To see the other types of publications on this topic, follow the link: Web Applications; Storage; Security.

Journal articles on the topic 'Web Applications; Storage; Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Web Applications; Storage; Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lyba, M. V., and L. Uhryn. "MODERN TOOLS FOR SECURITY TESTING FROM OWASP." Bulletin of Lviv State University of Life Safety 22 (December 28, 2020): 18–22. http://dx.doi.org/10.32447/20784643.22.2020.03.

Full text
Abstract:
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study. As a result, most of the data stored on personal computers, company servers, and cloud storage needs protection from cyberattacks. The problem of cybersecurity at the moment is incredibly relevant due to the hacking of cryptocurrencies, websites of ministries, bitcoin wa
APA, Harvard, Vancouver, ISO, and other styles
2

Xie, Guo Bo, and Bing Ying Yao. "The Fingerprint Identification Technology is Applied to the Application Research of Web Cloud Storage Safety Certification." Applied Mechanics and Materials 536-537 (April 2014): 161–67. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.161.

Full text
Abstract:
In view of the authentication model based on token and password of traditional web cloud storage easily is forgotten or theft that raise questions about identity theft. This paper proposes a identity authentication scheme of web cloud storage based on fingerprint identification. Using the identity authentication model of fingerprint identification to verify web cloud storage users that satisfy people to the web of cloud storage security, reliability and convenience of the proposed requirements, effectively solve the problem of the resource of unauthorized access. The paper put forward three la
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Lin Na. "Research and Application of Web Database Security Technology." Applied Mechanics and Materials 380-384 (August 2013): 2306–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2306.

Full text
Abstract:
With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student.
APA, Harvard, Vancouver, ISO, and other styles
4

Tofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.

Full text
Abstract:
AbstractExcess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to educ
APA, Harvard, Vancouver, ISO, and other styles
5

Srinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.

Full text
Abstract:
Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficienc
APA, Harvard, Vancouver, ISO, and other styles
6

Patel, Iishi, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, and Pragati Mehra. "Securing Electronic Healthcare Records in Web Applications." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 236–42. http://dx.doi.org/10.35940/ijeat.e2781.0610521.

Full text
Abstract:
In such an unfortunate situation of a medical emergency, a lot of people tend to lose their lives which can be a result of misplaced/delayed paperwork. Thus it is essential to have the patient’s medical record history before going into major surgery and it is often unavailable at the required time due to the chain of communication between different hospitals. As a possible solution to this problem we propose a central chain of all medical records of a patients in an electronic format. The electronic health records (EHRs) are patient-centered, real-time records that make information available t
APA, Harvard, Vancouver, ISO, and other styles
7

Vivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.

Full text
Abstract:
In today’s internet applications such as some real time application services like core banking and other public service oriented application have been major issue in authentication of user specification. To perform online dictionary attacks, passwords have been used for security and authentication mechanism. Present days, hacking of databases on web oriented applications is unavoidable to access them easily. Data maintenance is a complex task in internet applications. To solve these type of problems in internet applications, in this paper, we proposed a novel Integrated and Dynamic CAPTCHA (Co
APA, Harvard, Vancouver, ISO, and other styles
8

Shinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (2021): 189. http://dx.doi.org/10.3390/joitmc7030189.

Full text
Abstract:
Nowadays, open innovations such as intelligent automation and digitalization are being adopted by every industry with the help of powerful technology such as Artificial Intelligence (AI). This evolution drives systematic running processes, involves less overhead of managerial activities and increased production rate. However, it also gave birth to different kinds of attacks and security issues at the data storage level and process level. The real-life implementation of such AI-enabled intelligent systems is currently plagued by the lack of security and trust levels in system predictions. Block
APA, Harvard, Vancouver, ISO, and other styles
9

Kellezi, Deina, Christian Boegelund, and Weizhi Meng. "Securing Open Banking with Model-View-Controller Architecture and OWASP." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/8028073.

Full text
Abstract:
In 2015, the European Union passed the PSD2 regulation, with the aim of transferring ownership of bank accounts to the private person. As a result, Open Banking has become an emerging concept, which provides third-party financial service providers open access to bank APIs, including consumer banking, transaction, and other financial data. However, such openness may also incur many security issues, especially when the data can be exposed by an API to a third party. Focused on this challenge, the primary goal of this work is to develop one innovative web solution to the market. We advocate that
APA, Harvard, Vancouver, ISO, and other styles
10

Ahirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.

