Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

The emergence of cloud computing presents a strategic direction for critical infrastructures and promises to have far-reaching effects on their systems and networks to deliver better outcomes to the nations at a lower cost. However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibili...

متن کامل

Advanced Location Prediction Techniques in Mobile Computing

Context-awareness is viewed as one of the most important aspects in the emerging pervasive computing paradigm. Mobile context-aware applications are required to sense and react to changing environment conditions. Such applications, usually, need to recognize, classify and predict context in order to act efficiently, beforehand, for the benefit of the user. Firstly, we propose an efficient spati...

متن کامل

Advanced operations research techniques for multi-constraint QoS routing in internet

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

متن کامل

Evolutionary Computing in Cooperative Multi-agent Environments

The fields of Artificial Intelligence and Artificial Life have both focused on complex systems in which agents must cooperate to achieve certain goals. In our work we examine the performance of the genetic algorithm when applied to systems of this type. That is, we examine the use of population-based evolutionary computing techniques within cooperative multi-agent environments. In extending the...

متن کامل

Multi-Determiner Protection of Private Data in Pervasive Computing Environments

* This research was partially supported by ITRC, # 500/8478 Summary Protection of private data is one of the most challenging issues threatening the success of Pervasive Computing (PC). Regarding the principles of privacy and the vision of pervasive computing, one of the most troublesome problems is how to provide people's control of their data while not distract them to a great extent. A suita...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2013

ISSN: 2158-107X,2156-5570

DOI: 10.14569/ijacsa.2013.040502