АНАЛІЗ ПРОЦЕСУ ВПРОВАДЖЕННЯ ХМАРНИХ ТЕХНОЛОГІЙ У СВІТІ
Анотація
Analysis of cloud technology implementation in the world
Analysis of cloud technology development in different states of the world is conducted. The main ways of novel information and communication technology development are defined. The model of cloud protection, which contains specific recommendations related to various security functions and combines best practices of asset protection while using cloud services, is proposed. The governmental measures of particular countries conducted to improve the quality of service and improve security are described.
Посилання
2013 BSAGlobal Cloud Computing Scorecard [Електронний ресурс]. — Режим доступу: http://cloudscorecard.bsa.org/2013/assets/PDFs/BSA_GlobalCloudScorecard2013.pdf.
Безопасность в облаке / Cisco [Електронний ресурс]. – Режим доступу: http://www.cisco.com/ web/UA/about/news/2011/11152011b.html.
Kroes Neelie. Towards a EuropeanCloudComputingStrategy / NeelieKroes [Electronicresource]. — Modeofaccess: http://europa.eu/rapid/pressReleasesAction.do?referen ce=SPEECH/11/50.
European Union Agency for Network and Information Security Science and Technology Park of Crete (ITE) Vassilika Vouton, 700 13, Heraklion, Greece.
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Світлана Ігорівна Рабченюк, Р. Б. Прус
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.