• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1672
  • 332
  • 250
  • 173
  • 127
  • 116
  • 52
  • 52
  • 44
  • 44
  • 25
  • 20
  • 19
  • 18
  • 11
  • Tagged with
  • 3350
  • 1656
  • 730
  • 505
  • 439
  • 421
  • 399
  • 337
  • 325
  • 320
  • 316
  • 315
  • 306
  • 265
  • 259
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Cloud Computing : Evaluation, as a platform for Scania Architecture

Siddiqui, Muhammad Anas January 2013 (has links)
Cloud computing has been given a great deal of attention during recent years. Almost all the technology market leaders and leading hosting service providers (like IBM, Microsoft and Verizon) have entered into the Cloud market as Cloud Providers. Cloud computing promises to provide highly available, secure, low cost, agile and highly scalable solution to the consumers. Scania is a global company and one of the world’s leading heavy vehicle manufacturers with 35,000+ employees. All the large organizations such as Scania, aim to constantly update themselves with the latest technology in order to meet their business requirements but, these organizations must always be convinced that there is a strong reason(s) to implement new technology. This research provides the method and criteria in relation to initiating Cloud computing. A number of Scania’s specific business requirements that it is possible to map to the Cloud are addressed in this thesis. The methodology of research is split in two parts. Firstly, the identification of business cases at Scania and their requirements with the Cloud and Secondly, the evaluation and comparison of the functionalities and capabilities of different vendors. The accumulated data is then compared and suitable vendors, according to those business requirements are suggested. This thesis also shares the experience of moving on premise applications to the Cloud. These are Scania specific applications which are currently being hosted in-house. The research also addresses the possibilities of portability between the Cloud providers. Although there is no standardization in relation to Cloud computing, some initiatives such as OpenStack are available and its current position and some application and data migration tools are also discussed. The thesis concludes with a general discussion, recommendations in relation to adapting Cloud computing and selecting the Cloud provider. This recommendation applies to every organization including Scania.
232

Anbieter von Cloud Speicherdiensten im Überblick

Meinel, Christoph, Schnjakin, Maxim, Metzke, Tobias, Freitag, Markus January 2014 (has links)
Durch die immer stärker werdende Flut an digitalen Informationen basieren immer mehr Anwendungen auf der Nutzung von kostengünstigen Cloud Storage Diensten. Die Anzahl der Anbieter, die diese Dienste zur Verfügung stellen, hat sich in den letzten Jahren deutlich erhöht. Um den passenden Anbieter für eine Anwendung zu finden, müssen verschiedene Kriterien individuell berücksichtigt werden. In der vorliegenden Studie wird eine Auswahl an Anbietern etablierter Basic Storage Diensten vorgestellt und miteinander verglichen. Für die Gegenüberstellung werden Kriterien extrahiert, welche bei jedem der untersuchten Anbieter anwendbar sind und somit eine möglichst objektive Beurteilung erlauben. Hierzu gehören unter anderem Kosten, Recht, Sicherheit, Leistungsfähigkeit sowie bereitgestellte Schnittstellen. Die vorgestellten Kriterien können genutzt werden, um Cloud Storage Anbieter bezüglich eines konkreten Anwendungsfalles zu bewerten. / Due to the ever-increasing flood of digital information, more and more applications make use of cost-effective cloud storage services. The number of vendors that provide these services has increased significantly in recent years. The identification of an appropriate service provider requires an individual consideration of several criteria. This survey presents a comparison of some established basic storage providers. For this comparison, several criteria are extracted that are applicable to any of the selected providers and thus allow for an assessment that is as objective as possible. The criteria include factors like costs, legal information, security, performance, and supported interfaces. The presented criteria can be used to evaluate cloud storage providers in a specific use case in order to identify the most suitable service based on individual requirements.
233

