organisationer i allt större utsträckning vilket anses vara framtiden inom informationsteknik. Idag migrerar stora organisationer i allt större grad sina affärskritiska affärssystem till molnet, trots att det är en av de mest riskabla, kostsamma och tidskrävande IT-investering som en organisation någonsin kan göra. Molnbaserade affärssystem kan medföra fördelar men också säkerhetsrisker som exempelvis att lagra organisationens data hos tredjeparts-leverantörer. Säkerhetsrisker kan inte elimineras, utan de behöver hanteras och reduceras. Denna
APA, Harvard, Vancouver, ISO, and other styles
21

Skystedt, Sebastian. "Faktorer som påverkar en framgångsrik övergång från lokalt lagrade system till molnbaserade IT-system ur tre aktörers perspektiv : En intervjustudie ur kund-, projektgrupp- och systemimplementatörsperspektiv." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-73312.

Full text
Abstract:
I takt med att världen digitaliseras och att allt fler företag börjar upptäcka fördelarna med molnbaserade IT-system, så misslyckas fortfarande hela 2/3 av alla IT-projekt trots att liknande projekt har gjorts många gånger förut. Denna kandidatuppsats har som syfte identifiera, beskriva och förklara de faktorer som påverkar en övergång från dagens lokalt lagrade system till molnbaserade IT-system, ur kund-, projektgrupp- och systemimplementatörsperspektiv. Primära empiriska data har samlats in genom kvalitativa intervjuer av fyra respondenter. Intervju-erna fokuserade på deras erfarenheter och
APA, Harvard, Vancouver, ISO, and other styles
22

Djurberg, Siri, and Antonia Miocic. "Molntjänster för svenska sjukvårdsorganisationer : En guide för behandling av patientdata." Thesis, Uppsala universitet, Informationssystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356409.

Full text
Abstract:
Molntjänster har redan tagit över flera branscher och sjukvården står näst på tur. Molntjänsters effektiviseringar lockar sjukvården som är en hård pressad bransch både inom kompetens och tid. Samtidigt ansvarar sjukvården över patientdata vilket leder till att de har strikta lagar och regelverk att följa som innebär stora utmaningar. Det kan vara svårt att få en holistisk bild av vad molntjänster kan erbjuda sjukvårdsorganisationen och därför har vårdens syn på molntjänster undersökts och vilka faktorer som präglat deras hantering av patientdata i molnet. En kvalitativ studie har genomförts o
APA, Harvard, Vancouver, ISO, and other styles
23

Faizi, Ana. "Information Security Risk Assessment in Cloud." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76120.

Full text
Abstract:
This research addresses the issue of information security risk assessment (ISRA) on cloud solutions implemented for large companies. Four companies were studied, of which three used cloud services and conducted ISRA, while one provided cloud services and consultancy to customers on ISRA. Data were gathered qualitatively to (1) analyze the cloud using companies’ practices and (2) to identify regularities observed by the cloud providing company. The COAT-hanger model, which focuses on theorizing the practices, was used to study the practices. The results showed that the companies aimed to follow
APA, Harvard, Vancouver, ISO, and other styles
24

Ha, Jonny, and Tim Hallerhed. "Affärssystem som Software as a Service, en populär lösning för små och medelstora organisationer trots risker? : En studie om vad som har betydelse för att organisationer accepterar risker och implementerar SaaS-baserade affärssystem." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-39649.

Full text
Abstract:
Införandet av ny teknologi i organisationer är ett ständigt aktuellt forskningsområde inom affärssystemforskningen. De senaste åren har fenomenet ”Molntjänster”, eller Software as a Service (SaaS), vuxit i popularitet. Många affärssystemleverantörer erbjuder idag sina kunder affärssystem som en molntjänst. SaaS-baserade affärssystem ger organisationer fördelar i jämförelse med traditionella affärssystem som installeras lokalt i organisationen, som exempelvis ökad skalbarhet, bättre åtkomstmöjligheter, samt lägre kostnader för implementation - vilket gör det särskilt intressant för små och mede
APA, Harvard, Vancouver, ISO, and other styles
25

Nguyen, Robin, and Josef Al-khayatt. "The cloud, a security risk? : A study on cloud computing and efficient encryption." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37988.

