期刊文献+
共找到5,471篇文章
< 1 2 250 >
每页显示 20 50 100
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
1
作者 N’golo Konate Tenan Yeo 《Journal of Information Security》 2024年第4期419-432,共14页
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se... The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets. 展开更多
关键词 cloud Computing Information Security Multi-Agent system IAAS Malware Propagation
下载PDF
Cloud Control Systems 被引量:13
2
作者 Yuanqing Xia 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第2期134-142,共9页
The concept of cloud control systems is discussed in this paper, which is an extension of networked control systems (NCSs). With the development of internet of things (IOT), the technology of NCSs has played a key rol... The concept of cloud control systems is discussed in this paper, which is an extension of networked control systems (NCSs). With the development of internet of things (IOT), the technology of NCSs has played a key role in IOT. At the same time, cloud computing is developed rapidly, which provides a perfect platform for big data processing, controller design and performance assessment. The research on cloud control systems will give new contribution to the control theory and applications in the near future. © 2014 Chinese Association of Automation. 展开更多
关键词 Big data cloud computing Computation theory Control systems Control theory Controllers Data handling Distributed computer systems Embedded systems Internet of things
下载PDF
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications 被引量:8
3
作者 Arif Sari 《Journal of Information Security》 2015年第2期142-154,共13页
Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of c... Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security. 展开更多
关键词 ANOMALY DETECTION systemS cloud COMPUTING cloud Environment Intrustion DETECTION systemS cloud Security
下载PDF
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture 被引量:3
4
作者 Amir Mohamed Talib Rodziah Atan +1 位作者 Rusli Abdullah Masrah Azrifah Azmi Murad 《Journal of Information Security》 2012年第4期295-306,共12页
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents. 展开更多
关键词 cloud COMPUTING MULTI-AGENT system cloud Data STORAGE Security Framework cloud Service PROVIDER
下载PDF
Convex decomposition of concave clouds for the ultra-short-term power prediction of distributed photovoltaic system 被引量:1
5
作者 蔡世波 Tong Jianjun +3 位作者 Bao Guanjun Pan Guobing Zhang Libin Xu Fang 《High Technology Letters》 EI CAS 2016年第3期305-312,共8页
Concave clouds will cause miscalculation by the power prediction model based on cloud ieatures for distributed photovoltaic (PV) plant. The algorithm for decomposing concave cloud into convex images is proposed. Ado... Concave clouds will cause miscalculation by the power prediction model based on cloud ieatures for distributed photovoltaic (PV) plant. The algorithm for decomposing concave cloud into convex images is proposed. Adopting minimum polygonal approximation (MPP) to demonstrate the contour of concave cloud, cloud features are described and the subdivision lines of convex decomposition for the concave clouds are determined by the centroid point scattering model and centroid angle func- tion, which realizes the convex decomposition of concave cloud. The result of MATLAB simulation indicates that the proposed algorithm can accurately detect cloud contour comers and recognize the concave points. The proposed decomposition algorithm has advantages of less time complexity and decomposition part numbers compared to traditional algorithms. So the established model can make the convex decomposition of complex concave clouds completely and quickly, which is available for the existing prediction algorithm for the ultra-short-term power output of distributed PV system based on the cloud features. 展开更多
关键词 distributed photovohaic (PV) system cloud features model centroid point scat-tering model convex decomposition
下载PDF
基于CloudSim的电力系统计算云原生模型与仿真方法 被引量:1
6
作者 陈元榉 刘媛媛 +3 位作者 张延旭 蔡煜 胡春潮 蔡泽祥 《电力自动化设备》 EI CSCD 北大核心 2024年第9期189-196,204,共9页
分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,... 分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,分析电力云任务调配时的资源供需平衡问题。建立基于微服务的电力云任务模型,分析微服务的处理时序逻辑及其层级关系并生成微服务队列。据此提出微服务的动态调配模型,采用微服务-容器映射策略与实体动态整合策略,实现微服务在实体间的动态映射。利用CloudSim进行仿真分析,结果证明所提方法可行且有效,可为电力云计算的资源配置、任务调度等提供基本的仿真工具与方法。 展开更多
关键词 电力系统 cloudSim 云原生建模 电力系统计算架构 动态调配 时序逻辑 微服务队列
下载PDF
Transition from the Southern Mode of the Mei-yu Front Cloud System to Other Leading Modes 被引量:1
7
作者 QIN Danyu LI Bo HUANG Yong 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2014年第4期948-961,共14页
