IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Aspects in Utility Computing

Security Aspects in Utility Computing
View Sample PDF
Author(s): Mayank Swarnkar (Indian Institute of Technology Indore, India)and Robin Singh Bhadoria (Indian Institute of Technology Indore, India)
Copyright: 2020
Pages: 13
Source title: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-9866-4.ch074

Purchase

View Security Aspects in Utility Computing on the publisher's website for pricing and purchasing information.

Abstract

Utility computing is a need of today's cyber world and so the importance of its security is an important issue. Concerns for utility computer networks' security and dependability are growing quickly because of increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Various types of issues and its solutions regarding security in utility computing have been explained in this chapter.

Related Content

Nalini M.. © 2023. 22 pages.
Balachandar S., Chinnaiyan R.. © 2023. 19 pages.
V. A. Velvizhi, G. Senbagavalli, S. Malini. © 2023. 29 pages.
Amuthan Nallathambi, Kannan Nova. © 2023. 25 pages.
Amuthan Nallathambi, Sivakumar N., Velrajkumar P.. © 2023. 17 pages.
Nayana Hegde, Sunilkumar S. Manvi. © 2023. 18 pages.
Udayakumar K., Ramamoorthy S., Poorvadevi R.. © 2023. 26 pages.
Body Bottom