Evaluation of cloud-based infrastructures for scalable applications

Englund, Carl January 2017 (has links)
The usage of cloud computing in order to move away from local servers and infrastructure have grown enormously the last decade. The ability to quickly scale capacity of servers and their resources at once when needed is something that can both be a price saver for companies and help them deliver high end products that will function correctly at all times even under heavy load to their customers. To meet todays challenges, one of the strategic directions of Attentec, a software company located in Linköping, is to examine the world of cloud computing in order to deliver robust and scalable applications to their customers. This thesis investigates the usage of cloud services in order to deploy scalable applications which can adapt to usage peaks within minutes.
234

Hantering av legacy-system vid migreringar till molnet : Kvalitativ intervjustudie angående utmaningar vid migreringarav äldre IT-system till molnlösningar inom svenska IT-sektorn

Andersson, Albin, Arfvidsson, Olle January 2020 (has links)
Studien undersöker fenomenet migrering av legacy-system till molnlösningar. Ettlegacy-system är ett föråldrat IT-system som fortfarande använder äldre typer av teknikäven då mer modern teknik finns tillgängligt. Dessa system används vanligtvistillsammans med äldre affärssystem samt inom lager och produktionsmiljöer. Utifrån tidigare forskning på området identifierades det en lucka i litteraturen hursvenska konsultbolag inom IT-sektorn hanterar och genomför migreringar av legacysystem till molnlösningar. Denna undersökning tillämpade en kvalitativ intervjustudiemed semistrukturerad intervjuform och en tematisk analys genomfördes. Litteratursamlades även in kring tidigare dokumenterade utmaningar och metoder för att skapagrundläggande förståelse inom ämnet. Studien ämnade kartlägga vilka utmaningar, metoder och hantering av utmaningar IT konsulter möter i deras arbete. Denna studie identifierar totalt tre tillvägagångssätt förmigreringar, först en förstudie, sedan två olika metodval, Rehost och Replace. Vidareframförs även totalt nio olika utmaningar samt vilka tekniska åtgärder konsulter utför ihanteringen av dessa. Studien bidrar även med att öka antalet studier mot näringslivetgenom att djupare undersöka svenska konsulters arbete med migrering av legacysystem. / This study investigates the phenomenon legacy-system migration to cloud solutions.Legacy-systems are described as an outdated IT-system which still uses older types oftechnology even though more modern technology is available. These systems areusually found in older ERP-systems, as well as in warehouses and productionenvironments. Based on previous research in the field, a gap was identified in the literature on howSwedish consulting companies in the IT-sector handle and implement migrations oflegacy-systems to cloud solutions. This study applied a qualitative interview study withsemi-structured interview form and a thematic analysis was conducted. Literature wasalso collected around previously documented challenges and methods for creating basicunderstanding of the subject. The study aims to identify challenges, methods, and the management of challenges IT consultants face in their work. The study presents a total of three different methods,first a feasibility study on migration, then two different method choices, Rehost andReplace. Furthermore, a total of nine different challenges are presented, as well as whattechnical measures consultants perform in handling them. The study also contributes toincreasing the number of studies towards the industry by examining in more dept thework of Swedish consultants on the migration of legacy-systems.
235

A Cloud Computing Framework for Computer Science Education

Aldakheel, Eman A. 06 December 2011 (has links)
No description available.
236

Hybrid Cloud Migration Challenges. A case study at King

Boronin, Mikhail January 2020 (has links)
Migration to the cloud has been a popular topic in industry and academia in recent years. Despite many benefits that the cloud presents, such as high availability and scalability, most of the on-premise application architectures are not ready to fully exploit the benefits of this environment, and adapting them to this environment is a non-trivial task.Therefore, many organizations consider a gradual process of moving to the cloud with Hybrid Cloud architecture. In this paper, the author is making an effort of analyzing particular enterprise case in cloud migration topics like cloud deployment, cloud architecture and cloud management.This paper aims to identify, classify, and compare existing challenges in cloud migration, illustrate approaches to resolve these challenges and discover the best practices in cloud adoption and process of conversion teams to the cloud.
237