Full text
Abstract:
This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users w
APA, Harvard, Vancouver, ISO, and other styles
11

Arunarani, Ar, and D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases." International Journal of Intelligent Information Technologies 14, no. 1 (2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.

Full text
Abstract:
Cloud databases have been used in a spate of web-based applications in recent years owing to their capacity to store big data efficiently. In such a scenario, access control techniques implemented in relational databases are so modified as to suit cloud databases. The querying features of cloud databases are designed with facilities to retrieve encrypted data. The performance with respect to retrieval and security needs further improvements to ensure a secured retrieval process. In order to provide an efficient secured retrieval mechanism, a rule- and agent-based intelligent secured retrieval
APA, Harvard, Vancouver, ISO, and other styles
12

Chivukula, Sreerama Prabhu, Rajasekhar Krovvidi, and Aneesh Sreevallabh Chivukula. "Eucalyptus Cloud to Remotely Provision e-Governance Applications." Journal of Computer Networks and Communications 2011 (2011): 1–15. http://dx.doi.org/10.1155/2011/268987.

Full text
Abstract:
Remote rural areas are constrained by lack of reliable power supply, essential for setting up advanced IT infrastructure as servers or storage; therefore, cloud computing comprising an Infrastructure-as-a-Service (IaaS) is well suited to provide such IT infrastructure in remote rural areas. Additional cloud layers of Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) can be added above IaaS. Cluster-based IaaS cloud can be set up by using open-source middleware Eucalyptus in data centres of NIC. Data centres of the central and state governments can be integrated with State Wide Area
APA, Harvard, Vancouver, ISO, and other styles
13

Okoro, R., and S. A. Idowu. "On the Cloud Web services: A Review." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 2 (2013): 1020–27. http://dx.doi.org/10.24297/ijct.v9i2.4166.

Full text
Abstract:
Cloud Computing is a constantly evolving IT generic term used to refer to various IT solutions and services provided via the internet. Precisely, cloud computing can be said to be  the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally; these resources can include applications and services, as well as the infrastructure on which they operate (EDUCAUSE 2009). So instead of spending money on applications and hardware, individuals and businesses have access to same resources without the commitment of ownership to vendors who provide
APA, Harvard, Vancouver, ISO, and other styles
14

Mochammad Rizky Royani and Arief Wibowo. "Web Service Implementation in Logistics Company uses JSON Web Token and RC4 Cryptography Algorithm." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (2020): 591–600. http://dx.doi.org/10.29207/resti.v4i3.1952.

Full text
Abstract:
The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST a
APA, Harvard, Vancouver, ISO, and other styles
15

Gopinath, R., and B. G. Geetha. "An E-learning System Based on Secure Data Storage Services in Cloud Computing." International Journal of Information Technology and Web Engineering 8, no. 2 (2013): 1–17. http://dx.doi.org/10.4018/jitwe.2013040101.

Full text
Abstract:
Abundant reasonable computers, web resources and education content are identified to transform educational usage on-demand in the field of cloud infrastructure. Therefore, there comes a necessity to redesign the educational system to meet the needs better. The appearance of cloud based services supports the creation of latest generation e-learning systems for storing multimedia data within the cloud; it draws attention for academia and research area, which may be able to use high quality of resources. Even though the merits of cloud service are more attractive, the physical possession of users
APA, Harvard, Vancouver, ISO, and other styles
16

THURAISINGHAM, BHAVANI. "WEB INFORMATION MANAGEMENT AND ITS APPLICATION TO ELECTRONIC COMMERCE." International Journal on Artificial Intelligence Tools 08, no. 02 (1999): 107–17. http://dx.doi.org/10.1142/s0218213099000087.

Full text
Abstract:
This paper describes various aspects of web information management with particular emphasis on its application to electronic commerce. We first provide a brief overview of the web. Then we discuss concepts for web database management, as database management is a key part of information management. These include data models and architectures, query processing, transaction management, metadata management, storage issues, and integrity and security. Then we discuss various web information management technologies such as multimedia, visualization, data mining and warehousing, and knowledge managem
APA, Harvard, Vancouver, ISO, and other styles
17

Ravalia, Varun, and Neha Sehrawat. "Vivid analysis of Cloud Computing along with its security issues and challenges." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 458–63. http://dx.doi.org/10.51201/jusst/21/07113.

Full text
Abstract:
In the modern era, technologies are being used by everyone.” Cloud” refers to a collaborative expression for boundless advancements and progression. Cloud computing is a disruptive technology for providing on-demand access to data and applications from anywhere at any time in the world. Cloud computing incorporates various available innovations and technologies like virtualization, bandwidth networks, Web 2.0, browser interfaces, and time-sharing. Cloud computing enables us to share the resources like storage, applications, services, and networks without physically obtaining them. The data is
APA, Harvard, Vancouver, ISO, and other styles
18

Koutelakis, George V., George K. Anastassopoulos, and Dimitrios K. Lymberopoulos. "Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture." International Journal of Telemedicine and Applications 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/271758.

Full text
Abstract:
Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. This paper introduces a modular multiprotocol teleradiology architecture that integrates DICOM and common Internet services (based on web, FTP, and E-mail) into a unique operational domain. The extended WADO service (a web extension of DICOM) and the other proposed services allow access to all levels of the DICOM information hierarchy as opposed to solely Object level. A lightweight client site is considered adequate, because the server site of the architecture provides clients wit
APA, Harvard, Vancouver, ISO, and other styles
19

Chidambaram, Nithya, Pethuru Raj, K. Thenmozhi, and Rengarajan Amirtharajan. "Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique." International Journal of Digital Multimedia Broadcasting 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/8789397.

Full text
Abstract:
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
20

Ballestrero, Sergio, Franco Brasolin, Arturo Sanchez Pineda, Diana Alessandra Scannicchio, and Matthew Shaun Twomey. "Designing a New Infrastructure for ATLAS Online Web Services." EPJ Web of Conferences 245 (2020): 07030. http://dx.doi.org/10.1051/epjconf/202024507030.

Full text
Abstract:
Within the ATLAS detector, the Trigger and Data Acquisition system is responsible for the online processing of data streamed from the detector during collisions at the Large Hadron Collider (LHC) at CERN. The online farm is composed of ~4000 servers processing the data read out from ~100 million detector channels through multiple trigger levels. The capability to monitor the ongoing data taking and all the involved applications is essential to debug and intervene promptly to ensure efficient data taking. The base of the current web service architecture was designed a few years ago, at the begi
APA, Harvard, Vancouver, ISO, and other styles
21

El-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.

Full text
Abstract:
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile computing apps, since in the first model the devices run cloud based web applications
APA, Harvard, Vancouver, ISO, and other styles
22

Mohammed, Ali Abdulwahhab, and Dheyaa Jasim Kadhim. "Analysis of threats and security issues evaluation in mobile P2P networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6435. http://dx.doi.org/10.11591/ijece.v10i6.pp6435-6445.

Full text
Abstract:
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, 
 the secu
APA, Harvard, Vancouver, ISO, and other styles
23

Chihana, Sipiwe, and Jackson Phiri. "Application of IoT in Zambia’s FRA Grain Traceability Process." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (2018): 87. http://dx.doi.org/10.3991/ijes.v6i4.9332.

Full text
Abstract:
<p class="0papersubtitle">with advancement in technology, many sectors have seen growth and improvement in service delivery. Today, many areas such as health, transport and logistics, retailing among others have adopted the use of IoT. Agricultural sector has not been left out on the use of IoT. IoT is defined as a network of interconnected devices which can transfer data efficiently without human involvement. In agriculture, IoT can play a big role in increasing productivity and efficient storage management. Other applications include security, real-time object tracking and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
24

Qiu, Lirong, and Jie Li. "Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security." Complexity 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6254842.

