Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Cloud Computing: Strategies For Cloud Computing Adoption, Faith J. Shimba Dec 2010

Cloud Computing: Strategies For Cloud Computing Adoption, Faith J. Shimba

Faith Joel Shimba

The advent of cloud computing in recent years has sparked an interest from different IT stakeholders. This is a result of the new economic model for the IT department that cloud computing promises. The model promises to remove the need for heavy investment for limited IT resources towards renting IT resources and paying based on usage. Although, the adoption of cloud computing promises various benefits to organizations, a successful adoption requires an understanding of different dynamics and expertise in diverse domains. Currently there are inadequate guidelines for adoption and this book proposes a roadmap for cloud computing adoption called ROCCA. …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Dec 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …