2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)最新文献

筛选
英文 中文
Cloud computing and how to apply it to IT management 云计算以及如何将其应用于it管理
M. Ahmadipour, Y. Yadollahi, M. Shirzad, K. Mahdavi
{"title":"Cloud computing and how to apply it to IT management","authors":"M. Ahmadipour, Y. Yadollahi, M. Shirzad, K. Mahdavi","doi":"10.1109/ICCCTAM.2012.6488096","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488096","url":null,"abstract":"One of the advantages of cloud computing is to use information technology in an organization so that the employers can take advantage of technology of working from distance, whose benefits are: quickness, saving the time, reducing the costs, and so on. We should consider this era as information age using different and advanced information technology. The history of computing has always been a stream of advances .Mainframes were followed by personal computers and recently by PDAIMobile devices. The advent of cloud computing is one of these events. Cloud Computing is the new face of computing, and a simplest form of model for allocating computing and storage resources (hardware & software) on demand. Cloud computing is a general term for anything that involves delivering hosted services through Internet . It provides remote services with a user's data for managers. In this paper, we try to explain the capabilities of Cloud Computing including its benefits and types and how to apply it to IT Management.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of a REST Web Service to help organizations promote customer involvement in online Corporate Social Responsibility 开发REST Web服务,以帮助组织促进客户参与在线企业社会责任
S. Shetty, S. Sethi, S. Vadivel
{"title":"Development of a REST Web Service to help organizations promote customer involvement in online Corporate Social Responsibility","authors":"S. Shetty, S. Sethi, S. Vadivel","doi":"10.1109/ICCCTAM.2012.6488105","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488105","url":null,"abstract":"Corporate Social responsibility is an initiative taken very seriously by the corporate world, stakeholders as well as society at large. This in turn creates a positive impact both in terms of social awareness in terms of environmental effects, human rights as well as ethical issues This paper discusses the development of a REST Web Service named AskToDonate. It gives companies and organizations an innovative way to conduct their Corporate Social Responsibility (CSR) activities by allowing their customers to choose which projects to donate or contribute to from a list of projects which the company endorses. The companies can collect the users' votes via their websites using the embedded client and forward donations accordingly.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring the impact of Cloud Computing adoption on organizational flexibility: A client perspective 探索采用云计算对组织灵活性的影响:客户端视角
S. S. Bharadwaj, P. Lal
{"title":"Exploring the impact of Cloud Computing adoption on organizational flexibility: A client perspective","authors":"S. S. Bharadwaj, P. Lal","doi":"10.1109/ICCCTAM.2012.6488085","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488085","url":null,"abstract":"Today's turbulent business environment poses a challenge of survival for all organizations. Flexibility to adapt to these changes is the key to success. Role of Information Technology innovations like Cloud Computing cannot be denied in achieving organizational flexibility. Introduction of cloud computing has changed the manner in which Information Technology services are delivered to the client, especially in terms of the IT services as utility. This study aims to understand the cloud computing adoption drivers and its impact on organizational flexibility. Case study approach was used for the study. Responses from ten Indian IT professionals from different organizations of various sectors were analyzed. Results suggest that decision to adopt cloud computing depends on factors like Relative Advantage, Perceived Usefulness, Perceived Ease of Use, Vendor Credibility and organization's Attitude towards Using Technology. The survey also indicates that impact of cloud computing on organizational flexibility can be categorized as economic flexibility, process flexibility, performance flexibility and market flexibility.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127288583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Security issues and control mechanisms in Cloud 云中的安全问题和控制机制
S. Surianarayanan, T. Santhanam
{"title":"Security issues and control mechanisms in Cloud","authors":"S. Surianarayanan, T. Santhanam","doi":"10.1109/ICCCTAM.2012.6488075","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488075","url":null,"abstract":"The responsibility of providing cost-effective, elastic and on-demand access to computing and storage resources lies with the Cloud Service Providers. As for the end-user, it provides an abstraction of reliable and infinite resource availability. Infinite resource availability is based on virtualization technology and availability of a shared pool of computational and storage resources. It is this very nature of the cloud - of being a black box to the end user - that is posing a threat to its faster adoption and growth in the market. Several issues have been raised on the aspects of legal, security and compliance requirements in the public cloud. Legal issues concern with the applicable laws according to the physical location of data. Regulatory issues such as provision of log files provided by the Cloud Service Provider (CSP) for audits. Security issues are concerned with the safety of cloud environment against any form of security attacks. Other major concerns include, but are not limited to - availability, recovery and privacy. Identifying measures and control mechanisms to address and resolve such issues could help in standardizing the Cloud environment from the Cloud Service Provider's end. This paper explores the major issues identified in the Private cloud and the existing control mechanisms.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129689486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Applications of cloud computing for resource sharing in academic libraries 云计算在高校图书馆资源共享中的应用
D. Shivalingaiah, K. N. Sheshadri