Full text
Abstract:
Multimedia applications in smart electronic commerce (e-commerce), such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. This study addresses the problem of security in e-commerce and proposes a unified framework to analyze the security data. First, to allocate the definite security resources optimally, we build our e-commerce monitoring model as an undirected network, where a monitored node is a vertex of the graph and a connection between vertices is an undirected edge. Moreover, we aim to find a minimal cover for the mo
APA, Harvard, Vancouver, ISO, and other styles
25

Saravanan, A., S. SathyaBama, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "A new framework to alleviate DDoS vulnerabilities in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4163. http://dx.doi.org/10.11591/ijece.v9i5.pp4163-4175.

Full text
Abstract:
In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges,
APA, Harvard, Vancouver, ISO, and other styles
26

Zaineldeen, Samar, and Abdelrahim Ate. "Improved cloud data transfer security using hybrid encryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 521. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp521-527.

Full text
Abstract:
Cloud computing is a model of sophisticated computing which has a strong effect on data innovation. Cloud computing offers remote access to shared computerized assets in the stored cloud. Operationally cloud servers utilize Web services that give enormus advantage to the user in a variety of applications such as banking and finance, storage, social networking and e-mail. Cloud computing accomplishes many of the features interrelated to elasticity, ease of utility, efficiency and performance with low cost. There are a number of potential concerns related to security and privacy since the requir
APA, Harvard, Vancouver, ISO, and other styles
27

Akter, Sworna, Md Alamgir Hossain, and Md Mojibur Rahman Redoy Akanda. "A Noble Security Analysis of Various Distributed Systems." International Journal of Engineering, Science and Information Technology 1, no. 2 (2021): 62–71. http://dx.doi.org/10.52088/ijesty.v1i2.101.

Full text
Abstract:
Distributed systems increased the performance of a system by allowing applications to be processed in parallel. It helps us to share resources like printers, computers, storage facilities, data, files, web pages, networks, and thus it reduces the cost by shaing a single resource among several users instead of multiple resources. Since multiple machines communicate with each other through the network so they can be easily affected by the attacker and the full system should be corrupted. Users can access remote and local resources but they also may not aware of which machines their processes are
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Rongxu, Wenquan Jin, and Dohyeun Kim. "Microservice Security Agent Based On API Gateway in Edge Computing." Sensors 19, no. 22 (2019): 4905. http://dx.doi.org/10.3390/s19224905.

Full text
Abstract:
Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and priv
APA, Harvard, Vancouver, ISO, and other styles
29

Fardinpour, Mojgan, Alireza Sadeghi Milani, and Monire Norouzi. "Towards techniques, challenges and efforts of software as a service layer based on business applications in cloud environments." Kybernetes 49, no. 12 (2020): 2993–3018. http://dx.doi.org/10.1108/k-07-2019-0520.

Full text
Abstract:
Purpose Cloud computing is qualified to present proper limitless storage and computation resources to users as services throughout the internet. Software as a service (SaaS) layer is the key paradigm perspective in the software layer of the cloud computing. SaaS is connected by business applications to access consumers on existing public, private and hybrid cloud models. This purpose of this paper is to present a discussion and analysis on the SaaS layer based on business applications in the cloud environment in form of a classical taxonomy to recognize the existing techniques, challenges and
APA, Harvard, Vancouver, ISO, and other styles
30

Jalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.

Full text
Abstract:
Abstract Motivation Large biomedical datasets, such as those from genomics and imaging, are increasingly being stored on commercial and institutional cloud computing platforms. This is because cloud-scale computing resources, from robust backup to high-speed data transfer to scalable compute and storage, are needed to make these large datasets usable. However, one challenge for large-scale biomedical data on the cloud is providing secure access, especially when datasets are distributed across platforms. While there are open Web protocols for secure authentication and authorization, these proto
APA, Harvard, Vancouver, ISO, and other styles
31

Abdalrahman, Alameen. "A Cloud Database based on AES 256 GCM Encryption Through Devolving Web application of Accounting Information System." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 216–21. http://dx.doi.org/10.35940/ijrte.e5269.019521.