BEST LEADERSHIP PRACTICES OF MULTINATIONAL CORPORATIONS IN THE USE OF AUTOMATED MIGRATION TOOLS IN ADOPTION OF COMMERCIAL CLOUD COMPUTING PLATFORMS: A META-ANALYSIS

Ethan Michael Sneider (10197767) 01 September 2021 (has links)
<p>Transitioning to cloud computing is a complex and major effort for large multinational corporations (MNCs). Automated cloud migration tools (ACMTs) have been developed and are evolving to streamline this process. The potential benefits of their use are reported to be significant in terms of cost, time, and business innovation. Academic research on ACMTs and the best leadership practices for their use has been limited. </p><p> </p><p>The purpose of the research was to identify the best leadership practices of MNCs in the use of automated migration tools for the adoption of commercial cloud computing platforms. Adoption of cloud computing is a major technological shift occurring globally, and is still in early stages of growth. Major providers of commercial cloud computing platforms include technological giants such as Microsoft, Amazon Web Services, Google, Oracle and IBM.</p><p> </p><p>A meta-analysis designed research approach focusing on the triangulation of case studies, cloud computing industry data and trends from cloud service providers (CSP) revealed that best practices of leaders within MNCs fall under three main categories: awareness, impact and actions. Further, it was determined that the ACMTs with the most advanced capabilities do not necessarily equate to faster realization of cloud value for the MNC. </p><p> </p>With the continued development of ACMTs and their growing adoption, further study on the role of automation in cloud migration solution deployment will be critical, as ACMT capabilities will continue to mature. No longer the sole domain of becoming a market leader alone, organizations that utilize ACMTs are increasingly doing so just to maintain competitive parity, as the true differentiator in organizational excellence is now in cloud optimization and not simply just getting to the cloud.
238

Information security, privacy, and compliance models for cloud computing services

Alruwaili, Fahad F. 13 April 2016 (has links)
The recent emergence and rapid advancement of Cloud Computing (CC) infrastructure and services have made outsourcing Information Technology (IT) and digital services to Cloud Providers (CPs) attractive. Cloud offerings enable reduction in IT resources (hardware, software, services, support, and staffing), and provide flexibility and agility in resource allocation, data and resource delivery, fault-tolerance, and scalability. However, the current standards and guidelines adopted by many CPs are tailored to address functionality (such as availability, speed, and utilization) and design requirements (such as integration), rather than protection against cyber-attacks and associated security issues. In order to achieve sustainable trust for cloud services with minimal risks and impact on cloud customers, appropriate cloud information security models are required. The research described in this dissertation details the processes adopted for the development and implementation of an integrated information security cloud based approach to cloud service models. This involves detailed investigation into the inherent information security deficiencies identified in the existing cloud service models, service agreements, and compliance issues. The research conducted was a multidisciplinary in nature, with detailed investigations on factors such as people, technology, security, privacy, and compliance involved in cloud risk assessment to ensure all aspects are addressed in holistic and well-structured models. The primary research objectives for this dissertation are investigated through a series of scientific papers centered on these key research disciplines. The assessment of information security, privacy, and compliance implementations in a cloud environment is described in Chapters two, three, four, and five. Paper 1 (CCIPS: A Cooperative Intrusion Detection and Prevention Framework for Cloud Services) outlines a framework for detecting and preventing known and zero-day threats targeting cloud computing networks. This framework forms the basis for implementing enhanced threat detection and prevention via behavioral and anomaly data analysis. Paper 2 (A Trusted CCIPS Framework) extends the work of cooperative intrusion detection and prevention to enable trusted delivery of cloud services. The trusted CCIPS model details and justifies the multi-layer approach to enhance the performance and efficiency of detecting and preventing cloud threats. Paper 3 (SOCaaS: Security Operations Center as a Service for Cloud Computing Environments) describes the need for a trusted third party to perform real-time monitoring of cloud services to ensure compliance with security requirements by suggesting a security operations center system architecture. Paper 4 (SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services) identifies the necessary cloud security and privacy controls that need to be addressed in the contractual agreements, i.e. service level agreements (SLAs), between CPs and their customers. Papers five, six, seven, and eight (Chapters 6 – 9) focus on addressing and reducing the risk issues resulting from poor assessment to the adoption of cloud services and the factors that influence such as migration. The investigation of cloud-specific information security risk management and migration readiness frameworks, detailed in Paper 5 (An Effective Risk Management Framework for Cloud Computing Services) and Paper 6 (Information Security, Privacy, and Compliance Readiness Model) was achieved through extensive consideration of all possible factors obtained from different studies. An analysis of the results indicates that several key factors, including risk tolerance, can significantly influence the migration decision to cloud technology. An additional issue found during this research in assessing the readiness of an organization to move to the cloud is the necessity to ensure that the cloud service provider is actually with information security, privacy, and compliance (ISPC) requirements. This investigation is extended in Paper 7 (A Practical Life Cycle Approach for Cloud based Information Security) to include the six phases of creating proactive cloud information security systems beginning with initial design, through the development, implementation, operations and maintenance. The inherent difficulty in identifying ISPC compliant cloud technology is resolved by employing a tracking method, namely the eligibility and verification system presented in Paper 8 (Cloud Services Information Security and Privacy Eligibility and Verification System). Finally, Paper 9 (A Case Study of Migration to a Compliant Cloud Technology) describes the actual implementation of the proposed frameworks and models to help the decision making process faced by the Saudi financial agency in migrating their IT services to the cloud. Together these models and frameworks suggest that the threats and risks associated with cloud services are continuously changing and more importantly, increasing in complexity and sophistication. They contribute to making stronger cloud based information security, privacy, and compliance technological frameworks. The outcomes obtained significantly contribute to best practices in ensuring information security controls are addressed, monitoring, enforced, and compliant with relevant regulations. / Graduate / 0984 / 0790 / fahd333@gmail.com
239

Beschreibung, Verarbeitung und Überprüfung clientseitiger Policies für vertrauenswürdige Cloud-Anwendungen

Kebbedies, Jörg 08 February 2018 (has links) (PDF)
Für Geschäftsbereiche mit hohen Anforderungen an Vertraulichkeit und Datenschutz zur Verarbeitung ihrer sensitiven Informationen kann für die Nutzung von Public-Cloud-Technologien keine Benutzerakzeptanz ausgewiesen werden. Die Ursachen dafür erwachsen aus dem inhärenten Strukturkonzept verteilter, begrenzter Verantwortlichkeiten und einem fehlenden Cloud-Anwender-Vertrauen. Die vorliegende Arbeit verfolgt ein Cloud-Anwender orientiertes Vorgehen zur Durchsetzung regelnder Policy-Konzepte, kombiniert mit einem holistischen Ansatz zur Herstellung einer durchgehenden Vertrauensbasis. Der Aspekt Vertrauen erhält eine eigenständige Konzeptualisierung und wird zu einem Cloud-Anwender-Instrument für die Gestaltung vertrauenswürdiger infrastruktureller Eigenschaften entwickelt. Jede weitere Form einer Policy entwickelt ihren verbindlichen regulierenden Wert erst durch eine unlösliche Verbindung mit den hier vorgelegten Konzepten vertrauenswürdiger Entitäten. Ein ontologisch formalisierter Beschreibungsansatz vollzieht die für eine Regulierung notwendige Konzeptualisierung einer domänenspezifischen IT-Architektur und qualifizierender Sicherheitseigenschaften. Eigenständige Konzeptklassen für die Regulierung liefern den Beschreibungsrahmen zur Ableitung integrierter Trust-Policies. Darauf aufbauende Domänenmodelle repräsentieren eine vom Cloud-Anwender definierte Erwartung in Bezug auf ein reguliertes Cloud-Architektur-Design und reflektieren die reale Welt auf Grundlage vertrauenswürdiger Fakten. Vertrauen quantifiziert sich im Ergebnis logischer Schlussfolgerungen und ist Ausdruck zugesicherter Cloud-Sicherheitseigenschaften und geregelter Verhaltensformen.
240

