The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security Aspects in Utility Computing
|
Author(s): Mayank Swarnkar (Indian Institute of Technology Indore, India)and Robin Singh Bhadoria (Indian Institute of Technology Indore, India)
Copyright: 2016
Pages: 14
Source title:
Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing
Source Author(s)/Editor(s): Ganesh Chandra Deka (Regional Vocational Training Institute (RVTI) for Women, India), G.M. Siddesh (Ramaiah Institute of Technology, India), K. G. Srinivasa (M S Ramaiah Institute of Technology, Bangalore, India)and L.M. Patnaik (IISc, Bangalore, India)
DOI: 10.4018/978-1-4666-8853-7.ch012
Purchase
|
Abstract
Utility computing is a need of today's cyber world and so the importance of its security is an important issue. Concerns for utility computer networks' security and dependability are growing quickly because of increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Various types of issues and its solutions regarding security in utility computing have been explained in this chapter.
Related Content
Radhika Kavuri, Satya kiranmai Tadepalli.
© 2024.
19 pages.
|
Ramu Kuchipudi, Ramesh Babu Palamakula, T. Satyanarayana Murthy.
© 2024.
10 pages.
|
Nidhi Niraj Worah, Megharani Patil.
© 2024.
21 pages.
|
Vishal Goar, Nagendra Singh Yadav.
© 2024.
23 pages.
|
S. Boopathi.
© 2024.
24 pages.
|
Sai Samin Varma Pusapati.
© 2024.
25 pages.
|
Swapna Mudrakola, Krishna Keerthi Chennam, Shitharth Selvarajan.
© 2024.
11 pages.
|
|
|