IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Aspects in Utility Computing

Security Aspects in Utility Computing
View Sample PDF
Author(s): Mayank Swarnkar (Indian Institute of Technology Indore, India)and Robin Singh Bhadoria (Indian Institute of Technology Indore, India)
Copyright: 2016
Pages: 14
Source title: Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing
Source Author(s)/Editor(s): Ganesh Chandra Deka (Regional Vocational Training Institute (RVTI) for Women, India), G.M. Siddesh (Ramaiah Institute of Technology, India), K. G. Srinivasa (M S Ramaiah Institute of Technology, Bangalore, India)and L.M. Patnaik (IISc, Bangalore, India)
DOI: 10.4018/978-1-4666-8853-7.ch012

Purchase

View Security Aspects in Utility Computing on the publisher's website for pricing and purchasing information.

Abstract

Utility computing is a need of today's cyber world and so the importance of its security is an important issue. Concerns for utility computer networks' security and dependability are growing quickly because of increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Various types of issues and its solutions regarding security in utility computing have been explained in this chapter.

Related Content

Radhika Kavuri, Satya kiranmai Tadepalli. © 2024. 19 pages.
Ramu Kuchipudi, Ramesh Babu Palamakula, T. Satyanarayana Murthy. © 2024. 10 pages.
Nidhi Niraj Worah, Megharani Patil. © 2024. 21 pages.
Vishal Goar, Nagendra Singh Yadav. © 2024. 23 pages.
S. Boopathi. © 2024. 24 pages.
Sai Samin Varma Pusapati. © 2024. 25 pages.
Swapna Mudrakola, Krishna Keerthi Chennam, Shitharth Selvarajan. © 2024. 11 pages.
Body Bottom