首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
在评判现有相关研究成果的基础上,遵循符合信息时代特征的需求角度对云物流概念进行重新界定,提出一个云物流概念模型,并从服务资源共享、信息传导、服务发现与组合、云服务协同、利益均衡等机理的角度剖析其运作机理,并在此基础上建立云物流运作模型,指出未来的云物流研究发展方向。  相似文献   

2.
蒋洁 《情报杂志》2012,31(7):157-162
云数据自云端形成至完全销毁的完整生命周期中,时刻面临着云服务商和公权机关侵害数据保密权、支配权、知情权等诸多风险.通过构建云环境标准体系、云隐私影响评估制度、云数据隐私法律保护框架、云服务协议的数据隐私保护条款、侵权赔偿幅度与专门监督制度等,矫正恶意侵权人利益驱动与规则缺失联合作用导致的机会成本过低的畸形状态,寻求云环境高效运转与保护云数据隐私之间的动态平衡.  相似文献   

3.
云计算在数字图书馆中的应用与瓶颈问题   总被引:1,自引:0,他引:1  
范敏 《现代情报》2012,32(2):147-150
云计算技术作为一门新兴技术已经强势进入了图书馆领域,为图书馆的发展迎来了下一个春天。文章归纳了云计算在图书馆中的应用现状,并且从云计算的含义、特点、服务类型出发,讨论了云计算在数字图书馆中的主要应用,指出了数字图书馆应用云计算要考虑的一些瓶颈问题。  相似文献   

4.
郑力 《科教文汇》2011,(27):67-68
本文介绍云计算的含义及优势,从教育领域中教学、试验和教辅三方面描述云计算的应用。  相似文献   

5.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

6.
Industry 4.0 places a premium on cloud security since more and more companies are moving their activities to the cloud to reap the benefits of the Fourth Industrial Revolution.The term “cloud computing” refers to a collection of Internet-based hardware and software tools. Providers of cloud services use data centers situated in various physical locations. Cloud computing makes life easier for users by making remote, simulated resources available over the internet. Google Apps and Microsoft SharePoint are two examples of popular cloud applications. In addition to its exciting potential, the “cloud computing” industry's lightning-fast expansion raises serious security concerns. When discussing security, cloud really suffers from Open Systems' and the internet's perennial problem. The only thing stopping the widespread use of cloud computing is the lack of trust in the system. There are a number of security concerns with cloud computing, including protecting user data and vetting cloud service providers' practices. Using encryption, confidential information can be sent over an unsecured channel without fear of data loss or manipulation. Data encryption using various protocols has been used in various settings. Different cryptosystems were developed and used at various times. Additionally, cloud computing enables multiple users to access and retrieve data simultaneously through their own personal Internet connections, which increases the risk of confidential data loss and exposure in a number of different places. Elliptic Curve Cryptography and other cryptographic algorithms have been used to develop numerous methods and protocols that guarantee the security and privacy of transmitted data. In this paper, we suggest a safe and efficient method for sharing information in the cloud without compromising its safety or integrity. The proposed system is able to guarantee authentication and data integrity because it uses a hybrid of the ECC and the Advanced Encryption Standard (AES) technique. The experimental results confirm the proposed approach outperforms the current gold standard.  相似文献   

7.
云计算以虚拟化、高可靠性、高扩展性为主要特征,能够很好地满足复杂的互联网应用对大规模计算能力、海量数据处理和信息服务的需求。介绍了云计算的定义、基本特征、服务模型、部署模型及其关键技术,并从教育行业分析了云计算的应用。  相似文献   

8.
云计算作为一种全新的服务模式,其特点决定了它面临着比传统网络和信息安全更多的安全风险问题,且该问题已成为制约云计算发展的重要因素.介绍了云计算体系结构及特征,分析了云计算安全风险研究现状,重点剖析了云计算技术和管理的安全风险因素,并给出应对策略,可供云服务商、云用户和云监管机构参考或借鉴,对云计算的进一步发展具有一定的指导意义.  相似文献   

