2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Sma 2019
DOI: 10.1109/bigdatasecurity-hpsc-ids.2019.00064
|View full text |Cite
|
Sign up to set email alerts
|

Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…With the advent of new technologies based on artificial intelligence, computer vision and big data, the demand for computing power has increased astronomically. Today, the emphasis on information technology (IT) solutions has shifted to flexible, globally accessible services which can be accessed at any time on any device (Varghese and Buyya, 2018; Hassan et al , 2019). This requires that the data, computing capability and software application be flexible and remotely accessible.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…With the advent of new technologies based on artificial intelligence, computer vision and big data, the demand for computing power has increased astronomically. Today, the emphasis on information technology (IT) solutions has shifted to flexible, globally accessible services which can be accessed at any time on any device (Varghese and Buyya, 2018; Hassan et al , 2019). This requires that the data, computing capability and software application be flexible and remotely accessible.…”
Section: Introductionmentioning
confidence: 99%
“…Soomro’s research (Soomro et al , 2016) and similar literature summarize the management aspect of information security (Salleh et al , 2012; Jouini and Rabai, 2017; Carturan and Goya, 2019; Cruz et al , 2015), but their findings and insights do not extend to a detailed discussion of cloud security. Recommended management actions for cloud security can be found in published research and standards (Carturan and Goya, 2019; Hassan et al , 2019; Gozman and Willcocks, 2019; NIST, 2013; ISO/IEC, 2005), but they are mixed with technical actions. It was found that information security is impacted by numerous management actions (ISO/IEC, 2005; NIST, 2013; Rebollo et al , 2015; Koohang et al , 2020; ISO/IEC, 2013).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations