期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Light-Weighted Decision Support Framework for Selecting Cloud Service Providers
1
作者 Abdulmajeed Aljuhani Abdulaziz Alhubaishy +1 位作者 Mohammad Khalid Imam Rahmani Ahmad A.Alzahrani 《Computers, Materials & Continua》 SCIE EI 2023年第2期4293-4317,共25页
Multi-criteria decision making(MCDM)is a technique used to achieve better outcomes for some complex business-related problems,whereby the selection of the best alternative can be made in as many cases as possible.This... Multi-criteria decision making(MCDM)is a technique used to achieve better outcomes for some complex business-related problems,whereby the selection of the best alternative can be made in as many cases as possible.This paper proposes a model,the multi-criteria decision support method,that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling.The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider.Each consumer seeks a service provider based on various preferences,such as price,service quality,and time to complete the tasks.In the literature,the problem is viewed from different perspectives,such as investigating how to enhance task scheduling and the resource allocation process,improve consumers’trust,and deal with network problems.This paper offers a novel model that considers the preferences of both service providers and consumers to find the best available service provider for each consumer.First,the model adopts the best-worst method(BWM)to gather and prioritize tasks based on consumers’and service providers’preferences.Then,the model calculates and matches similarities between the sets of tasks from the consumer’s side with the sets of tasks from the provider’s side to select the best service provider for each consumer using the two proposed algorithms.The complexity of the two algorithms is found to be O(n3). 展开更多
关键词 Best worst method BWM cloud service provider decision support methods
下载PDF
Survival Analysis of Logistics Service Providers: An Empirical Study of Chengdu, Area in China
2
作者 Guoqi Li Yihuan Tu +4 位作者 Lihao Duan Jin Zhang Lei Huang Wanshan Wu Zhuoshi Lv 《Open Journal of Statistics》 2020年第6期915-935,共21页
This paper worked on a sample of 6791 logistics establishments registered in Chengdu, China over the period 1984-2016 to understand the survival status of </span><span style="font-family:Verdana;"&g... This paper worked on a sample of 6791 logistics establishments registered in Chengdu, China over the period 1984-2016 to understand the survival status of </span><span style="font-family:Verdana;">logistics service providers (LSPs) by non-parametric Kaplan-Meier estimation, together with Cox proportional hazard regression model, to identify factors affecting the failure of LSPs. In particular, it studies the interaction effect between LSPs’ size and entry timing and location. The empirical results show that: 1) Regarding the survival time, 1365 of the 6791 sample LSPs exited from the market by 2017. The exit rate is 20.1%, and the average life of the 6791 LSPs is about 6 years. 2) The survival of LSPs depends on their typology, ownership structure. And there is no significant difference in the probability of survival for both independent LSPs and logistics branches after controlling the effects of other variables. 3) Location and entry timing also play an important role in the survival of small-scale LSPs, but these factors cannot explain large-scale LSPs’ failure. 展开更多
关键词 Logistics service providers Survival Analysis Kaplan-Meier Estimation Cox Proportional Hazard Regression
下载PDF
China Network ── China's Internet Service Provider(ISP) Progresses Amid Difficulties
3
《China's Foreign Trade》 1999年第2期24-27,共4页
关键词 ISP Progresses Amid Difficulties China’s Internet service provider China Network
下载PDF
Bi-Level Bidding and Multi-Energy Retail Packages for Integrated Energy Service Providers Considering Multi-Energy Demand Elasticity
4
作者 Xun Dou Jun Wang +1 位作者 Qinran Hu Yang Li 《CSEE Journal of Power and Energy Systems》 SCIE EI 2024年第4期1761-1774,共14页
How to effectively use the multi-energy demand elasticity of users to bid in the multi-energy market and formulate multi-energy retail packages is an urgent problem which needs to be solved by integrated energy servic... How to effectively use the multi-energy demand elasticity of users to bid in the multi-energy market and formulate multi-energy retail packages is an urgent problem which needs to be solved by integrated energy service providers(IESPs)to attract more users and reduce operating costs.This paper presents a unified clearing of electricity and natural gas based on a bi-level bidding and multi-energy retail price formulation method for IESPs considering multi-energy demand elasticity.First,we propose an operating structure of IESPs in the wholesale and retail energy markets.The multi-energy demand elasticity model of retail-side users and a retail price model for electricity,gas,heat and cooling are established.Secondly,a bi-level bidding model for IESPs considering multi-energy demand elasticity is established to provide IESPs with wholesale-side bidding decisions and retail-side energy retail price decisions.Finally,an example is given to verify the proposed method.The results show that the method improves the total social welfare of the electricity and natural gas markets by 7.99%and the profit of IESPs by 1.40%.It can reduce the variance of the electricity,gas,and cooling load curves,especially the reduction of the variance of the electricity load curve can which reach 79.90%.It can be seen that the research in this paper has a positive effect on repairing the limitations of integrated energy trading research and improving the economics of the operation of IESPs. 展开更多