9.
统一坚强智能电网是未来电网发展的趋势,信息技术是其建设和发展的重要支撑,云计算为坚强智能电网下的海量数据处理、分析、存储、管理与计算平台提供了新的技术手段。为了更好地研究和利用云计算构建智能电网中的信息平台,首先对云计算进行了概述,总结了智能电网对信息平台的要求及云计算在智能电网中的应用,并结合已有研究对智能电网下云计算平台研究的新内容进行了讨论分析。  相似文献   

10.
随着人们对云计算认识的不断深入,基于IaaS(基础设施即服务)的云管理产品也如雨后春笋般出现。通过对云管理平台的自动化测试技术进行研究,提出了一种适用于云管理平台的面向对象的业务流程测试框架,简称OBP。通过在开源云管理平台产品CloudStack上进行实验,探讨了其云管理平台的架构、功能模块、业务逻辑,并对实验结果进行了详细分析,最终论证了云管理平台自动化测试采用OBP框架的高可行性与高效性。  相似文献   

11.
庾邦 《大众科技》2013,(6):20-22
泛在学习改变了人们的学习方式,云计算的发展及其技术特性,使得在云平台上构建泛在学习环境具有众多优势。文章探讨了云计算在构建泛在学习环境中的应用,并提出了一个基于开源云平台生力军OpenStack的泛在学习环境概念模型。  相似文献   

12.
Cloud computing's primary layer of security is its widespread adoption by businesses due to its ability to provide easy, on-demand network access to a large pool of configurable processing resources. Pressure from developed-world governments to keep up with the latest IT trends makes it challenging for colleges around the world to adopt cloud computing in engineering education. Although cloud computing as a concept has become more popular in recent times and quite a few studies have been conducted, the adoption and application level is still very low, particularly in developing countries. This study provides a realistic framework for gauging the sustainability of a company model. While digitalization is widely acknowledged to be crucial, the study's results reveal that the perceived available options for business model innovation depend not only on the value proposition itself but also on the position in the value network. The primary goal of this research is to create a cloud computing service provider business model that is built on circular economy principles and can guarantee the sustainable usage of cloud computing resources.  相似文献   

13.
Cloud computing is an IT service paradigm that can, if used meaningfully, enhance traditional health IT approaches and offer major benefits to the healthcare industry. However, its adoption by healthcare organizations has been accompanied by diverse challenges that could impede its meaningful use. Decisions about its adoption should be made after serious consideration of relevant industry-specific factors. Whereas the literature has focused on cloud computing adoption in general, the industrial specificities that influence the decision to adopt cloud computing in the healthcare context have yet to be systematically addressed. We reviewed empirical studies on both information systems and medical informatics to investigate the determinant factors of the cloud computing adoption decision in healthcare organizations and the industrial specificities of those factors. Based on the results of our review, we proposed a conceptual framework of cloud computing adoption studies in healthcare and made seven recommendations for related future research. Our research contributes to the theory by providing a comprehensive list of industry-specific factors that influence cloud computing adoption decisions in healthcare and explains their specificities for the healthcare industry. For practitioners, the identified factors serve as a checklist that informs healthcare organizations’ decision making regarding cloud computing adoption.  相似文献   

14.
云计算在国内外数字图书馆中的应用及进展   总被引:1,自引:0,他引:1  
韩普  沈思  路高飞 《现代情报》2012,32(5):67-70
云计算是当前信息技术的研究热点,其应用正逐渐普及,云计算的快速发展引起了图书馆界的关注。本文介绍了国内外云计算的应用现状,讨论了国内外图书馆利用云计算的情况,分析了云计算在图书馆应用中的阻碍并对其应用进行了展望。  相似文献   

