Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Bojan Suzic"'
Autor:
Milan Latinovic, Bojan Suzic
Publikováno v:
PerCom
Service providers typically utilize Web APIs to enable the sharing of tenant data and resources with numerous third party web, cloud, and mobile applications. Security mechanisms such as OAuth 2.0 and API keys are commonly applied to manage authoriza
Publikováno v:
SAC
A broad range of emerging business models relies on the continual exchange of data that flow among different services to generate additional value and derive knowledge in many domains. The magnitude of resource sharing that form the basis of these in
Publikováno v:
Information Systems Security ISBN: 9783030051709
ICISS
ICISS
Efficient and secure electronic communication is crucial for successful business-to-business processes. Due to the weaknesses of e-mail communication, a shift towards instant messaging can also be observed in this context. However, reliance on instan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8fa843d1c3b79f7bd1c5b61edc555462
https://doi.org/10.1007/978-3-030-05171-6_18
https://doi.org/10.1007/978-3-030-05171-6_18
Publikováno v:
CNS
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation,
Autor:
Andreas Reiter, Bojan Suzic
Publikováno v:
ARES
2016 11th International Conference on Availability, Reliability and Security (ARES)
2016 11th International Conference on Availability, Reliability and Security (ARES)
Public administrations across Europe have been actively following and adopting cloud paradigms at various degrees. By establishing modern data centers and consolidating their infrastructures, many organizations already benefit from a range of cloud a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f6d19748778fdbe1b4fb7c65df156a2d
https://zenodo.org/record/1095765
https://zenodo.org/record/1095765
Autor:
Bojan Suzic
Publikováno v:
NOMS
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium
One of the consequences of the present adoption of cloud-based services among organizations is the increasing rate of outsourcing of business and technical functions to third parties. The recent approaches such as cloud integration platforms (iPaaS)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::36c1928955dbe388acc6f66d5dafb011
https://zenodo.org/record/206059
https://zenodo.org/record/206059
Autor:
George Kousiouris, Ilias Maglogiannis, Zhiming Zhao, Paolo Nesi, Jörn Altmann, Keith Jeferry, Dimosthenis Kyriazis, Augusto Ciuffoletti, Bojan Suzic
Publikováno v:
Procedia Computer Science
Procedia Computer Science, 68, 227-237. Elsevier
Cloud Forward
Procedia Computer Science, 68, 227-237. Elsevier
Cloud Forward
The cloud computing paradigm encompasses several key differentiating elements and technologies, tackling a number of inefficiencies, limitations and problems that have been identified in the distributed and virtualized computing domain. Nonetheless,
Publikováno v:
Procedia Computer Science
Cloud Forward
Cloud Forward
The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and p
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-On the Move to Meaningful Internet Systems: OTM 2016 Conferences
On the Move to Meaningful Internet Systems: OTM 2016 Conferences ISBN: 9783319484716
OTM Conferences
Lecture Notes in Computer Science-On the Move to Meaningful Internet Systems: OTM 2016 Conferences
On the Move to Meaningful Internet Systems: OTM 2016 Conferences ISBN: 9783319484716
OTM Conferences
Following their practical needs and legal constraints, recent application of the cloud paradigm among public administrations has been focused on the deployment of private clouds. Due to the increasing amount of data and processing requirements, many
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::36100e1043cc67aaeb101df1c23357cf
Publikováno v:
TU Graz
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030017033
SecureComm (2)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030017033
SecureComm (2)
Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-fi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1a3490377dda8a0caaed04cd93edeec1
https://graz.pure.elsevier.com/en/publications/a-holistic-approach-towards-peertopeer-security-and-why-proof-of-work-wont-do(24bb24c3-5597-4006-b232-a05c05b441b2).html
https://graz.pure.elsevier.com/en/publications/a-holistic-approach-towards-peertopeer-security-and-why-proof-of-work-wont-do(24bb24c3-5597-4006-b232-a05c05b441b2).html