Based on normalized six-hourly black body temperature (TBB) data of three geostationary meteorological satellites,the leading modes of the mei-yu cloud system between 1998 and 2008 were extracted by the Empirical Or... Based on normalized six-hourly black body temperature (TBB) data of three geostationary meteorological satellites,the leading modes of the mei-yu cloud system between 1998 and 2008 were extracted by the Empirical Orthogonal Function (EOF) method,and the transition processes from the first typical leading mode to other leading modes were discussed and compared.The analysis shows that,when the southern mode (EOF1) transforms to the northeastern mode (EOF3),in the mid-troposphere,a low trough develops and moves southeastward over central and eastern China.The circulation pattern is characterized by two highs and one low in the lower troposphere.A belt of low pressure is sandwiched between the weak high over central and western China and the strong western North Pacific subtropical high (WNPSH).Cold air moves southward along the northerly flow behind the low,and meets the warm and moist air between the WNPSH and the forepart of the low trough,which leads to continuous convection.At the same time,the central extent of the WNPSH increases while its ridge extends westward.In addition,transitions from the southern mode to the dual centers mode and the tropical-low-influenced mode were found to be atypical,and so no common points could be concluded.Furthermore,the choice of threshold value can affect the number of samples discussed. 展开更多
关键词 black body temperature mei-yu front cloud system leading modes mode transition
下载PDF
Multi-objective workflow scheduling in cloud system based on cooperative multi-swarm optimization algorithm 被引量:2
8
作者 YAO Guang-shun DING Yong-sheng HAO Kuang-rong 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第5期1050-1062,共13页
In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired ... In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired by division of the same species into multiple swarms for different objectives and information sharing among these swarms in nature, each physical machine in the data center is considered a swarm and employs improved multi-objective particle swarm optimization to find out non-dominated solutions with one objective in MSMOOA. The particles in each swarm are divided into two classes and adopt different strategies to evolve cooperatively. One class of particles can communicate with several swarms simultaneously to promote the information sharing among swarms and the other class of particles can only exchange information with the particles located in the same swarm. Furthermore, in order to avoid the influence by the elastic available resources, a manager server is adopted in the cloud data center to collect the available resources for scheduling. The quality of the proposed method with other related approaches is evaluated by using hybrid and parallel workflow applications. The experiment results highlight the better performance of the MSMOOA than that of compared algorithms. 展开更多
关键词 MULTI-OBJECTIVE WORKFLOW scheduling multi-swarm OPTIMIZATION particle SWARM OPTIMIZATION (PSO) cloud computing system
下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
9
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet cloud COMPUTING MOBILE agent system SUBJECTIVE TRUST dynamic TRUST management
下载PDF
Locally Minimum Storage Regenerating Codes in Distributed Cloud Storage Systems 被引量:2
10
作者 Jing Wang Wei Luo +2 位作者 Wei Liang Xiangyang Liu Xiaodai Dong 《China Communications》 SCIE CSCD 2017年第11期82-91,共10页
In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth... In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth regenerating(MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage regenerating(LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group(4, 2) or(5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. Theoretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively. 展开更多
关键词 distributed cloud storage systems minimum storage regenerating(MSR) codes locally repairable codes(LRC) repair bandwidth overhead disk I/O overhead
下载PDF
LOD Cloud Mining for Prognosis Model(Case Study: Native App for Drug Recommender System)
11
作者 Nidhi Kushwaha Raman Goyal +2 位作者 Pramiti Goel Sidharth Singla Om Prakash Vyas 《Advances in Internet of Things》 2014年第3期20-28,共9页
The goal of this project is to use the Semantic Web Technologies and Data Mining for disease diagnosis to assist health care professionals regarding the possible medication and drug to prescribe (Drug recommendation) ... The goal of this project is to use the Semantic Web Technologies and Data Mining for disease diagnosis to assist health care professionals regarding the possible medication and drug to prescribe (Drug recommendation) according to the features of the patient. Numerous Decision Support Systems (DSS) and Expert Systems allow medical collaboration, like in the differential diagnosis specific or general. But, a medical recommendation system using both Semantic Web technologies and Data mining has not yet been developed which initiated this work. However, it should be mentioned that there are several system references about medicine or active ingredient interactions, but their final goal is not the Drug recommendation which uses above technologies. With this project we try to provide an assistant to the doctor for better recommendations. The patient will also able to use this system for explanation of drugs, food interaction and side effects of corresponding drugs. 展开更多