Full text
Abstract:
After many incidents of cloud services being attacked and personal user data leaking, a secure way of storing data on the cloud would be to encrypt. Even if an attacker would have access to the files he/she would not be able to decrypt the files without the secret key. In this thesis a software will be developed and works by securing user data by encrypting, prior uploading to the cloud. This software is a potential solution to the existing threat. The thesis presents many different methods of encryption but narrows it down to two, AES and XOR, which will be implemented into the software. This
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Afnan Ullah. "Data confidentiality and risk management in cloud computing." Thesis, University of York, 2014. http://etheses.whiterose.ac.uk/13677/.

Full text
Abstract:
Cloud computing can enable an organisation to outsource computing resources to gain economic benefits. Cloud computing is transparent to both the programmers and the users; as a result, it introduces new challenges when compared with previous forms of distributed computing. Cloud computing enables its users to abstract away from low level configuration (configuring IP addresses and routers). It creates an illusion that this entire configuration is automated. This illusion is also true for security services, for instance automating security policies and access control in the Cloud, so that comp
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Bin. "Risk informed service level agreement for cloud brokerage." Thesis, University of Surrey, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580347.

Full text
Abstract:
The use of distributed computing systems, including Grids and Compute Utilities, and now Clouds, becomes a consideration for businesses hoping to manage start-up costs and times, as well as reduce the physical and environmental footprint of infrastructures. Instead of purchasing and maintaining hardware and software, organisations and individuals can take advantage of pay-per- use (utility) models that relate directly to their requirements of infrastructures, platforms and software. However, such metered services are not widely adopted yet due to the lack of assurance of Quality of Service (Qo
APA, Harvard, Vancouver, ISO, and other styles
28

Melton, Timothy Allen. "Modeling unconfined vapor cloud explosions for risk assessment calculations /." Full-text version available from OU Domain via ProQuest Digital Dissertations, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Maghrabi, Louai. "Novel game theoretic frameworks for security risk assessment in cloud environments." Thesis, Kingston University, 2017. http://eprints.kingston.ac.uk/41956/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Goettelmann, Elio. "Risk-aware Business Process Modelling and Trusted Deployment in the Cloud." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0144/document.

Full text
Abstract:
L’essor du Cloud Computing, permettant de partager les coûts et les ressources au travers de la virtualisation, présage une interconnexion dynamique et flexible entre entreprises et fournisseurs. Cependant, cette mise en commun de ressources, données et savoir-faire implique de nouvelles exigences en termes de sécurité. En effet, le manque de confiance dans les structures du Cloud est souvent vu comme un frein au développement de tels services. L’objectif de cette thèse est d’étudier les concepts d’orchestration de services, de confiance et de gestion des risques dans le contexte du Cloud. La
APA, Harvard, Vancouver, ISO, and other styles
31

Goettelmann, Elio. "Risk-aware Business Process Modelling and Trusted Deployment in the Cloud." Electronic Thesis or Diss., Université de Lorraine, 2015. http://www.theses.fr/2015LORR0144.

Full text
Abstract:
L’essor du Cloud Computing, permettant de partager les coûts et les ressources au travers de la virtualisation, présage une interconnexion dynamique et flexible entre entreprises et fournisseurs. Cependant, cette mise en commun de ressources, données et savoir-faire implique de nouvelles exigences en termes de sécurité. En effet, le manque de confiance dans les structures du Cloud est souvent vu comme un frein au développement de tels services. L’objectif de cette thèse est d’étudier les concepts d’orchestration de services, de confiance et de gestion des risques dans le contexte du Cloud. La
APA, Harvard, Vancouver, ISO, and other styles
32

Battelli, Alessandro. "Il Problema della Sicurezza nel Cloud Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4797/.