15.
Cloud computing is a pervasive computing paradigm that has revolutionized how computer infrastructure and services are delivered. Current research trends on cloud computing have been focused on the technology, applications, costs, benefits, and security of cloud computing at the organizational level within small and medium sized enterprises. Little research attention has been paid on adoption and usage of cloud computing at educational establishments and how contextual factors can influence diffusion and adoption of cloud computing. Universities in developing countries are faced with challenging socio-economic and political constraints that limit their ability to invest in expensive information systems to compete on the global stage. Using constructs from the diffusion of innovation theory and the technology acceptance model, this paper proposes a model that takes account of contextual, economic, and technological influences in the perception and adoption of cloud computing at universities in sub-Saharan Africa. Results from a pilot study, based on the model, through a survey of university lecturers and IS experts shows reliability and validity of the instrument and supports its usage for a more extensive study. Implications, potential contributions to research, and suggestions for future study are discussed.  相似文献   

16.
分析云计算产业发展现状,通过在互联网搜索找到公开报道的2009年到2014年2月间149起国外云计算企业并购交易,分析这些交易的特征、动因及对我国的启示,以期为我国云计算产业的发展提供理论和实践上的借鉴。  相似文献   

17.
Derided, when it emerged in 2007 as a fad, cloud computing has proved to be a viable business model for remotely delivering IT services through the Web (and other media) on a pay-as-you-go basis. The flexibility of this emerging computing service has opened many possibilities for organizations. Drug companies and medical research centers are among those organizations that are likely to benefit from this new IT service model. As well as providing massive cost-savings, cloud computing could offer these organizations the opportunity to greatly enhance the efficiency of their operations. For cloud providers, this is a new field to expand their reach. The aim of this article is to explore this new development and the potential of cloud computing in contributing to the advancement of research in life science and explain why this IT service model (despite many of its problems) could be game-changer for companies engaged in this business.  相似文献   

18.
云存储技术迅猛发展的同时也引起诸多安全问题,在云存储环境中,数据被外包给云服务器而处于用户控制之外,如何实施新颖可信的访问控制技术就变得非常关键。作为一类新兴的公钥加密技术,基于属性的加密算法以其灵活性被广泛应用在云存储访问控制方案的设计中。文章提出了一种基于属性加密的云存储访问控制方案,方案可以实现安全的云存储,系统采用基于角色的访问控制技术实现身份验证、对属性的加密/解密以及对非敏感数据的访问。最后通过仿真实验证明该方案是一种可以保证数据完整性和机密性的云存储访问控制。  相似文献   

19.
[目的/意义]个体云存储服务中的安全问题已经成为其推广的主要阻碍,分析用户云存储服务使用过程中对具体风险因素的感知,是提高云存储服务质量、提升用户满意度的基础。[方法/过程]从服务保障、功能、连接、财务、心理、隐私6个维度来探讨用户使用云存储服务中的具体感知风险,重点引入转换成本这一调节变量,对用户感知风险、用户感知转换成本与用户持续使用意愿进行回归分析。[结果/结论]用户感知隐私风险、连接风险、心理风险对用户持续使用行为有显著的负向影响;感知转换成本对用户持续使用意愿具有显著负向影响;感知转换成本负向调节用户感知隐私风险与持续使用意愿之间的关系。  相似文献   

20.
Cloud computing is a current trend that reveals the next-generation application architecture and it is estimated that by 2013 the cloud market will have reached $8.1bn. While cloud services such as webmail, Flickr and YouTube have been widely used by individuals for some time, it not until relatively recently that organisations have began to use cloud services as a tool for meeting their IT needs. This study aims to investigate how cloud computing is understood by IT professionals and the concerns that IT professionals have in regard to the adoption of cloud services. The study was carried out in Taiwan and used a survey by interview approach to understand IT professionals’ understandings and concerns about cloud computing. The findings of the study suggest that while the benefits of cloud computing such as its computational power and ability to help companies save costs are often mentioned in the literature, the primary concerns that IT managers and software engineers have are compatibility of the cloud with companies’ policy, IS development environment, and business needs; and relative advantages of adopting cloud solutions. The findings also suggest that most IT companies in Taiwan will not adopt cloud computing until the uncertainties associated with cloud computing, e.g. security and standardisation are reduced and successful business models have emerged.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号