Autonomie, sécurité et QoS de bout en bout dans un environnement de Cloud Computing / Security, QoS and self-management within an end-to-end Cloud Computing environment

Hamze, Mohamad 07 December 2015 (has links)
De nos jours, le Cloud Networking est considéré comme étant l'un des domaines de recherche innovants au sein de la communauté de recherche du Cloud Computing. Les principaux défis dans un environnement de Cloud Networking concernent non seulement la garantie de qualité de service (QoS) et de sécurité mais aussi sa gestion en conformité avec un accord de niveau de service (SLA) correspondant. Dans cette thèse, nous proposons un Framework pour l'allocation des ressources conformément à un SLA établi de bout en bout entre un utilisateur de services Cloud (CSU) et plusieurs fournisseurs de services Cloud (CSP) dans un environnement de Cloud Networking (architectures d’inter-Cloud Broker et Fédération). Nos travaux se concentrent sur les services Cloud de types NaaS et IaaS. Ainsi, nous proposons l'auto-établissement de plusieurs types de SLA ainsi que la gestion autonome des ressources de Cloud correspondantes en conformité avec ces SLA en utilisant des gestionnaires autonomes spécifiques de Cloud. De plus, nous étendons les architectures et les SLA proposés pour offrir un niveau de service intégrant une garantie de sécurité. Ainsi, nous permettons aux gestionnaires autonomes de Cloud d'élargir leurs objectifs de gestion autonome aux fonctions de sécurité (auto-protection) tout en étudiant l'impact de la sécurité proposée sur la garantie de QoS. Enfin, nous validons notre architecture avec différents scénarios de simulation. Nous considérons dans le cadre de ces simulations des applications de vidéoconférence et de calcul intensif afin de leur fournir une garantie de QoS et de sécurité dans un environnement de gestion autonome des ressources du Cloud. Les résultats obtenus montrent que nos contributions permettent de bonnes performances pour ce type d’applications. En particulier, nous observons que l'architecture de type Broker est la plus économique, tout en assurant les exigences de QoS et de sécurité. De plus, nous observons que la gestion autonome des ressources du Cloud permet la réduction des violations, des pénalités et limite l'impact de la sécurité sur la garantie de la QoS. / Today, Cloud Networking is one of the recent research areas within the Cloud Computing research communities. The main challenges of Cloud Networking concern Quality of Service (QoS) and security guarantee as well as its management in conformance with a corresponding Service Level Agreement (SLA). In this thesis, we propose a framework for resource allocation according to an end-to-end SLA established between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) within a Cloud Networking environment (Inter-Cloud Broker and Federation architectures). We focus on NaaS and IaaS Cloud services. Then, we propose the self-establishing of several kinds of SLAs and the self-management of the corresponding Cloud resources in conformance with these SLAs using specific autonomic cloud managers. In addition, we extend the proposed architectures and the corresponding SLAs in order to deliver a service level taking into account security guarantee. Moreover, we allow autonomic cloud managers to expand the self-management objectives to security functions (self-protection) while studying the impact of the proposed security on QoS guarantee. Finally, our proposed architecture is validated by different simulation scenarios. We consider, within these simulations, videoconferencing and intensive computing applications in order to provide them with QoS and security guarantee in a Cloud self-management environment. The obtained results show that our contributions enable good performances for these applications. In particular, we observe that the Broker architecture is the most economical while ensuring QoS and security requirements. In addition, we observe that Cloud self-management enables violations and penalties’ reduction as well as limiting security impact on QoS guarantee.

Page generated in 0.0504 seconds