Learn More
This paper explains about strengthening the security issues when a cloud user - an individual, an enterprise or any other entity ports all of its data to a cloud vendor so as to reduce the investment cost and to ensure secured data communication to and fro between the cloud user and the cloud vendor. The process of combining traditional user-id and password(More)
The objective of the work is to propose an emergency management system architecture with work flows for activating the needed services by processing the request calls with a context aware approach to enhance the performance and correctness of the system. The integration of heterogeneous communication networks and context aware computing technologies plays(More)
This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of information and communication just as Internet once did. In this paper, IoT definitions from different perspective in academic communities are(More)
  • 1