关键词 Linked Life DRUG DATA cloud RECOMMENDER system DATA MINING Semantic Web
下载PDF
Audio Highlight Detection Method for Cloud-Based Multimedia Service System
12
作者 李祺 徐国爱 +1 位作者 田斌 张淼 《China Communications》 SCIE CSCD 2011年第6期51-57,共7页
With the development of cloud-based data centers and multimedia technologies, cloud-based multimedia service systems have been paid more and more attention. Audio highlights detection plays an important role in the cl... With the development of cloud-based data centers and multimedia technologies, cloud-based multimedia service systems have been paid more and more attention. Audio highlights detection plays an important role in the cloud-based multimedia service system. In this paper, we proposed a novel highlight detection method to extract the audio highlight effects for the cloud-based multimedia service system using the unsupervised approach. In the proposed method, we first extract the audio features for each audio document. Then the spectral clustering scheme was used to decompose the audio document into several audio effects. Then, we introduce the TF-IDF method to label the highlight effect. We design some experiments to evaluate the performance of the proposed method, and the experimental results show that our method can achieve satisfying results. 展开更多
关键词 cloud multimedia service system audio highlight detection audio content analysis unsupervised approach
下载PDF
A cloud-based fuzzy approach for spatial site selection in decision support system
13
作者 FU Xiao-xi Byeong-Seob You +2 位作者 XIA Ying Gyung-Bae Kim Hae-Young Bae 《重庆邮电大学学报(自然科学版)》 2007年第3期328-334,共7页
In decision support system for spatial site selection, the fuzzy synthetic evaluation is a useful way. However, the method can’t pay attention to the randomness in factors. To remedy the problem, this paper proposes ... In decision support system for spatial site selection, the fuzzy synthetic evaluation is a useful way. However, the method can’t pay attention to the randomness in factors. To remedy the problem, this paper proposes a clouded-base fuzzy approach which combines advantages of cloud transform and fuzzy synthetic evaluation. The cloud transform considers the randomness in the factors and product the higher concept layer for data mining. At the same time, the check mechanism controls the quality of partitions in factors. Then the fuzzy approach was used to get final evaluation value with randomness and fuzziness. It make the final result is optimization. Finally, performance evaluations show that this approach spent less runtime and got more accuracy than the fuzzy synthetic. The experiments prove that the proposed method is faster and more accuracy than the original method. 展开更多
关键词 决策支持系统 模糊方法 云层理论 空间选址 数据库
下载PDF
Use of Dynamical Systems Modeling to Hybrid Cloud Database 被引量:1
14
作者 Evgeniy V. Pluzhnik Evgeny V. Nikulchev 《International Journal of Communications, Network and System Sciences》 2013年第12期505-512,共8页
In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local par... In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of specialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems. 展开更多
关键词 Hybrid cloud DATABASE cloud COMPUTING Time of QUERY DYNAMICAL systems Control THEORY
下载PDF
CSRecommender: A Cloud Service Searching and Recommendation System
15
作者 John Wheal Yanyan Yang 《Journal of Computer and Communications》 2015年第6期65-73,共9页
Cloud Computing and in particular cloud services have become widely used in both the technology and business industries. Despite this significant use, very little research or commercial solutions exist that focus on t... Cloud Computing and in particular cloud services have become widely used in both the technology and business industries. Despite this significant use, very little research or commercial solutions exist that focus on the discovery of cloud services. This paper introduces CSRecommender—a search engine and recommender system specifically designed for the discovery of these services. To engineer the system to scale, we also describe the implementation of a Cloud Service Identifier which enables the system to crawl the Internet without human involvement. Finally, we examine the effectiveness and usefulness of the system using real-world use cases and users. 展开更多
关键词 cloud COMPUTING SEARCH Engine RECOMMENDATION system Information RETRIEVAL
下载PDF
Toward Cloud-Based Parking Facility Management System: A Preliminary Study 被引量:1
16
作者 Chung-Yang Chen Wen-Lung Tsai Tzu-Yin Chen 《Journal of Electronic Science and Technology》 CAS 2013年第2期181-186,共6页
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa... An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time. 展开更多
关键词 cloud-based construction e-tag parking facility management system radio-frequencyidentification.
