The methodology for implementation of cloud computing in the enterprise and universities
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F62156489%3A43110%2F15%3A43907491" target="_blank" >RIV/62156489:43110/15:43907491 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
The methodology for implementation of cloud computing in the enterprise and universities
Popis výsledku v původním jazyce
This article analyzes the process of the implementation of cloud computing in a university environment. The goal of the implementation is to enhance the security of the data, that are handled via cloud. Two different implementation environments to increase the accuracy of the data are used - the enterprise and the university environment. The verification of the formalized methodics contains the architecture proposal, the infrastructure and implementation proposal, and testing of the virtualized technologies. The undertaken research had aim to identify the life cycle of the data, that are stored in the virtualized environment (where the observed constituents are the implementation environment requirements, the origin of the data, the data sensitivity, the integrity preservation and secrecy of the data, and the linking between the virtualized environment and hardware). As generalized methodics, there we can find the available algorithms, standards, and security protocols which are recomm
Název v anglickém jazyce
The methodology for implementation of cloud computing in the enterprise and universities
Popis výsledku anglicky
This article analyzes the process of the implementation of cloud computing in a university environment. The goal of the implementation is to enhance the security of the data, that are handled via cloud. Two different implementation environments to increase the accuracy of the data are used - the enterprise and the university environment. The verification of the formalized methodics contains the architecture proposal, the infrastructure and implementation proposal, and testing of the virtualized technologies. The undertaken research had aim to identify the life cycle of the data, that are stored in the virtualized environment (where the observed constituents are the implementation environment requirements, the origin of the data, the data sensitivity, the integrity preservation and secrecy of the data, and the linking between the virtualized environment and hardware). As generalized methodics, there we can find the available algorithms, standards, and security protocols which are recomm
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of 2015 3rd International Conference on Advances in Computing, Electronics and Communication (ACEC)
ISBN
978-1-63248-064-4
ISSN
—
e-ISSN
—
Počet stran výsledku
5
Strana od-do
156-160
Název nakladatele
Institute of Research Engineers and Doctors
Místo vydání
New York
Místo konání akce
Curych
Datum konání akce
10. 10. 2015
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—