1,790 research outputs found

    Core elements in information security accountability in the cloud

    Get PDF
    This paper proposes 9 core elements of information security accountability in the area of cloud computing. The core elements were determined via a series of 18 case studies with Omani government organisations that were actively using and/or providing cloud computing. 36 interviews were conducted and then analysed using a grounded theory methodology As a result of the analysis, responsibility, transparency, assurance, remediation, accountability support environment, flexible change process, collaboration, mechanisms and commitment to external criteria. The research also found that the emphasis on specific core elements is context-dependent and that there was considerable variation in emphasis amongst the case study organisations

    Literature-based analysis of the influences of the new forces on ISMS: A conceptual framework

    Get PDF
    This paper presents an analysis that arose from a comprehensive review of the academic and professional literature of two areas ā€“ information security management systems (ISMS) and information resources ā€“ and their relationship with information security. It analyzes the role of ISMS in protecting an organizationā€™s information environment and infrastructure. It has identified four key areas that strongly influence the safety of information resources: cloud computing; social media/networking; mobility; and information management/big data. Commonly referred to as ā€˜new forcesā€™, these four aspects are all growing exponentially and are not easily controlled by IT. Another key finding of the paper is that organizations aiming to protect their information resources need to adapt their ISMS in an environment where these new forces have exposed them to a range of external entities and influences

    A Conceptual Framework for Accountability in Cloud Computing Service Provision

    Get PDF
    This paper uses a comprehensive review of the academic and professional literature in relation to accountability in the area of cloud computing service provision. It identifies four key conceptual factors that are necessary for an organisation to be considered as accountable. The four factors were found to be: responsibility, assurance, transparency and remediation. A key finding of the paper is that in order to be considered as an accountable cloud service provider, all four factors need to be implemented and be demonstrable by the organisation

    Application of quasi-Monte Carlo methods to PDEs with random coefficients -- an overview and tutorial

    Full text link
    This article provides a high-level overview of some recent works on the application of quasi-Monte Carlo (QMC) methods to PDEs with random coefficients. It is based on an in-depth survey of a similar title by the same authors, with an accompanying software package which is also briefly discussed here. Embedded in this article is a step-by-step tutorial of the required analysis for the setting known as the uniform case with first order QMC rules. The aim of this article is to provide an easy entry point for QMC experts wanting to start research in this direction and for PDE analysts and practitioners wanting to tap into contemporary QMC theory and methods.Comment: arXiv admin note: text overlap with arXiv:1606.0661

    A Dimension-Adaptive Multi-Index Monte Carlo Method Applied to a Model of a Heat Exchanger

    Full text link
    We present an adaptive version of the Multi-Index Monte Carlo method, introduced by Haji-Ali, Nobile and Tempone (2016), for simulating PDEs with coefficients that are random fields. A classical technique for sampling from these random fields is the Karhunen-Lo\`eve expansion. Our adaptive algorithm is based on the adaptive algorithm used in sparse grid cubature as introduced by Gerstner and Griebel (2003), and automatically chooses the number of terms needed in this expansion, as well as the required spatial discretizations of the PDE model. We apply the method to a simplified model of a heat exchanger with random insulator material, where the stochastic characteristics are modeled as a lognormal random field, and we show consistent computational savings

    La Plume De Ma Tante

    Get PDF
    Title Onlyhttps://scholarsjunction.msstate.edu/cht-sheet-music/8037/thumbnail.jp

    Hot new directions for quasi-Monte Carlo research in step with applications

    Full text link
    This article provides an overview of some interfaces between the theory of quasi-Monte Carlo (QMC) methods and applications. We summarize three QMC theoretical settings: first order QMC methods in the unit cube [0,1]s[0,1]^s and in Rs\mathbb{R}^s, and higher order QMC methods in the unit cube. One important feature is that their error bounds can be independent of the dimension ss under appropriate conditions on the function spaces. Another important feature is that good parameters for these QMC methods can be obtained by fast efficient algorithms even when ss is large. We outline three different applications and explain how they can tap into the different QMC theory. We also discuss three cost saving strategies that can be combined with QMC in these applications. Many of these recent QMC theory and methods are developed not in isolation, but in close connection with applications

    Clinical Relevance of Nontuberculous Mycobacteria, Oman

    Get PDF
    Little is known about the clinical relevance of nontuberculous mycobacteria (NTM) in the Arabian Peninsula. We assessed the prevalence and studied a random sample of isolates at a reference laboratory in Muscat, Oman. NTM cause disease in this region, and their prevalence has increased
    • ā€¦
    corecore