Full text
Abstract:
The main objective of this research is to use AES 256 GCM encryption and decryption of a web application system database called Accounting Information System (AIS) for achieving more privacy and security in a cloud environment. A cloud environment provides many services such as software, platform, and infrastructure. AIS can use the cloud to store data to achieve accounting with more performance, efficiency, convenience, and cost reduction. On the other hand, cloud environment is not secure because data is kept away from the organization. This paper focuses on how we deal with secure sensitive
APA, Harvard, Vancouver, ISO, and other styles
32

Helebrant, Jan, and Petr Kuča. "SUPPORT TO CITIZEN RADIATION MONITORING OF RADIOACTIVITY IN THE CZECH REPUBLIC—PROJECT RAMESIS." Radiation Protection Dosimetry 186, no. 2-3 (2019): 291–95. http://dx.doi.org/10.1093/rpd/ncz220.

Full text
Abstract:
Abstract Project ‘RAMESIS’, solved by SURO+UTEF+NUVIA, is aimed at the improvement of population safety through supporting Citizen Monitoring in Czechia. Radiation monitoring system at the level of institutions, schools and citizens will be developed and implemented, covering equipment for both fixed-site and mobile monitoring using simple-designed and easy-to-operate detectors, enabling their usage by public and mass-production at acceptable price. The instrumentation includes central application for reception, storage, administration and publication of monitoring results analyzed and present
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Shao Qing, Dong Yue Yu, Jin Yong Cheng, Peng Cheng Wang, and Wei Yu Zhang. "Using J2EE for Medical Image Transmission in a PACS System." Applied Mechanics and Materials 336-338 (July 2013): 2335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2335.

Full text
Abstract:
This paper developed a distributional PACS system conform to the J2EE specification, implemented the DICOM images receiving, storage and archiving on the basis of the DICOM standard. Extract meta information and stored in the database. Visit from different clients of different platforms to look up patient and some management. Web Service provides services functions. The System is a true cross-platform, provides a good background support for remote diagnosis system and the borderless PACS system. Compared to the traditional PACS, the PACS based on J2EE specification is easier to install and man
APA, Harvard, Vancouver, ISO, and other styles
34

Schmitt, D., J. Kass, M. García-Barbero, P. Kantchev, and C. Bescos. "Interoperability and HealthGRID." Methods of Information in Medicine 44, no. 02 (2005): 190–92. http://dx.doi.org/10.1055/s-0038-1633944.

Full text
Abstract:
Summary Objectives: GRID technology, with initiatives like the GGF, will have the potential to allow both competition and interoperability not only among applications and toolkits, but also among implementations of key services.The pyramid of eHealth interoperability should be achieved from standards in communication and data security, storage and processing, to the policy initiatives, including organizational protocols, financing procedures, and legal framework.The open challenges for GRID use in clinical fields illustrate the potential of the combination of grid technologies with medical rou
APA, Harvard, Vancouver, ISO, and other styles
35

Bijolin Edwin, E., and M. Roshni Thanka. "Data Replication Strategies with Load Balancing and Data Migration in Cloud Data Center." Journal of Computational and Theoretical Nanoscience 17, no. 5 (2020): 2024–29. http://dx.doi.org/10.1166/jctn.2020.8843.

Full text
Abstract:
The evolution of Information Systems implies new applications and the need to migrate the data from a previous application to a new one. At the same time, some organizations may need to replicate data from one technology to another one, in order to have backup systems and have a flexible load balanced strategies. The maximal uniform distribution of the load across closer and number of simpler nodes can help managing and providing the big data and large workloads which are more easy to handle. The ultimate goal is to balance the load through cloud and make internet less cloud defendant by havin
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, X. Z., H. M. Zhang, J. H. Zhao, Q. H. Lin, Y. C. Zhou, and J. H. Li. "AN INTERACTIVE WEB-BASED ANALYSIS FRAMEWORK FOR REMOTE SENSING CLOUD COMPUTING." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences II-4/W2 (July 10, 2015): 43–50. http://dx.doi.org/10.5194/isprsannals-ii-4-w2-43-2015.

Full text
Abstract:
Spatiotemporal data, especially remote sensing data, are widely used in ecological, geographical, agriculture, and military research and applications. With the development of remote sensing technology, more and more remote sensing data are accumulated and stored in the cloud. An effective way for cloud users to access and analyse these massive spatiotemporal data in the web clients becomes an urgent issue. In this paper, we proposed a new scalable, interactive and web-based cloud computing solution for massive remote sensing data analysis. We build a spatiotemporal analysis platform to provide
APA, Harvard, Vancouver, ISO, and other styles
37

Andria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.

