2019
DOI: 10.1016/j.jocs.2016.11.011
|View full text |Cite
|
Sign up to set email alerts
|

Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0
8

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 126 publications
(50 citation statements)
references
References 22 publications
0
42
0
8
Order By: Relevance
“…This research instrument uses closed question types. The research instrument using the previous research questionnaire that is divided into four dimensions, namely: a) Security Risk [31], [32], [36], b) Availability Risk [11], c) Performance Risk [30] and d) Compliance Risk [34].…”
Section: Research Methods and Materialsmentioning
confidence: 99%
See 2 more Smart Citations
“…This research instrument uses closed question types. The research instrument using the previous research questionnaire that is divided into four dimensions, namely: a) Security Risk [31], [32], [36], b) Availability Risk [11], c) Performance Risk [30] and d) Compliance Risk [34].…”
Section: Research Methods and Materialsmentioning
confidence: 99%
“…Availability risk is a condition of unavailability of the system or the failure of hardware components so incapable of recovering services on time [11]. Availability risk encompasses inadequate capacity management, ICT system failures, inadequate IT continuity and disaster recovery planning, disruptive and destructive cyber-attacks, institution factors and controls [33].…”
Section: B Perceived Riskmentioning
confidence: 99%
See 1 more Smart Citation
“… возможность восстановить данные в случае потери некоторых частей за счет избыточного кодирования [30];  возможность коррекции ошибок, позволяющей отследить изменение данных в результате диверсии или повреждения, за счет избыточного кодирования [6];  возможность использования СОК в качестве основы для схемы разделения секрета [5].…”
Section: система остаточных классов и схемы разделения секретаunclassified
“…Moreover, in the case of data parallel applications that require massive data and computations, performance fluctuations could also result in a severe load imbalance across Virtual Machines (VM) (see Calzarossa et al (2003); Della Vedova et al (2016b). Since all these uncertainties have a direct impact on resource provisioning and scheduling decisions, it is important to identify the various types of uncertainty and their sources -see Jamshidi et al (2016); Tchernykh et al (2016) for their classification. In addition, these phenomena need to be taken into account before their effects appear, that is, prior to the application execution.…”
Section: Introductionmentioning
confidence: 99%