{"title":"Applications of cloud computing for resource sharing in academic libraries","authors":"D. Shivalingaiah, K. N. Sheshadri","doi":"10.1109/ICCCTAM.2012.6488067","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488067","url":null,"abstract":"Universities and Colleges are the core of innovation through their advanced research and development. Higher education libraries of different size and type all over the world suffer from common problems such as shrinking budgets, accommodating resources within the budgetary constraints, Countering increased scope of interdisciplinary and multidisciplinary nature of subjects, flexibility associated with the e-data, diminished levels of efficiency, and huge cost involved in managing the entire IT infrastructure in the modern day academic libraries. Libraries are at the threshold of embracing the concept of cloud computing because of its both technological and economic advantages. Resource sharing, among the academic libraries through Cloud will in principle reduce the overall cost and increase the efficiency. It will also enhance the user experience and will help in making the libraries a lot more scalable. In this paper authors have made an attempt to discuss the types, applications, advantages and disadvantages of implementing cloud computing mainly for resource sharing in an academic library environment. The purpose of this article is to look specifically at how cloud computing can be employed by libraries and what are the potential areas need to be considered before moving into a cloud computing solution implementation.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures 识别和分析虚拟化云计算基础设施的安全威胁
S. Brohi, M. Bamiah, M. N. Brohi, R. Kamran
{"title":"Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures","authors":"S. Brohi, M. Bamiah, M. N. Brohi, R. Kamran","doi":"10.1109/ICCCTAM.2012.6488089","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488089","url":null,"abstract":"A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Framework of a national level electronic health record system 国家级电子健康档案系统框架
O. Gul, M. Al-Qutayri, C. Yeun, Q. Vu
{"title":"Framework of a national level electronic health record system","authors":"O. Gul, M. Al-Qutayri, C. Yeun, Q. Vu","doi":"10.1109/ICCCTAM.2012.6488072","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488072","url":null,"abstract":"Electronic health is vital for enabling improved access to health records, and boosting the quality of the health services provided. In this paper, a framework for an electronic health record system is to be developed for connecting a nation's health care facilities together in a network using cloud computing technology. Cloud computing ensures easy access to health records from anywhere and at any time with easy scalability and prompt on demand availability of resources. A hybrid cloud is to adopted in modeling the system and solutions are proposed for the main challenges faced in any typical electronic health record system.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Cloud Computing: Exploring security design approaches in Infrastructure as a Service 云计算:探索基础设施即服务中的安全设计方法
M. Jog, M. Madiajagan
{"title":"Cloud Computing: Exploring security design approaches in Infrastructure as a Service","authors":"M. Jog, M. Madiajagan","doi":"10.1109/ICCCTAM.2012.6488090","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488090","url":null,"abstract":"Cloud computing is a new paradigm that promises to provide businesses with an IT infrastructure that is flexible, inexpensive and easy to use. Despite such promises, cloud computing has not been adopted at a pace that was expected. Among various reasons that prevent its widespread adoption, the most serious issue that Cloud Computing faces concerns its inability to insure data privacy and confidentiality. The fact that the security challenges faced by the Cloud depend on its deployment model as well as delivery model has further aggravated this problem. Hence we need to develop unique solutions to address security risks at various levels in Cloud Computing. This paper presents a survey on the various types of technologies and architectures that seek to achieve trusted cloud computing at Infrastructure as a Service (IaaS) level.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130958455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Broker architecture for Web Service selection using SOAPUI 使用SOAPUI进行Web服务选择的代理体系结构
S. Susila, S. Vadivel, A. Julka
{"title":"Broker architecture for Web Service selection using SOAPUI","authors":"S. Susila, S. Vadivel, A. Julka","doi":"10.1109/ICCCTAM.2012.6488102","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488102","url":null,"abstract":"Web Services are the most emerging distributed applications which can be published and invoked using standardized protocols over the public or private registries. Due to rapid development of the Web, there are numerous functionally similar Web Services available, which made the selection of the Web Service based on functional properties is not reliable. To select the functionally similar Web Service, the non functional criteria such as Quality of Service (QoS) will be considered. However, most of the clients are not experienced enough to acquire the best selection of Web Service based on its described QoS properties. In this paper we are proposing architecture which has broker for a specific functional domain web services. Contacting this broker will assist with analyzed qos of all web services in that functional domain. This broker makes use of SOAPUI software for checking the qos attributes of the web services.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud computing setup for a campus environment 校园环境的云计算设置
N. Kumar, R. Mittal
{"title":"Cloud computing setup for a campus environment","authors":"N. Kumar, R. Mittal","doi":"10.1109/ICCCTAM.2012.6488078","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488078","url":null,"abstract":"Cloud computing is the most feasible solution for the problems like spaces to store the information and computing power. No one in this world has enough space to store all the information available. Cloud computing in form of resource sharing can increase the computing power, mobility of data, huge lot of space etc. In this paper the case of BITS Pilani, Dubai Campus (BPDC) has been considered for the cloud applications. There are some cloud applications available in BPDC, one of them has been discussed (implementation, deployment, security etc.) in depth.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信