Tim Grance's scientific contributions

Citations

... "A model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction" (Assante et al., 2016;Mell & Grance, 2011) Mell and Grance (2011) extend this NIST definition to include the following: ...
... CC is a relatively recent advanced technology which has changed the concept of computing considerably. CC is defined by the U.S. National Institute of Standards and Technology (NIST), as the pooling of resources to be shared appropriately to meet the requirements of users with respect to accessing resources, storing data and processing data [6]. Accordingly, it is possible that many organisations, academia or industries can take advantage of the concept of CC to facilitate their works and the services they provide to the enduser. ...
... It is a new computing paradigm, according to which companies rent computer system resources on demand, without direct active management of it. Cloud computing systems enable access to a shared pool of resources such as servers, storage, and applications [1,2]. Organization of resources improves the performance, utilization of resources, and energy consumption management [3]. ...
... A higher-level classification of patterns is proposed in a paper from 2021 [16], and integrates the cloud service models IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) and SaaS (Software-as-a-Service) as a basis [24]. It defines Migrate to IaaS, Migrate to PaaS, Replace by SaaS, Revise based on SaaS and Reengineer to SaaS. ...
... The SAJACC communication strategy is built on creating cloud computing use cases that are known to work and can easily be used by cloud users, providers, and extensible. Badger and Grance indicate that -use cases will provide insight on how clouds can work‖ (Badger and Grance, 2010). ...
... -If an unauthorized party gets hold of credentials by for example phishing, information runs a risk of being changed or deleted by that party [15]. ...
... A recent example is a zero-day vulnerability discovered in Microsoft Windows in June 2019, that was targeting local escalation privileges [14]. Generally, when a zero-day attack is discovered, it gets added to the publicly shared Common Vulnerabilities and Exposures (CVE) list [15]. Known security vulnerabilities are defined using a CVE code and severity level [15], and shared amongst the community for immediate action. ...