下载PDF
基于Spring Cloud的电商平台系统设计与实现
17
作者 赵春辉 《广西民族大学学报(自然科学版)》 CAS 2024年第3期97-103,共7页
互联网技术发展较快,电商平台已成为现代商业的重要组成部分,Spring Cloud微服务架构为电商平台提供技术支持。文章分析了电商平台业务需求,确定系统的功能模块,基于Spring Cloud构建微服务架构,实现了服务的拆分与独立部署。通过性能... 互联网技术发展较快,电商平台已成为现代商业的重要组成部分,Spring Cloud微服务架构为电商平台提供技术支持。文章分析了电商平台业务需求,确定系统的功能模块,基于Spring Cloud构建微服务架构,实现了服务的拆分与独立部署。通过性能测试发现系统存在的问题,提出相应解决措施,为电商平台的设计提供参考依据。 展开更多
关键词 Spring cloud 电商 平台系统 设计
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
18
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud DATA Information Model Data Storage cloud Computing Security system Data Encryption
下载PDF
A Framework for Cloud Validation in Pharma
19
作者 Pravin Ullagaddi 《Journal of Computer and Communications》 2024年第9期103-118,共16页
The pharmaceutical industry’s increasing adoption of cloud-based technologies has introduced new challenges in computerized systems validation (CSV). This paper explores the evolving landscape of cloud validation in ... The pharmaceutical industry’s increasing adoption of cloud-based technologies has introduced new challenges in computerized systems validation (CSV). This paper explores the evolving landscape of cloud validation in pharmaceutical manufacturing, focusing on ensuring data integrity and regulatory compliance in the digital era. We examine the unique characteristics of cloud-based systems and their implications for traditional validation approaches. A comprehensive review of current regulatory frameworks, including FDA and EMA guidelines, provides context for discussing cloud-specific validation challenges. The paper introduces a risk-based approach to cloud CSV, detailing methodologies for assessing and mitigating risks associated with cloud adoption in pharmaceutical environments. Key considerations for maintaining data integrity in cloud systems are analyzed, particularly when applying ALCOA+ principles in distributed computing environments. The article presents strategies for adapting traditional Installation Qualification (IQ), Operational Qualification (OQ), and Performance Qualification (PQ) models to cloud-based systems, highlighting the importance of continuous validation in dynamic cloud environments. The paper also explores emerging trends, including integrating artificial intelligence and edge computing in pharmaceutical manufacturing and their implications for future validation strategies. This research contributes to the evolving body of knowledge on cloud validation in pharmaceuticals by proposing a framework that balances regulatory compliance with the agility offered by cloud technologies. The findings suggest that while cloud adoption presents unique challenges, a well-structured, risk-based approach to validation can ensure the integrity and compliance of cloud-based systems in pharmaceutical manufacturing. 展开更多
关键词 Computerized systems Validation Risk-Based Approach Data Integrity Pharmaceutical Manufacturing cloud Validation
下载PDF
NFCloud:基于OpenContrail的NFV实践 被引量:2
20
作者 温曙光 贺鹏 +2 位作者 姜海洋 关洪涛 谢高岗 《信息通信技术》 2016年第1期37-44,共8页
网络功能虚拟化在云计算、虚拟化和SDN技术上运行虚拟的网络功能。对于数通领域的NFV平台,要能为物理网络提供多租户的服务,服务包括服务链和云主机两种模式。文章介绍的NFCloud,是在Opencontrail上进行扩充和改进的NFV平台,具有良好的... 网络功能虚拟化在云计算、虚拟化和SDN技术上运行虚拟的网络功能。对于数通领域的NFV平台,要能为物理网络提供多租户的服务,服务包括服务链和云主机两种模式。文章介绍的NFCloud,是在Opencontrail上进行扩充和改进的NFV平台,具有良好的适用性;并详细分析了NFCloud平台为应对服务提供商要求的高性能和高可用所面临的挑战和解决方法。 展开更多
关键词 网络功能虚拟化 云计算 系统优化 高可用性
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部