Full text
Abstract:
Il termine cloud ha origine dal mondo delle telecomunicazioni quando i provider iniziarono ad utilizzare servizi basati su reti virtuali private (VPN) per la comunicazione dei dati. Il cloud computing ha a che fare con la computazione, il software, l’accesso ai dati e servizi di memorizzazione in modo tale che l’utente finale non abbia idea della posizione fisica dei dati e la configurazione del sistema in cui risiedono. Il cloud computing è un recente trend nel mondo IT che muove la computazione e i dati lontano dai desktop e dai pc portatili portandoli in larghi data centers. La definizione
APA, Harvard, Vancouver, ISO, and other styles
33

Khajeh-Hosseini, Ali. "Supporting system deployment decisions in public clouds." Thesis, University of St Andrews, 2013. http://hdl.handle.net/10023/3412.

Full text
Abstract:
Decisions to deploy IT systems on public Infrastructure-as-a-Service clouds can be complicated as evaluating the benefits, risks and costs of using such clouds is not straightforward. The aim of this project was to investigate the challenges that enterprises face when making system deployment decisions in public clouds, and to develop vendor-neutral tools to inform decision makers during this process. Three tools were developed to support decision makers: 1. Cloud Suitability Checklist: a simple list of questions to provide a rapid assessment of the suitability of public IaaS clouds for a spec
APA, Harvard, Vancouver, ISO, and other styles
34

Palhares, André Vitor de Almeida. "Probabilistic Risk Assessment in Clouds: Models and Algorithms." Universidade Federal de Pernambuco, 2012. https://repositorio.ufpe.br/handle/123456789/10423.

Full text
Abstract:
Submitted by Pedro Henrique Rodrigues (pedro.henriquer@ufpe.br) on 2015-03-04T17:17:29Z No. of bitstreams: 2 dissert-avap.pdf: 401311 bytes, checksum: 5bd3f82323bd612e8265a6ab8a55eda0 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)<br>Made available in DSpace on 2015-03-04T17:17:29Z (GMT). No. of bitstreams: 2 dissert-avap.pdf: 401311 bytes, checksum: 5bd3f82323bd612e8265a6ab8a55eda0 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2012-03-08<br>Cloud reliance is critical to its success. Although fault-tolera
APA, Harvard, Vancouver, ISO, and other styles
35

Pauley, Wayne A. Jr. "An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/271.

Full text
Abstract:
Companies offering services on the Internet have led corporations to shift from the high cost of owning and maintaining stand-alone, privately-owned-and-operated infrastructure to a shared infrastructure model. These shared infrastructures are being offered by infrastructure service providers which have subscription, or pay-on-demand, charge models presenting compute and storage resources as a generalized utility. Utility based infrastructures that are run by service providers have been defined as "cloud computing" by the National Institute of Standards and Technology. In the cloud computing m
APA, Harvard, Vancouver, ISO, and other styles
36

Boström, Ludvig. "Reducing cost of volatile risk estimates on financial instruments in a cloud environment." Thesis, Umeå universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149609.

Full text
Abstract:
Performing high accuracy risk calculations on financial instruments is a computationally heavy task. Since a day can contain a lot of different events that change the stock prices, it is important that these risk calculations are done in real time. Deploying a system to calculate real time risk in a cloud environment would result in high costs because of the heavy calculations that needs to be performed. This thesis is a practical continuation of a previous master thesis written by Sara Ekman [1]. Ekman proposed different strategies to reduce the amount of recalculations while still having rea
APA, Harvard, Vancouver, ISO, and other styles
37

Etsebeth, Eugene Everard. "Trialability, perceived risk and complexity of understanding as determinants of cloud computing services adoption." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/29623.

Full text
Abstract:
In 2011 one-third of South African organisations did not intend to adopt cloud computing services because IT decision-maker lacked understanding of the related concepts and benefits (Goldstuck, 2011). This research develops a media-oriented model to examine the adoption of these services in South Africa. The model uses the technology acceptance model (TAM) and innovation diffusion theory (IDT) to develop variables that are considered determinants of adoption including trialability, complexity of understanding, perceived risk, perceived ease of use and perceived usefulness.An electronic survey
APA, Harvard, Vancouver, ISO, and other styles
38

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Full text
Abstract:
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination
APA, Harvard, Vancouver, ISO, and other styles
39

Kamongi, Patrick. "Ontology Based Security Threat Assessment and Mitigation for Cloud Systems." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404576/.

