Leveraging cloud computing for the semantic web: review and trends
Semantic and cloud computing technologies have become vital elements for develo**
and deploying solutions across diverse fields in computing. While they are independent of …
and deploying solutions across diverse fields in computing. While they are independent of …
DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds
J Povedano-Molina, JM Lopez-Vega… - Future Generation …, 2013 - Elsevier
One of the most important features in Cloud environments is to know the status and the
availability of the physical resources and services present in the current infrastructure. A full …
availability of the physical resources and services present in the current infrastructure. A full …
Semantic web technologies in cloud computing: a systematic literature review
During the last years we have seen a dramatic increase of new Cloud providers,
applications, services, management platforms, data, etc. reaching a level of complexity that …
applications, services, management platforms, data, etc. reaching a level of complexity that …
Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach
In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
encryption, and data decryption due to its minimum key size. The proposed ECC‐based …
Semantic-aware security orchestration in SDN/NFV-enabled IoT systems
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-
Defined Networking (SDN) technologies, thereby strengthening their overall flexibility …
Defined Networking (SDN) technologies, thereby strengthening their overall flexibility …
Multi-tenant attribute-based access control for cloud infrastructure services
Cloud Computing is developed as a new wave of ICT technologies, offering a common
approach to on-demand provisioning of computation, storage and network resources that …
approach to on-demand provisioning of computation, storage and network resources that …
Cloud identity management: A survey on privacy strategies
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …
DYVERSE: dynamic vertical scaling in multi-tenant edge environments
Multi-tenancy in resource-constrained environments is a key challenge in Edge computing.
In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge'environments …
In this paper, we develop 'DYVERSE: DYnamic VERtical Scaling in Edge'environments …
[PDF][PDF] Applications of access control as a service for software security
P Dašić, J Dašić, B Crvenković - International Journal of Industrial …, 2016 - researchgate.net
Cloud technology has been around for some time now and is gaining increased influence in
almost every aspect of information technology services. As a consequence of above stated …
almost every aspect of information technology services. As a consequence of above stated …
A reference architecture for provisioning of tools as a service: meta-model, ontologies and design elements
Software Architecture (SA) plays a critical role in designing, develo** and evolving cloud-
based platforms that can be used to provision different types of services for consumers on …
based platforms that can be used to provision different types of services for consumers on …