1 Economy Informatics, vol. 11, no. 1/ Main Aspects of the Adoption of Cloud Solutions in Managing Service- Oriented Organizations - the Case of Higher Education Bogdan GHILIC-MICU, Marinela MIRCEA, Marian STOICA Academy of Economic Studies, Bucharest, Romania The present day context of information and communications technology (ICT) raises the need for better online products and services for users. Organizations that implement ICT on a large scale meet an important hurdle: the need to continuously configure and parameterize the computing systems. This arises from the limited storage space, maintenance resources, the need to re-qualify the personnel and replace software licenses. Cloud Computing solutions may provide a way around this problem. Basically, Cloud Computing solutions provide services to users though a web browser. An immediate consequence is opportunity to downscale the software costs. Also, Cloud Computing creates great opportunities for business intelligence application like predictive analyses and large data storage, presenting itself as a good data source .The advantages of Cloud Computing solutions for managing service oriented organizations are obvious. This is supported by the categories of characteristic users of Cloud Computing: common user (SaaS Software as a Service), application developer (PaaS Platform as a Service), and system administrator (IaaS Infrastructure as a Service). Keywords: Cloud Computing, Management, Service Oriented Organizations, Information and Communications Technology 1 General Framework The full blown development of information and communications technology (ICT) impacts all aspects of human life, with a special emphasize on the forms of association for economic activities, both in the traditional and the digital context. Thus, economic organizations go through profound transformations regarding the nature of work, managerial paradigms, organizational culture, new work factors etc. Large scale adoption of ICT by organizations led to the emergence of service oriented architectures (SOA) as a new model to create distributed applications. In this context, at the border between SOA and Business, a new paradigm of service oriented organization management rises. Also, overlapping the functional concepts of intranet and extranet, the new bipolar ICT-business instruments evolve towards internal, hybrid or external Cloud Computing solutions. 1.1 Characteristics of Cloud Computing Cloud Computing is the technology that uses internet to manage data and applications. It allows organizations to use applications without local installation, as well as access to personal files from any computer connected to internet. Quoting Chan (2009), the concept may be defined starting from its name (cloud) as common, location-independent, online, utility that is available on demand . This approach emphasizes the fact that any shared resource is statistically multiplied on several applications and clients. Thus, no matter where the client is geographically located, he can access the information in the cloud. The on demand feature means resources have to be dynamically allocated. The cloud can take many shapes, including SaaS (Software as a Service), PaaS (Platform as a Service) and/or IaaS (Infrastructure as a Service). These shapes describe the Cloud Computing architecture and are associated to certain categories of users (see table 1). From a management perspective, SaaS level allows the organization to store applications in a cloud from where they can be accessed via internet.
2 28 Economy Informatics, vol. 11, no. 1/2011 Table 1. Cloud architecture types of users User type Common user (user level) Application developer System administrator Cloud Computing SaaS ( Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Application developers are involved in designing, building and testing applications that will work on the Cloud infrastructure and will be delivered to users connected to provider servers. System administrators ensure a faster processing of data, unlimited storage space, management and administration of databases as well as other resources and applications accessible via internet. 1.2 Cloud Computing & Service Oriented Organizations Integration Service oriented organizations management model highlights various types of clouds (see figure 1). The private cloud (or internal see intranet) consists of a network of computers or a data center that provides services hosted for a limited number of users. Public service cloud (or external) consists of storage service providers (free or charged) and web application for the public (for example: Amazon Elastic Compute Cloud, Cloud Sun, IBM Blue Cloud, Google AppEngine or Windows Azure Services Platform). The hybrid cloud (internal and external)is an environment that includes several providers, both for internal and external cloud. A good example is IBM, which had a partnership with Juniper Networks, which facilitated the implementation of a hybrid cloud . From an evolution perspective, we may say that the last decade is represented by the development of SOA. The main characteristic of SOA is the ability to be reused in various applications, services communication with each other by sending information . The idea of exposing resources as web services, making them accessible, is older but building the components, tools and infrastructure to accomplish this was more difficult. Development of VMWare in organizational environment allowed hooking up applications with various operating systems, enhancing the portability. This was the starting point for the development of Cloud technologies, mainly since The Cloud Provider The Cloud Provider Public Cloud SME Public Cloud Hybrid Cloud Enterprise Private Cloud Connectivity Cloud (Network Access) SME SME Enterprise Private Cloud Fig. 1. Cloud types (Source:
3 Economy Informatics, vol. 11, no. 1/ Thus, cloud solutions for the management of service oriented organizations are the future. Integration can take place on a personal computer or a corporative data center, from data storage to communication. At the same time with the development of Cloud Computing solutions, there is a further development of ICT industry. The attention goes towards developing applications and technology usable via internet and on building new equipment that can handle the increasing flow of data transmitted online. 2 Management of Service Oriented Organizations through Cloud Computing Solutions From the management point of view (management of resources in order to maximize the profits), cloud solutions have many advantages for all categories of users. These advantages are obvious for service oriented organizations. Downsize of costs for maintenance, upgrade or purchase of new computing systems. Users do not need a powerful computer (with a high price tag) in order to run Cloud Computing applications. Since they will run inside the cloud, not on the PC (Personal Computer), the PC needs little computing power and hard disk space, compared with traditional software. There is no need for acquisition of expensive software, many of them being provided free of charge by the cloud (see Google Docs suite). Downsize of capital and personnel expenses. A consequence of the above advantage goes to lower need for capital and specialized personnel. This is why cloud solutions are appealing for organizations (where work force requires the largest part of expenses). Even more, although the number of specialized personnel decreases, the visibility and importance of the department for the business environment increases. Increased performance of computing systems is a direct consequence of reduced number of programs and processes being run at the same time. Automated software update. There is no longer any need to update the software. Every time a user connects to the cloud, he has access to the latest version of the software. The update takes place inside the cloud, transparent to the user. Newest version of documents is available. When connecting to the cloud, users access the newest version of the documents, possibly modified by other authorized users. Increased teamwork efficiency. Cloud solutions create advantages for users working on projects or on shared documents. Since documents reside inside the cloud and not on individual computers, team members can easily collaborate, by accessing the documents via internet. The effects of adopting cloud solutions are also visible on the level of management itself. The modern paradigms of management science holonic, fractal, anthropocentric are easier to implement. Cloud solutions stimulate using the individual abilities of employees and sharing of resources, contributing to a redefinition of organizational culture. 3 Security Aspects Implementation of cloud solutions in service oriented organizations must take care of ensuring service security. There are several levels of security required for a cloud environment: Identity management this type of security means that any service for applications or hardware components may be accessed only by authorized users or groups of users. Controlled access access to the cloud must be controlled to ensure resource security. Authentication and authorization there must be a way to allow only authorized users to modify data and applications.
4 30 Economy Informatics, vol. 11, no. 1/2011 From this perspective, there must be a global security infrastructure for all levels and types of services in the cloud. Also, developers need instruments that can provide security for the services created with the purpose of being delivered though the cloud. Security is the highest priority of IT (Information Technology) managers when they decide to implement a cloud solution. Every Cloud Computing provider has its own security management system and this may concur or conflict with the organization security strategy. An organization must balance protection, confidentiality, administration and accessibility to key resources, either through a traditional data center, a private or hybrid cloud. Security measures for monitoring controlled access, identity management and network must be constantly maintained in the internal data center and hybrid cloud. The fact that the cloud provider is also responsible for the environment security makes the importance of security in a cloud computing environment even more obvious. If the provider does not have a good security strategy, all the companies using its services are in jeopardy. Also, security is hard to monitor and problems usually arise only when something does not work right, which makes it harder to plan for such situations. Another problem is comparing the quality of security services of various providers because most of them do not allow the clients to know the infrastructure. A non-standard methodology for preventing and reducing attacks (direct or passive) against security requires completion of specific steps: a) Authentication for all users accessing the network. b) Verification of access permissions (rights); c) Authentication of the software used on any computer (including software components running in the cloud) and all updates. The cloud provider must automate and authenticate all software patches and configuration changes and manage all security patches. This is very important because most services interruptions are caused by faulty configurations. If a provider does not update the security policies, the intellectual property of all clients is in jeopardy. d) Formalization of the process to require access to information or applications. This rule must be applied both on internal systems and services that require the transfer of information inside the cloud. e) Monitoring of network activity and recording of unusual situations. In most cases intrusion detection technologies must be implemented. Also the cloud provider may allow the monitoring of activities inside its environment, an independent monitoring is also recommended. f) Recording the activity of all users and applications and analyses to discover unusual and atypical activities. g) Encrypting the