Full text
Abstract:
A malicious actor often relies on security vulnerabilities of IT systems to launch a cyber attack. Most cloud services are supported by an orchestration of large and complex systems which are prone to vulnerabilities, making threat assessment very challenging. In this research, I developed formal and practical ontology-based techniques that enable automated evaluation of a cloud system's security threats. I use an architecture for threat assessment of cloud systems that leverages a dynamically generated ontology knowledge base. I created an ontology model and represented the components of a cl
APA, Harvard, Vancouver, ISO, and other styles
40

Hammadi, Adil Mumtaz. "A methodology for trust and risk mash up for enhanced business intelligence in cloud environment." Thesis, Curtin University, 2014. http://hdl.handle.net/20.500.11937/256.

Full text
Abstract:
With the advancement of cloud computing, enterprises are moving their IT infrastructure to clouds. However, in adopting cloud services, Quality of Service (QoS) concerns need to be addressed for SLA management. In this thesis, an SLA management framework from a consumer’s point of view is proposed that first selects a trustworthy service provider who is capable of providing the requested service; and then monitors the performance of service delivery to ensure the quality of service.
APA, Harvard, Vancouver, ISO, and other styles
41

Enoch, John. "Application of Decision Analytic Methods to Cloud Adoption Decisions." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-25560.

Full text
Abstract:
This thesis gives an example of how decision analytic methods can be applied to choices in the adoption of cloud computing. The lifecycle of IT systems from planning to retirement is rapidly changing. Making a technology decision that can be justified and explained in terms of outcomes and benefits can be increasingly challenging without a systematic approach underlying the decision making process. It is proposed that better, more informed cloud adoption decisions would be taken if organisations used a structured approach to frame the problem to be solved and then applied trade-offs using an a
APA, Harvard, Vancouver, ISO, and other styles
42

Ek, Mona. "Risker vid byte av molntjänstleverantör : och hur dessa risker minimeras." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-68923.

Full text
Abstract:
Molntjänster är något som på senare år blivit allt mer populärt. Det finns många fördelar med användandet av molntjänster, så som flexibelt arbete och rörliga kostnader. Vilka risker finns det då när en kund går från en molntjänstleverantör till en annan? I denna studie identifieras och analyseras olika risker vid byte av molntjänstleverantör. Studien undersöker även vilka åtgärder som kan utföras för att minimera dessa risker. Under studien utförs tre olika intervjuer med respondenter som har olika roller inom olika organisationer. Resultatet från intervjuerna analyseras därefter mot tidigare
APA, Harvard, Vancouver, ISO, and other styles
43

Ahmed, Nacer Amina. "Contributions au déploiement sécurisé de processus métiers dans le cloud." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0013/document.

Full text
Abstract:
L’évolution et l’accroissement actuels des technologies amènent les entreprises à vouloir se développer plus rapidement afin de rester compétitives et offrir des services à la pointe de la technologie, répondant aux besoins du marché. En effet, les entreprises étant sujettes à des changements assez fréquents requièrent un haut niveau de flexibilité et d’agilité. La gestion des processus métiers (BPM) leur permet dans ce sens de mieux appréhender et gérer leurs processus. Par ailleurs, l’apparition du Cloud Computing et de tous ses bénéfices (flexibilité et partage, coût optimisé, accessibilité
APA, Harvard, Vancouver, ISO, and other styles
44

Ahmed, Nacer Amina. "Contributions au déploiement sécurisé de processus métiers dans le cloud." Electronic Thesis or Diss., Université de Lorraine, 2019. http://www.theses.fr/2019LORR0013.

Full text
Abstract:
L’évolution et l’accroissement actuels des technologies amènent les entreprises à vouloir se développer plus rapidement afin de rester compétitives et offrir des services à la pointe de la technologie, répondant aux besoins du marché. En effet, les entreprises étant sujettes à des changements assez fréquents requièrent un haut niveau de flexibilité et d’agilité. La gestion des processus métiers (BPM) leur permet dans ce sens de mieux appréhender et gérer leurs processus. Par ailleurs, l’apparition du Cloud Computing et de tous ses bénéfices (flexibilité et partage, coût optimisé, accessibilité
APA, Harvard, Vancouver, ISO, and other styles
45

Sachdeva, Kapil. "Cloud computing : security risk analysis and recommendations." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-12-4592.