关键词 Bi-level bidding integrated energy service providers multi-energy demand elasticity multi-energy retail packages unified clearing of electricity and natural gas
原文传递
Cloud-Based Software Development Lifecycle:A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis
5
作者 Santhosh S Narayana Swamy Ramaiah 《Big Data Mining and Analytics》 EI CSCD 2023年第2期127-138,共12页
At present,hundreds of cloud vendors in the global market provide various services based on a customer’s requirements.All cloud vendors are not the same in terms of the number of services,infrastructure availability,... At present,hundreds of cloud vendors in the global market provide various services based on a customer’s requirements.All cloud vendors are not the same in terms of the number of services,infrastructure availability,security strategies,cost per customer,and reputation in the market.Thus,software developers and organizations face a dilemma when choosing a suitable cloud vendor for their developmental activities.Thus,there is a need to evaluate various cloud service providers(CSPs)and platforms before choosing a suitable vendor.Already existing solutions are either based on simulation tools as per the requirements or evaluated concerning the quality of service attributes.However,they require more time to collect data,simulate and evaluate the vendor.The proposed work compares various CSPs in terms of major metrics,such as establishment,services,infrastructure,tools,pricing models,market share,etc.,based on the comparison,parameter ranking,and weightage allocated.Furthermore,the parameters are categorized depending on the priority level.The weighted average is calculated for each CSP,after which the values are sorted in descending order.The experimental results show the unbiased selection of CSPs based on the chosen parameters.The proposed parameter-ranking priority level weightage(PRPLW)algorithm simplifies the selection of the best-suited cloud vendor in accordance with the requirements of software development. 展开更多
关键词 cloud-based software development life cycle(SDLC) cloud evaluation parameter-ranking priority level weightage(PRPLW)algorithm cloud service providers software engineering
原文传递
Civil unmanned aircraft system operation in national airspace: A survey from Air Navigation Service Provider perspective 被引量:5
6
作者 Zhaoxuan LIU Kaiquan CAI Yanbo ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第3期200-224,共25页
Unmanned Aircraft Systems(UASs) have advanced technologically and surged exponentially over recent years. Currently, due to safety concerns, most civil operations of UAS are conducted in low-level uncontrolled area or... Unmanned Aircraft Systems(UASs) have advanced technologically and surged exponentially over recent years. Currently, due to safety concerns, most civil operations of UAS are conducted in low-level uncontrolled area or in segregated controlled airspace. As the industry progresses, both operational and technological capabilities have matured to the point where UASs are expected to gain greater freedom of access to both controlled and uncontrolled airspace. Extensive technical and regulatory surveys have been conducted to enable the expanded operations. However, most surveys are derived from the perspective of UAS own operating mechanism and barely consider interactions of their non-segregated activities with the Air Traffic Management(ATM) system. Hence, to fill the gap, this paper presents a survey conducted from the perspective of Air Navigation Service Provider(ANSP), which serves to accommodate these new entrants to the overall national airspace while continuing flight safety and efficiency. The primary objectives of this paper are to:(A) describe what typical ANSP-supplied UAS Traffic Management(UTM) architecture is required to facilitate all types of civil UAS operations;(B) identify three major ANSP considerations on how UAS can be accommodated safely in civil airspace;(C) outline future directions and challenges related with UAS operations for the ANSP. 展开更多
关键词 Air Navigation service provider Airspace Organization and Management Air Traffic Control Air Traffic Management Air traffic service provision Unmanned Aircraft System UAS Traffic Management
原文传递
Management of dog bites by frontline service providers in primary healthcare facilities in the Greater Accra Region of Ghana,2014-2015 被引量:1
7
作者 Ernest Kenu Vincent Ganu +2 位作者 Charles Lwanga Noora Richard Adanu Margaret Lartey 《Infectious Diseases of Poverty》 SCIE 2018年第1期189-198,共10页