confidential information that requires a higher level of protection. h) Regular verification to discover vulnerabilities in all software applications exposed to internet or external users. Classic solutions that exist on ITC market are rather point-solutions that cover specific vulnerabilities like: Firewall protect the internal network against the internet Antivirus software protect individual computers against known viruses Virtual Private Networks prevent external connections to a network These products reduce some of the risks but they cannot create a high level of security. There are some products that bring a significant contribution to an integrated IT security platform. They fall under 3 categories: identity management, specific security products and data encryption applications. Identity management is about managing information concerning the identity of the users accessing the resources, applications, information and services and also strict control over the access rights. The benefits of using identity management for increased security include:
5 Economy Informatics, vol. 11, no. 1/ Increased productivity: cloud computing solutions provide a simplified sign-on interface and the possibility to modify a users access rights on the fly; Improved services for clients and partners, ensuring a safe environment for access to data and applications; Reduced costs fewer calls to technical support department concerning forgotten passwords; also identity management means automation of the process of granting and revoking access rights to systems and applications. An identity management solution includes specific aspects materialized in the following features: a) Centralized information. Most of the times information are distributed on several systems. From the cloud perspective, it is recommended that they reside in a single database. b) Integration. An identity management system must be integrated with all other systems in the cloud so that there are a direct interfaces with the human resources department (where all personnel changes are operated), product management systems (if providers and partners use such systems) and with client database (if they need to access some systems from the cloud). c) An advanced authentication procedure. This means going beyond the classic password authentication by adding biometric systems (fingerprints, palm prints, eye scan etc.) or token generated codes. d) Automation of rights granting and revoking. When the status of a user changes, all rights changes have to be automatically sent to all other connected systems. This reduces the possibility of a user having more rights than he should. e) Single sign-on. The identity of a user is verified and transmitted to all the other systems in order to establish the access rights. The rights are not granted to a person but to a role and they capture administrative hierarchy information as well. This kind of authentication can be seen in the case of web interfaces that grant access to all the applications the users has rights on. f) Security management. Identity management reduces security management costs by automating many of the security administrators tasks. g) Data analyses. After centralizing the information about users, various reports can be generated about the usage of resources and applications. Security audits are also easier to perform. Specific products for security allow prevention of attacks or, if they were not prevented in time, the possibility to detect the source and the weak points of the system. For cloud computing, these solutions mean recording the activity. The files recording these data can provide the information about how the attack was happened. Most cloud computing providers implement infrastructure security through HIPS (hostbased intrusion protection system) and NIPS (network-based intrusion protection system). These systems include elements like: monitoring systems log files (there are software products that search these files for traces of possible attacks). NIDS (network intrusion detection systems) monitors data packages transported through the network looking signs of harmful activities. DDS (digital deception software) is a class of software products used to deceive those that try to attack the network. WLS (white listing software) charges with identification of executable files and prevention of uncontrolled execution. Beside recording modification on the databases, it is also important to record the interrogations. Data auditing products take care of this. There are numerous data encrypting applications and techniques. Information can be encrypted when it is written on disk or when it is transmitted through the network. Although this prevents some attacks, it also decreases performance; therefore it is recommended to encrypt only sensitive data requiring high protection.
6 32 Economy Informatics, vol. 11, no. 1/ Limitations and Perspectives In spite of numerous advantages, Cloud Computing solutions are faced with some problems, be they of legal nature or disadvantages for users. First limitation is the need for permanent connection to internet. Cloud Computing is not possible without internet connection, since it uses internet to access both applications and data. Even more, this must be a high speed connection, otherwise access is difficult and slow, applications and data requiring broadband for download. Other limitations of Cloud Computing are related to limited applicability for certain applications (presently many web applications offer limited features to users see MS PowerPoint or Google Presentations), limited protection and risk of total data loss (some providers do not make public their practices on data manipulation). An analyses performed by Appnor in 2010  on Cloud Computing phenomenon shows that usage of IaaS, PaaS and SaaS has increased in the latest years and will become more popular (see figure 2). Of the three segments, SaaS is used by most companies, followed by IaaS and PaaS. More than 40% of the companies reported they use SaaS in some