Full text
Abstract:
<p class="infAbstract"><em>Abstrak : </em></p><p class="infAbstract">Penetration testing (Pentesting) merupakan sebuah metode evaluasi terhadap keamanan pada suatu sistem dan jaringan komputer dengan melakukan suatu pengujian, salah satu metode pengujian yang dapat digunakan adalah SQL Injection. SQL Injection merupakan suatu teknik hacking dengan fokus pengujian pada database sebagai media penyimpanan data pada sistem. Tool yang digunakan pada penelitian ini ialah SQLMap yang merupakan tool open source yang dapat menganalisa, mendeteksi dan melakukan exploit (seb
APA, Harvard, Vancouver, ISO, and other styles
38

Khoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, et al. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.

Full text
Abstract:
Smart homes are an element of developing smart cities. In recent years, countries around the world have spared no effort in promoting smart cities. Smart homes are an interesting technological advancement that can make people’s lives much more convenient. The development of smart homes involves multiple technological aspects, which include big data, mobile networks, cloud computing, Internet of Things, and even artificial intelligence. Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. In the event of eq
APA, Harvard, Vancouver, ISO, and other styles
39

Faisol, Ahmad, and Imam Izzat Muttaqin. "IMPLEMENTASI SENSOR MONITORING PADA JARINGAN WI-FI (HOTSPOT) BERBASIS SNORT." Jurnal Teknologi Informasi dan Terapan 5, no. 2 (2019): 141–46. http://dx.doi.org/10.25047/jtit.v5i2.92.

Full text
Abstract:
The wireless networking application besides giving the simplicity in communication or data exchange, also has a weakness in security system. Every user's tools that connected to the wireless network must be ready towards the appearance of the destruction or attack, because wireless network doesn't have a clear defense track. On this research, monitoring sensor application based on Snort is being suggested as one of the solutions that can be used to help the network arrangement in monitoring the condition of the network and analyze every dangerous package that is in the network. Snort will dete
APA, Harvard, Vancouver, ISO, and other styles
40

Mavodza, Judith. "The impact of cloud computing on the future of academic library practices and services." New Library World 114, no. 3/4 (2013): 132–41. http://dx.doi.org/10.1108/03074801311304041.

Full text
Abstract:
PurposeThe purpose of this paper is to discuss issues involved in navigating the modern information environment where the relevance of cloud computing is unavoidable. This is a way of shifting from the hardware and software demands of storing and organizing data, to information access concerns. That is because with the exponential growth in information sources and all accompanying complexities, the limited capacity of libraries to host their own in its entirety necessitates opting for alternatives in the cloud.Design/methodology/approachA review of current literature about the topic was perfor
APA, Harvard, Vancouver, ISO, and other styles
41

Mohalik, Ramakanta. "Digital Literacy and Its Use by Teacher Trainess at Secondary Level in Odisha." Randwick International of Education and Linguistics Science Journal 1, no. 2 (2020): 242–50. http://dx.doi.org/10.47175/rielsj.v1i2.90.

Full text
Abstract:
Digital devices and applications have been used in schools and teacher education institutes across the globe for teaching learning. All the prospective teachers must be digitally savvy to utilize it in school for teaching, assessment, management and professional development. This study intended to find out the level of digital literacy and its uses among teacher trainees at secondary level. Descriptive research method was followed for undertaking this study. Survey was conducted on sample of 170 trainees selected randomly from teacher education institutes under Utkal University, Odisha, India.
APA, Harvard, Vancouver, ISO, and other styles
42

Yu, Rongrui, Chunqiong Wu, Bingwen Yan, et al. "Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment." Complexity 2021 (May 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/5613599.

Full text
Abstract:
This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language (MySQL) and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store unstructured data such as pictures. These two storage m
APA, Harvard, Vancouver, ISO, and other styles
43

Galvin, Hannah K., and Paul R. DeMuro. "Developments in Privacy and Data Ownership in Mobile Health Technologies, 2016-2019." Yearbook of Medical Informatics 29, no. 01 (2020): 032–43. http://dx.doi.org/10.1055/s-0040-1701987.

Full text
Abstract:
Objectives: To survey international regulatory frameworks that serve to protect privacy of personal data as a human right as well as to review the literature regarding privacy protections and data ownership in mobile health (mHealth) technologies between January 1, 2016 and June 1, 2019 in order to identify common themes. Methods: We performed a review of relevant literature available in English published between January 1, 2016 and June 1, 2019 from databases including PubMed, Google Scholar, and Web of Science, as well as relevant legislative background material. Articles out of scope (as de
APA, Harvard, Vancouver, ISO, and other styles
44

S. Vaithyasubramanian, S. Vaithyasubramanian, and R. Sundararajan. "State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing." International Journal of Pervasive Computing and Communications 17, no. 1 (2021): 121–34. http://dx.doi.org/10.1108/ijpcc-05-2020-0035.

Full text
Abstract:
Purpose Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users. Design/methodology/approach In the technological development of cloud computing, in recent times, it is facing security issues
APA, Harvard, Vancouver, ISO, and other styles
45

Padmanaban, Sujitha, and Muppidathi Priya. "FX Job Recruitment." International Journal on Cybernetics & Informatics 10, no. 2 (2021): 239–49. http://dx.doi.org/10.5121/ijci.2021.100227.

Full text
Abstract:
In this project present a secure and privacy-preserving access control to users, which guarantee any member in a group to anonymously utilize the cloud resource. Moreover, the real identities of data owners can be revealed by the group manager when disputes occur. In this project provide rigorous security analysis, and perform extensive simulations to demonstrate the efficiency of our scheme in terms of storage and computation overhead. Cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-job portal m
APA, Harvard, Vancouver, ISO, and other styles
46

Munawar, Hafiz Suliman, Siddra Qayyum, Fahim Ullah, and Samad Sepasgozar. "Big Data and Its Applications in Smart Real Estate and the Disaster Management Life Cycle: A Systematic Analysis." Big Data and Cognitive Computing 4, no. 2 (2020): 4. http://dx.doi.org/10.3390/bdcc4020004.

Full text
Abstract:
Big data is the concept of enormous amounts of data being generated daily in different fields due to the increased use of technology and internet sources. Despite the various advancements and the hopes of better understanding, big data management and analysis remain a challenge, calling for more rigorous and detailed research, as well as the identifications of methods and ways in which big data could be tackled and put to good use. The existing research lacks in discussing and evaluating the pertinent tools and technologies to analyze big data in an efficient manner which calls for a comprehen
APA, Harvard, Vancouver, ISO, and other styles
47

Gu, Dongxiao, Xuejie Yang, Shuyuan Deng, et al. "Tracking Knowledge Evolution in Cloud Health Care Research: Knowledge Map and Common Word Analysis." Journal of Medical Internet Research 22, no. 2 (2020): e15142. http://dx.doi.org/10.2196/15142.

Full text
Abstract:
Background With the continuous development of the internet and the explosive growth in data, big data technology has emerged. With its ongoing development and application, cloud computing technology provides better data storage and analysis. The development of cloud health care provides a more convenient and effective solution for health. Studying the evolution of knowledge and research hotspots in the field of cloud health care is increasingly important for medical informatics. Scholars in the medical informatics community need to understand the extent of the evolution of and possible trends
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Obermayer, Benedikt, Manuel Holtgrewe, Mikko Nieminen, Clemens Messerschmidt, and Dieter Beule. "SCelVis: exploratory single cell data analysis on the desktop and in the cloud." PeerJ 8 (February 19, 2020): e8607. http://dx.doi.org/10.7717/peerj.8607.

Full text
Abstract:
Background Single cell omics technologies present unique opportunities for biomedical and life sciences from lab to clinic, but the high dimensional nature of such data poses challenges for computational analysis and interpretation. Furthermore, FAIR data management as well as data privacy and security become crucial when working with clinical data, especially in cross-institutional and translational settings. Existing solutions are either bound to the desktop of one researcher or come with dependencies on vendor-specific technology for cloud storage or user authentication. Results To facilita
APA, Harvard, Vancouver, ISO, and other styles
50

Alrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.

Full text
Abstract:
The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!