Full text
Abstract:
Cloud computing is here to stay and is the natural progression in the evolution of our computing and collaboration needs. The easy availability of computing infrastructures is motivating a new breed of entrepreneurs to realize their ideas and deliver innovations to masses. These innovations, however, have some serious security weaknesses. If not taken into account, these weaknesses could prove fatal for an organization’s reputation and existence. This thesis explains the potential risks associated with various types of cloud computing technologies and recommends methods to mitigate them.<br>te
APA, Harvard, Vancouver, ISO, and other styles
46

Ferri, Luca. "Cloud computing for Italian SMEs: risks, benefits and open issues"." Tesi di dottorato, 2015. http://www.fedoa.unina.it/10115/1/Tesi%20dottorato%20cloud%20computing%20for%20italian%20SMEs%20benefits%20risks%20and%20open%20issues.pdf.

Full text
Abstract:
In the last few years, information and communication technologies (ICT) become increasingly important for enterprises. The constant intensification of technological needs, combined with the market renewal generated an increase in requests for information services and, as a consequence, an increase of the number of servers used in the companies data centers. This phenomenon generated a sharp increase in costs for companies that, not always, a corresponding improvement in terms of effectiveness and efficiency. More recently, companies approached to virtualization as data storage technique. The r
APA, Harvard, Vancouver, ISO, and other styles
47

Wu, Wei-Ling, and 吳瑋菱. "A Research of Risks Involving the Outsourcing of Government’s Cloud Information Technology." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/60582162631749892471.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>103<br>Currently,there are many studies about the outsourcing of information technology. However, in-depth discussion is somewhat lacking in terms of the risks involving the outsourcing of government’s cloud information technology, thus, this study attempts to discuss this topic. This study explores the other related researches to summarize the potential risk dimensions involving the outsourcing of government’s information technology on the cloud: demand, contractors’ project management, contractor’s cloud computing technology, contractors’ experience on outsourcing
APA, Harvard, Vancouver, ISO, and other styles
48

An, Cong-Syuan, and 安從瑄. "Employing the Grey Relational Analysis to Identify and Evaluate Cloud Computing Risks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/64575880360731227412.

Full text
Abstract:
碩士<br>實踐大學<br>財務金融學系碩士班<br>101<br>Cloud computing will provide the basic levels of computing services that are considered essential to meet the everyday needs of the general community, similar to water, gas, telephone, and electrical utilities, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the grey relational analysis (GRA) were employed to identify and evaluate risks of cloud computing. Researc
APA, Harvard, Vancouver, ISO, and other styles
49

VIJAYAN, NAIR ASWATHY. "Learning about marine cloud brightening: detectability of field experiments, benefits and risks of implementation." 2017. https://ul.qucosa.de/id/qucosa%3A21085.

Full text
Abstract:
The main objectives of the thesis are to learn about the detection of a hypothetical marine cloud brightening (MCB) field experiment and to assess the benefits and risks of an actual implementation using model simulations. The first aim of the thesis is to assess the detectability of MCB from the natural variability of clouds using satellite data. The analysis uses two approaches, i) an analytical method, assessing the radiative forcing by aerosol-cloud interactions for an idealised perturbation of the droplet concentration and ii) a stochastic method, including the radiative forcing and the c
APA, Harvard, Vancouver, ISO, and other styles
50

YEH, YA-HUI, and 葉雅蕙. "Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/08676042507321188091.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>105<br>A "Cloud Platform" is resource sharing through Internet access that supports users’ on-demand computing resources based on the service types provided by the Cloud Service Provider (CSP). Hence, the security issues derived from cloud platforms are more serious, and this identifiable vulnerability risk classifies the threats path and identifies and assesses the possible attack path. Therefore, this paper utilizes the basis of Extended Attack Tree (EAT) Analysis and further proposes the Novel Attack Tree (NAT) Analysis scheme to calculate the threats and vulnerabili
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!