form. Small companies were the first to adopt SaaS, while large companies feared security and integration risks. SaaS proved to be viable and convinced large companies to start using it. The most popular SaaS segments are client services and support ,5 25, Fig. 2. Income from Cloud Computing services In 2009 study carried on by Forrester  only 3% companies worldwide declared that they use IaaS services. Compared to SaaS, this segment is more popular with large companies then with small ones. PaaS solutions are relatively new, which explains why they are not used as much as IaaS and PaaS, but we can expect that more companies will adopt them in the future. For (see figure 3), Gartner  anticipates a major evolution of the cloud computing market. SaaS has won a large share of the cloud computing market (89%), but PaaS and IaaS have a bigger potential for growth. Fig. 3. Evolution of market share for SaaS, IaaS and PaaS
7 Economy Informatics, vol. 11, no. 1/ Every cloud computing provider offers various services, prices, delivery methods and support features. Main criteria used by clients when selecting a cloud solution are costs, scalability and expertise. Beside those, some other factors may influence the decision of a potential client, like: Services and support; Cloud hosted applications, information services, business process services; Provider experience and client portfolio; Security services: data protection during transactions and storage, encryption and decryption of data, recovery after disaster solutions, protection against intruders and firewall services, document security and certifications; Performance, availability; Billing options; Possibilities to leave the cloud; Provider flexibility the ability to integrate and manage hybrid environments. In Romania Cloud Computing solutions became an option only in The first cloud services integrator is Appnor, launched in February 2010, with support and assistance in Romanian language. Based on a partnership with Google they managed to integrate critical solutions for business and announced unlimited online backup. In a survey by BRINEL, on a sample of 173 subjects (IT specialists), cloud computing is a viable solution in Romania. 63% of the subjects consider that IT market in Romania is ready for Cloud Computing, mainly because of high speed internet connection available locally . 5 Adoption of Cloud Computing Solution in Higher Education Management Rapid technology evolution offers numerous opportunities for higher education institutions but also creates hard to manage tensions and changes that are usually hard to implement . One of the major challenges that face universities is university management. This involves learning from everywhere, anytime and anyway (especially for lifelong learning), as well as creating high level support processes with low expenses. ICT related expenses combined with the current financial crisis and the limited resources of the universities require finding alternative solutions, like cloud computing. Using cloud computing involves a high level of SOA maturity in universities. SOA provides support for creation and management of distributed services so that common services, available to everybody can be operated inside the university and/or between universities/organizations. Also, SOA promotes using shared services, provided locally or through cloud environments. An efficient management of changes in the university is also required, which involves using business process management solutions (BPM), with implications on the process automation and SOA governance. The potential and efficiency of using SOA, BPM and Cloud Computing in higher education were recognized by many universities and researchers in the field (see   ). Next we propose an approach on using Cloud solutions in order to improve university management in the context of current financial crisis. In a solution based approach, Cloud is a continuous exposure of information as service in a university that adopted SOA on a large scale. Using shared services brings immediate benefits to the university like: reduced costs (because of sharing services), improved quality by using services from leading specialists, reduced costs for investments and fast integration of new technological versions. Considering the trend of universities (innovation), more and more universities seek to use modern technological solutions that will transform them into intelligent universities. A viable choice at this moment for improving university management is using innovative BI solutions combined with Cloud Computing. Leading specialists consider that for a long time both traditional software and SaaS will co-exist inside
8 34 Economy Informatics, vol. 11, no. 1/2011 organizations . The problem of choosing a BI solution rises especially for universities that have an IT infrastructure. Using Cloud solutions in university management (see figure 4) requires a special attention for cloud risks. According to , about 75% of Chief Information Officers and IT specialists consider security as the main risk of cloud integration. The security of Cloud BI solution is vital, as this involves transmitting decision support data between the cloud and the network. Therefore, the security standards for transmission of data are very important when choosing a Cloud BI solution . Fig. 4. Cloud Computing solution  Adoption of a Cloud solution for university management involves analyses on university data and applications/functions/processes in order to determine the right cloud model (private, public, hybrid, community) and cloud services. Criteria for these analyses can be: mission critical, sensitivity, confidentiality, integrity, availability (for data evaluation) and mission critical, importance, availability (for functions/processes/applications evaluation). According to studies conducted in the recent years, most universities use hybrid cloud approaches, maintaining key infrastructure elements in house, under university strict control and only externalizing less sensitive components. 6 Conclusions Cloud Computing offers convenient access to applications, independent of technology and geographical location. Users are free of tasks related to data storage on computers or mobile devices. They can access information fast and easy anywhere, through internet. With Cloud Computing applications, employees do not have to download or install specific software on their PC, freeing memory and reducing energy costs. Adoption of Cloud Computing solutions in the management of service oriented organizations can be a sustainable answer to the current economic crisis. A small investment can have a positive feed-back that will ensure development and economic growth on business level. In other words, Cloud Computing can be viewed as a small modification of business input that leads to a significant modification of the output. Acknowledgements This work was supported by CNCSIS- UEFISCSU, project number PN II-RU (PD) code 654/2010, contract no. 12/
9 Economy Informatics, vol. 11, no. 1/ References  T. Chan, com/2009/03/16/full-interviewatt%e2%80 %99s-joe-weinman/, 16 March 2009, [Readat 15 July 2009].  M. Fawzy, Life Before Cloud Computing, 20 July 2009, [Readat 24 January 2010].  M. Mircea and A. I. Andreescu, Extending SOA to Cloud Computing in Higher Education, in K. Soliman, The 15th IBIMA conference on Knowledge Management and Innovation: A Business Competitive Edge Perspective, Cairo, Egypt 6-7 November  M. Mircea, B. Ghilic-Micu and M. Stoica, Combining Knowledge, Process and Business Intelligence to Delivering Agility in Collaborative Environment, in: L. Fischer, ed BPM and Workflow Handbook, Spotlight on Business Intelligence. Florida: Future Strategies Inc. & Workflow Management Coalition, pp ,  A. Pădure, articol/7133/specialistii_it_cloud_com puting_este_o_tehnologie_viabila_in_ Romania/, 30 September 2010, [Accessed at 20 October 2010].  The Cloud Computing Market, Available at: Cloud-servers-overview, [Accessed at 24 January 2011].  B. Ghilic-Micu, M. Mircea, M. Stoica, in press, Knowledge Based Economy Technological Perspective: Implications and Solutions for Agility Improvement and Innovation Achievement in Higher Education, Amfiteatru Economic,  M. Mircea, SOA, BPM and Cloud Computing: Connected for Innovation in Higher Education, in Proc. The International Conference on Education and Management Technology, Cairo, Egipt 2-4 November 2010, Editorial production Zeng Zhu, pg ,  IMS Global Learning Consortium, Inc., 2009, Adoption of Service Oriented Architecture for Enterprise Systems in Education: Recommended Practices, 0/imsSOAWhitePaper_v1p0.pdf.  M. Mircea, B. Ghilic-Micu, M. Stoica, Combining Business Intelligence with Cloud Computing to Delivery Agility in Actual Economy, Journal Of Economic Computation And Economic Cybernetics Studies, vol. 45, no. 1, pp ,  Jitterbit, Five Integration Tips to Cloud Computing Success, Jitterbit, Inc., 1-3, Available at: download/ pdf,  J. McKendrick, BI, Delivered from the Cloud, Ebizq Net, The Insider's Guide to Business and IT Agility, Available at: 07/12/bi_delivered_from_the_cloud.php,  B. Golden, Forrester Bucks Conventional Wisdom on Cloud Computing, Available at: ster_bucks_conventional_wisdom_on_ Cloud_Computing, June 29,  Gartner, SaaS Revenue Expected to Increase 18 Percent, Available at: about/policies/correction_2009.jsp, 10 Nov, Bogdan GHILIC-MICU received his degree on Informatics in Economy from the Academy of Economic Studies Bucharest in 1984 and his doctoral degree in economics in Between 1984 and 1990 he worked in Computer Technology Institute from Bucharest as a researcher. Since 1990 he teaches in Academy of Economic Studies from Bucharest, at Informatics in Economy Department. His research activity, started in 1984 includes many themes, like computers programming, software integration and hardware
10 36 Economy Informatics, vol. 11, no. 1/2011 testing. The main domain of his last research activity is the new economy digital economy in information and knowledge society. Since 1998 he managed over 25 research projects like System methodology of distance learning and permanent education, The change and modernize of the economy and society in Romania, E-Romania an information society for all, Social and environmental impact of new forms of work and activities in information society. Marinela MIRCEA received her degree on Informatics in Economy from the Academy of Economic Studies, Bucharest in 2003 and his doctoral degree in economics in Since 2003 she is teaching in Academy of Economic Studies from Bucharest, at Informatics in Economy Department. Her work focuses on the programming, information system, business management and Business Intelligence. She published over 25 articles in journals and magazines in computer science, informatics and business management fields, over 20 papers presented at national and international conferences, symposiums and workshops and she was member over 15 research projects. She is the author of one book and she is coauthor of four books. In February 2009, she finished the doctoral stage, and her PhD thesis has the title Business management in digital economy. Marian STOICA received his degree on Informatics in Economy from the Academy of Economic Studies, Bucharest in 1997 and his doctoral degree in economics in Since 1998 he is teaching in Academy of Economic Studies from Bucharest, at Informatics in Economy Department. His research activity, started in 1996 and includes many themes, focused on management information systems, computer programming and information society. The main domains of research activity are Information Society, E-Activities, Tele-Working, and Computer Science. The finality of research activity still today is represented by over 50 articles published, 10 books and over 20 scientific papers presented at national and international conferences. Since 1998, he is member of the research teams in over 20 research contracts with Romanian National Education Ministry and project manager in 5 national research projects. He is IEEE member from 2010.
Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania firstname.lastname@example.org The complexity of data
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: email@example.com ABSTRACT In this paper we discuss the
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
A STUDY OF OPEN INNOVATION IN CLOUD COMPUTING Grozdalina Grozeva 1, Yordan Dimitrov 2 1 Department of Management, Technical University, Bulgaria, E-mail: firstname.lastname@example.org 2 Department of Management, Technical
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
66 Informatica Economică vol. 14, no. 1/2010 The Audit of Business Intelligence Solutions Bogdan GHILIC-MICU, Marinela MIRCEA, Marian STOICA Department of Economy Informatics Academy of Economic Studies
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Computing and Sustainable Development in Higher Education 1 Sunday A. Idowu, 2 Adenike.O.Osofisan 1 Babcock University, Ilishan-Remo, Nigeria 2 University of Ibadan, Ibadan, Nigeria ABSTRACT Sustainable
Informatica Economică vol. 18, no. 4/2014 5 Cloud Computing and Agile Organization Development Bogdan GHILIC-MICU, Marian STOICA, Cristian Răzvan USCATU The Bucharest University of Economic Studies email@example.com,
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 41-46 International Research Publications House http://www. irphouse.com /ijict.htm E-learning
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
COMPANY PROFILE ABOUT PRAS CONSULTING PRAS Consulting, founded in 2002 and headquartered in Bucharest, has advanced competencies in Microsoft solutions and other well-known IT&C technologies. The company
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
- 1 - Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea firstname.lastname@example.org 2 Research Institute of
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Introduction to Cloud Computing Srinath Beldona email@example.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
A Cloud: Large groups of remote servers that are networked to allow centralized, shared data storage and online access to computer services or resources A Cloud: Large groups of remote servers that are
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
5 Business Process Automation through Application Software 5.1 Introduction The speed of automation of all activities, whether they be connected to business directly or not has surprised the stakeholders
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Cloud Computing and Interoperability in Healthcare Information Systems Oana-Sorina Lupşe, Mihaela Marcella Vida, Lăcrămioara Stoicu-Tivadar Faculty of Automatics and Computers University Politehnica of
Economy Informatics vol. 14, no. 1/2014 39 CBI Framework for Collaborative Management in Knowledge Society Bogdan GHILIC-MICU, Marinela MIRCEA, Marian STOICA, Cristian Răzvan USCATU The Bucharest University
OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
A Survey on Cloud Computing Security, Challenges and Threats Rajnish Choubey 1, Rajshree Dubey 2, Joy Bhattacharjee 3 1 Assistant Professor, Dept. of CSE, TCT, Bhopal, India 2. Assistant Professor, Dept.
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Innovation through Outsourcing Timothy Gehrig firstname.lastname@example.org David Moore email@example.com Agenda Expectations CedarCrestone Introduction Market Direction Outsourcing Solutions
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Cloud Computing and Its Vision 2015!! Anurag S. Barde Abstract "Cloud computing" - "the cloud" is a familiar cliche for the internet, but when combined with "Computing", the meaning gets bigger and fuzzier.
Comparative study of security parameters by Cloud Providers Manish Kumar Aery 1 Faculty of Computer Applications, Global Infotech Institute of IT & Management (LPUDE) firstname.lastname@example.org, Sumit Gupta
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
ICT Innovations 2010 Web Proceedings ISSN 1857-7288 345 Analysis of Cloud Solutions for Asset Management Goran Kolevski, Marjan Gusev Institute of Informatics, Faculty of Natural Sciences and Mathematics,
Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology email@example.com Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information
BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: firstname.lastname@example.org Abstract: The nature of the Internet is
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Why Eurotux? Expertise and skill Market proven Innovative and competitive solutions Strong research and development Policy of continuous improvement Complete, flexible and scalable service Service quality
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating