4th IEEE International Conference on Digital Ecosystems and Technologies 2010
DOI: 10.1109/dest.2010.5610668
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…During this workshop, through interactive discussion and brainstorming, we developed the concepts presented in this paper. To do this, we summarized the GSD challenges and requirements and investigated the potential of SOA based cloud services [47] to address these. We are embarking on further research to understand whether these indeed can be of value to both the industrial and research communities.…”
Section: Methodsmentioning
confidence: 99%
“…During this workshop, through interactive discussion and brainstorming, we developed the concepts presented in this paper. To do this, we summarized the GSD challenges and requirements and investigated the potential of SOA based cloud services [47] to address these. We are embarking on further research to understand whether these indeed can be of value to both the industrial and research communities.…”
Section: Methodsmentioning
confidence: 99%
“…Cloud computing is an on-demand computing service which enables the user to store and get right of entry to their data over the Internet [1]. In brief words, cloud computing is technology, storage provision, and hosting platform combined that can be found on the Internet [2][3][4]. In terms of marketing, it provides services without end user knowledge about where is the physical location at and configuration of the services provided.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless cloud computing has many circulations concerning securities, such as privacy issues, loss of data and stolen of data. Although there are voluminous of companies in the current market that develop and offer cloud computing services and commodities, most of them are still unaware of the repercussions of storing, processing and accessing data in an enormously-shared and virtualized location [4]. This lead to user cannot realize how the service provider oversees their information or indeed where their information is put away.…”
Section: Introductionmentioning
confidence: 99%