Background:Dog bites are common in developing countries including Ghana,with the victims often being children.Although some breeds of dogs have been identified as being more aggressive than others,all dog bites carry ... Background:Dog bites are common in developing countries including Ghana,with the victims often being children.Although some breeds of dogs have been identified as being more aggressive than others,all dog bites carry a risk of infection.Immediate and initial assessment of the risk for tetanus and rabies infection with appropriate interventions such as wound management and subsequent selection of prophylactic antibiotics are essential in the management of dog bites.This study examined the management of patients with dog bites by frontline service providers at primary healthcare facilities in the Greater Accra Region,Ghana.Methods:We conducted a cross-sectional study in 66 public health facilities in the Greater Accra Region from July 2014 to April 2015.Up to four frontline service providers were randomly selected to participate from each facility.A structured questionnaire was administered to all consenting participants.Continuous variables were presented as means and standard deviations.The frontline service providers’knowledge was assessed as a discrete variable and values obtained presented as percentages and proportions.The chi-square test of proportions was used to determine any significant associations between the various categories of the frontline service providers and their knowledge about the management of rabies.Results:Regarding the frontline service providers’knowledge about rabies,57.8%(134/232)were correct in that the rabies virus is the causative agent of rabies,39.2%(91/232)attributed it to a dog bite,2.6%(6/232)did not know the cause,and one person(0.4%)attributed it to the herpes virus.Only 15.5%(36/232)knew the incubation period in dogs and the period required to observe for signs of a rabies infection.With respect to the administration of rabies immunoglobulin,42.2%(98/232)of the frontline service providers did not know how to administer it.Of the facilities visited,76%(50/66)did not have the rabies vaccines and 44%(102/232)of frontline service providers did not know where to get the rabies vaccines from.Most of the service providers(87.9%;204/232)had never reported either a dog bite or a suspected case of rabies.Overall,there was gross underreporting of dog bites and suspected rabies cases at public healthcare facilities in the Greater Accra Region of Ghana.Conclusions:In view of the high morbidity and mortality associated with bites from rabid dogs and the poor knowledge and practices of frontline service providers,there is an urgent need for capacity-building such as training in the management of dog bites and subsequent potential rabies infection. 展开更多
关键词 Dog bites RABIES Frontline service providers Healthcare facilities Greater Accra Region Ghana
原文传递
How different types of financial service providers support small- and mediumenterprises under the impact of COVID-19 pandemic: From the perspective of expectancy theory 被引量:1
8
作者 Hua Song Yudong Yang Zheng Tao 《Frontiers of Business Research in China》 2020年第4期448-474,共27页
The 2019 novel coronavirus disease(COVID-19)pandemic has significantly impacted several aspects of the society and the economy.A problem that needs prompt attention in this situation is the increasing difficulties fac... The 2019 novel coronavirus disease(COVID-19)pandemic has significantly impacted several aspects of the society and the economy.A problem that needs prompt attention in this situation is the increasing difficulties faced by small-and mediumsized enterprises(SMEs)in raising capital,which has aroused great concern from multiple stakeholders such as public administrations and regulators.As the major supply of capital,financial service providers(FSPs)play a critical role in financing SMEs.However,how FSPs deal with SME financing during shocks has not yet been fully researched.Accordingly,in this study,a theoretical framework based on expectancy theory is proposed to explore the expected strategic adjustments of FSPs in financing SMEs.Specifically,this study investigates 272 FSPs in China on their expectancy and attitude on financing to SMEs during the COVID-19 pandemic.Furthermore,this study has divided FSPs into three categories:commercial banks,non-bank financial institutions,and credit-enhanced FSPs.Differences among these categories are compared and analyzed. 展开更多
关键词 2019 novel coronavirus disease(COVID-19)pandemic Financial service providers(FSPs) Expectancy theory Financing to small-and medium-sized enterprises(SMEs)
原文传递
Evaluating and visualizing QoS of service providers in knowledgeintensive crowdsourcing:a combined MCDM approach
9
作者 Shixin Xie Xu Wang +2 位作者 Biyu Yang Longxiao Li Jinfeng Yu 《International Journal of Intelligent Computing and Cybernetics》 EI 2022年第2期215-240,共26页
Purpose-As the number of joined service providers(SPs)in knowledge-intensive crowdsourcing(KI-C)continues to rise,there is an information overload problem for KI-C platforms and consumers to identify qualified SPs to ... Purpose-As the number of joined service providers(SPs)in knowledge-intensive crowdsourcing(KI-C)continues to rise,there is an information overload problem for KI-C platforms and consumers to identify qualified SPs to complete tasks.To this end,this paper aims to propose a quality of service(QoS)evaluation framework for SPs in KI-C to effectively and comprehensively characterize the QoS of SPs,which can aid the efficient selection of qualified SPs.Design/methodology/approach-By literature summary and discussion with the expert team,a QoS evaluation indicator system for SPs in KI-C based on the SERVQUAL model is constructed.In addition,the Decision Making Trial and Evaluation Laboratory(DEMATEL)method is used to obtain evaluation indicators’weights.The SPs are evaluated and graded by the Technique for Order Preference by Similarity to Ideal Solution(TOPSIS)and rank-sum ratio(RSR),respectively.Findings-A QoS evaluation indicator system for SPs in KI-C incorporating 13 indicators based on SERVQUAL has been constructed,and a hybrid methodology combining DEMATEL,TOPSIS and RSR is applied to quantify and visualize the QoS of SPs.Originality/value-The QoS evaluation framework for SPs in KI-C proposed in this paper can quantify and visualize the QoS of SPs,which can help the crowdsourcing platform to realize differentiated management for SPs and assist SPs to improve their shortcomings in a targeted manner.And this is the first paper to evaluate SPs in KI-C from the prospect of QoS. 展开更多
关键词 service provider Knowledge-intensive crowdsourcing QOS DEMATEL TOPSIS RSR
原文传递
Risk identification and prioritization in banking projects of payment service provider companies:An empirical study
10
作者 Mohammad Khalilzadeh Laleh Katoueizadeh Edmundas Kazimieras Zavadskas 《Frontiers of Business Research in China》 2020年第2期145-171,共27页
ldentifying risks and prioritizing is important for payment service provider(PSP)companies to get banking projects and gain more market share.However,studies regarding the identification of risks and causal relationsh... ldentifying risks and prioritizing is important for payment service provider(PSP)companies to get banking projects and gain more market share.However,studies regarding the identification of risks and causal relationships are insufficient in the lranian PSP industry and the industry is unique because of its characteristics.In this study,30 experts involved with PSP companies are employed as the research sample.Eleven key risks and 46 sub-risks are also ientified.Subsequently,the fuzzy decision-making trial and evaluation laboratory technique is applied to determine the effective and affected risks and the severity of their effects on each other.Finally,all risks are ranked.Due to the interal interrelationships of the main risks,the weight of each risk is calculated via the fuzy analytic network process.As the second-level risks have no significant interrelationships,they are ranked via the fuzzy analytical hierarchy process.Moreover,the best-worst method is used to ensure that the obtained rankings are reliable.This study identifies the risks affecting the loss of banking projects and determines the impacts of these risks on each.A sensitivity analysis is then conducted on the weights of the criteria,and the results are compared. 展开更多
关键词 Payment service provider(PSP) Risk identification Risk asessment Fuzzy decision-making trial and evaluation laboratory(DEMATEL) Fuzzy analytic network process(ANP) Best-worst method(BWM) Prioriation
原文传递
BOUNDARY OF CRIMINAL RESPONSIBILITY OF INTERNET SERVICE PROVIDERS -- A LESSON FROM THE QVOD CASE
11
作者 陈璇 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2018年第3期357-366,共10页
The Qvod case in 2016, in which the Chinese video-sharing site Qvod was convicted of the crime of disseminating pornographic materials for profits, provoked heated debates regarding the criminal responsibility of inte... The Qvod case in 2016, in which the Chinese video-sharing site Qvod was convicted of the crime of disseminating pornographic materials for profits, provoked heated debates regarding the criminal responsibility of internet service providers (ISPs) in China. Using the Qvod case as an example, this paper first discusses the definition and the legal obligations of ISPs, and argues that we should decide the criminal responsibility of ISPs according to their functions and the content of their services. This paper further analyzes four major issues associated with the criminal responsibility of ISPs, including accomplice responsibility, accessory with neutral conduct, perpetrator by action or omission and ideal concurrence (Idealkonkurrenz). 展开更多
关键词 the Qvod case internet service provider neutral assisting conduct criminal responsibility
原文传递
Reducing Video Transmission Cost of the Cloud Service Provider with QoS-Guaranteed
12
作者 Pingshan Liu Yemin Sun +2 位作者 Kai Huang Guimin Huang Zhongshu Yu 《国际计算机前沿大会会议论文集》 2022年第1期387-402,共16页
With the advancement of cloud computing technology,many service providers are combining with cloud service providers to build a highly available streaming video-on-demand cloud platform and provide video services to e... With the advancement of cloud computing technology,many service providers are combining with cloud service providers to build a highly available streaming video-on-demand cloud platform and provide video services to end users.Generally,cloud service providers deploy many edge cloud CDN nodes in different geographic areas and provide video services to end users.However,when an end-user wants to watch certain videos and request video resources from surrounding edge cloud CDN nodes,the edge cloud CDN node will request missing video clips from other cloud nodes.Therefore,this will generate a large amount of additional video transmission costs and reduce the quality of service of the cloud service provider.To reduce or even minimize the video transmission cost of edge cloud CDN nodes while ensuring the quality of service(QoS).We designed a video transmission algorithm called Netdmc to ensure transmission quality.The algorithm can be divided into two parts.The first part is a low-latency video request algorithm based on ensuring service quality,and the second part is a video request algorithm based on minimizing video transmission costs.The simulation results demonstrate that the Netdmc algorithm can effectively reduce the cost of cloud service providers and ensure the quality of video services. 展开更多
关键词 Cloud service provider Video transmission cost QOS
原文传递
Information Security in the Cloud: Emerging Trends and Challenges
13
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud service providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
An Adaptive Trust Model of Web Services 被引量:6
14
作者 SUJin-dian GUOHe-qing GAOYin 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期21-25,共5页
This paper proposes a dynamic Web service trust (WS Trust) model, and somecorresponding trust metric evaluation algorithms. The main goal is to evaluate the trustworthinessand predict the future bchaxiors of entities ... This paper proposes a dynamic Web service trust (WS Trust) model, and somecorresponding trust metric evaluation algorithms. The main goal is to evaluate the trustworthinessand predict the future bchaxiors of entities in oeder to help users find trustworthy Web serviceproviders and prevent users from providing unfair ratings against service providers. 展开更多
关键词 web services service provider service broker service requester QOS trustmetric
下载PDF
An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS
15
作者 Ahmed M.Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期4125-4142,共18页
Many businesses have experienced difficulties in selecting a cloud service provider(CSP)due to the rapid advancement of cloud computing services and the proliferation of CSPs.Many independent criteria should be consid... Many businesses have experienced difficulties in selecting a cloud service provider(CSP)due to the rapid advancement of cloud computing services and the proliferation of CSPs.Many independent criteria should be considered when evaluating the services provided by different CSPs.It is a case of multi-criteria decision-making(MCDM).This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method(BOM)and technique for order of preference by similarity to ideal solution(TOPSIS).To obtain the weights of criteria and the relative importance of CSPs based on each criterion,BOM performs pairwise comparisons of criteria and also for alternatives on each criterion,and TOPSIS uses these weights to rank cloud alternatives.An evaluation and validation of the proposed framework have been carried out through a use-case model to prove its efficiency and accuracy.Moreover,the developed framework was compared with the analytical hierarchical process(AHP),a popular MCDM approach,based on two perspectives:efficiency and consistency.According to the research results,the proposed framework only requires 25%of the comparisons needed for the AHP approach.Furthermore,the proposed framework has a CR of 0%,whereas AHP has 38%.Thus,the proposed framework performs better than AHPwhen it comes to computation complexity and consistency,implying that it is more efficient and trustworthy. 展开更多
关键词 Cloud computing(CC) multiple-criteria decision-making(MCDM) cloud service providers(CSPs) analytical hierarchical process(AHP) the best only method(BOM) technique for order of preference by similarity to ideal solution(TOPSIS)
下载PDF
Cloud Services Quality Enhancement through Control &Monitoring of Service Level Agreements at Server and Consumer Side
16
作者 Abel Adane 《Journal of Computer and Communications》 2020年第8期78-90,共13页
Several researches and case studies have been revealing a repetitive issue and that is monopolization of controlling, measuring, and metering of the consumer’s billing for the consumed Cloud Services. The Cloud Servi... Several researches and case studies have been revealing a repetitive issue and that is monopolization of controlling, measuring, and metering of the consumer’s billing for the consumed Cloud Services. The Cloud Service Providers (CSPs) have been hiding, or monopolizing the controlling, metering tools and ignoring the calculation and consideration of the service defects like downtime, service outage, poor performance and client service migration delays during overloads of the servers. The main issues behind these discrepancies are the Service Level Agreement (SLA), its violation, and the monopolized Cloud Governance. Till now there is a lack of parallel monitoring and metering system of the consumed cloud services at the customer level under the provisions of SLAs. The Cloud Governance Tier has not given any flexibility or utility to monitor such consumed cloud services at the client tier in parallel to the CSP tier. This research is an effort to develop a SLA controlling/monitoring framework to solve the identified problems other than the CSP level. Further the E_Draw max was used for designing the framework. The framework consists of the components like;SLA_CSP, SLA_CSC, SLA_M&C and Cloud Services and Delivery Models. After designing the framework, a prototype was developed using CloudSim on java net beans, and MySQL database. This prototype was implemented using four scenarios to evaluate its performance and the functionalities. 1) Checking the SLA under CSP whether the resources to the consumer in the same manner with promised. 2) To check if the request from cloud consumer is less than what is expected in SLA. 3) To check by increasing the request of cloud consumer more than what is expected in SLA and 4) Using the SLA_M&C mechanism. After execution it was observed that, in the first and the second cases there is no violation, but there is violation in the third and fourth cases. This implied that there are chances of the discrepancies in resources provided to make the selves beneficiary beyond SLA under CSP and CSC was discriminated while receiving services from CSP. 展开更多
关键词 Cloud Computing service Consumer Cloud service provider SLA SLA_CSC SLA_CSP SLA_M&C
下载PDF
Respecting Each Other and Being Loyal to ZTE Career Providing Refined Service and Focusing on Customers' Requirements Working Hard to Create Famous ZTE Brand Improving ZTE Efficiency with Scientific Management
17
作者 Hou Weigui 《ZTE Communications》 2003年第1期2-2,共1页
ZTE Corporation is China’s largest listedtelecommunications equipment provider spe-cialized in offering a full range of tailor-madesolutions for customers in high-,middle-andlow-end markets.
关键词 ZTE Requirements Working Hard to Create Famous ZTE Brand Improving ZTE Efficiency with Scientific Management Respecting Each Other and Being Loyal to ZTE Career Providing Refined service and Focusing on Customers on with
下载PDF
BJ to Provide Petroleum Technical Service for PCOC
18
《China Oil & Gas》 CAS 2000年第3期51-51,共1页
关键词 BJ to Provide Petroleum Technical service for PCOC
下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
19
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
下载PDF
Accelerating Quantum Computing Readiness: Risk Management and Strategies for Sectors
20
作者 Abdullah Ibrahim Salman Alsalman 《Journal of Quantum Information Science》 2023年第2期33-44,共12页
The potential impact of quantum computing on various industries such as finance, healthcare, cryptography, and transportation is significant;therefore, sectors face challenges in understanding where to start because o... The potential impact of quantum computing on various industries such as finance, healthcare, cryptography, and transportation is significant;therefore, sectors face challenges in understanding where to start because of the complex nature of this technology. Starting early to explore what is supposed to be done is crucial for providing sectors with the necessary knowledge, tools, and processes to keep pace with rapid advancements in quantum computing. This article emphasizes the importance of consultancy and governance solutions that aid sectors in preparing for the quantum computing revolution. The article begins by discussing the reasons why sectors need to be prepared for quantum computing and emphasizes the importance of proactive preparation. It illustrates this point by providing a real-world example of a partnership. Subsequently, the article mentioned the benefits of quantum computing readiness, including increased competitiveness, improved security, and structured data. In addition, this article discusses the steps that various sectors can take to achieve quantum readiness, considering the potential risks and opportunities in industries. The proposed solutions for achieving quantum computing readiness include establishing a quantum computing office, contracting with major quantum computing companies, and learning from quantum computing organizations. This article provides the detailed advantages and disadvantages of each of these steps and emphasizes the need to carefully evaluate their potential drawbacks to ensure that they align with the sector’s unique needs, goals, and available resources. Finally, this article proposes various solutions and recommendations for sectors to achieve quantum-computing readiness. 展开更多
关键词 Quantum Computing CONSULTANCY Governance Solutions Quantum Readiness Benefits of Quantum Readiness Increased Competitiveness Improved Security Structured Data Quantum Algorithms Quantum service provider CYBERSECURITY Data Management
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部