Trusted by 2+ million users, 1000+ happy students everyday
Article 1Data security issues in cloud-based Software-as-a-Service ERPThis paper discusses the data security issues and concerns that are prevalent when organizations are moving their Enterprise Resource Planning (ERP) systems to the cloud. Cloud computing has reinvented how organizations conduct business and has enabled them to innovate and compete in a dynamic environment through new and innovative business models. The growing popularity and success of the cloud has led to the emergence of cloud-based Software-as-a-Service (SaaS) ERP systems, a new alternative approach to traditional on-premise ERP systems. Cloud-based ERP has a myriad of benefits for organizations. However, infrastructure engineers need to address data security issues before moving their enterprise applications to the cloud. Cloud-based ERP raises specific concerns about the confidentiality and integrity of the data stored in the cloud. Such concerns that affect the adoption of cloud-based ERP are based on the size of the organization. Small to medium enterprises (SMEs) gain the maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more cautious in moving their mission critical enterprise applications to the cloud. A hybrid solution where organizations can choose to keep their sensitive applications on-premise while leveraging the benefits of the cloud is proposed in this paper as an effective solution thatis gaining momentum and popularity for large organizations.Article 2Security, privacy and trust in cloud computing: A comparative study"Use the computer without a computer," this is the dream of all managers who believe in "Cloud Computing". The Cloud has become a dream and an obsession for all fans of thecomputer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume of business activity, its convenience to the common business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this service provides a business function and not the technical components requiring computer skills..., Besides these advantages, there are serious risks related to the use of Cloud computing, such as: temporary or permanent loss of data, security of data, lack of traceability and accountability... These risks are the main challenges faced while adopting a Cloud computing architecture., In this paper, we studied the literature focusing on three major notions on collaborative systems in Cloud computing: Security, privacy and trust. That's why we will try to bring out the main requirements regarding these three concepts from both points of view (user's and provider's), before presenting some related approaches which treat these three concepts.
Article 3Security Perspective in RAMI 4.0Abstract:Cloud Computing, Internet of Things (IoT) are the main technologies contributing to the adoption of the fourth revolution in manufacturing, Industry 4.0 also known as smart manufacturing or digital manufacturing. Smart manufacturing facilitates and accelerates the process of manufacturing with the connection of all the systems related to the manufacturing process starting with the Enterprise Resource Planning (ERP) systems, the Industrial Control Systems (ICSs) which control the production line and the Cyber Physical Systems (CPSs). Before the emerging of web applications, cloud applications and thin clients, ICSs and CPSs were already present but the protocols used for those systems were not designed for the Internet. In this paper, we tackle the security challenges that are accompanied by the emerging of this new technology, the mitigation techniques and the governance and compliance issues associated with it.SECTION II.RAMI 4.0In 2015, the "Platform 4.0" developed the so-called Reference Architecture Model for Industry 4.0 (RAMI 4.0).RAMI 4.0 is a three-dimensional layered model, the first axis is the architecture axis, which consists of six unique levels: Assets, integration, communication, information, functional, and business layers. Detailing the above levels with a bottom up approach, the bottom layer is the "Asset" layer, which actually represents the physical and non-physical layers. Each component or function of the upcoming layersmust be affiliated to an object of the asset layer. The "Integration" layer consists of computerized interaction between the physical layer and the users or software. It mainly falls underneath the umbrella of Information Technology (IT).Article 4Ensuring the security of warehouse using automatic identification by RFIDAbstract:Every company and institution faces the necessity to manage its inventory. For high accuracy, security and easy operation of inventory management system it is necessary to have an easily recognizable identifier on all managed objects. The aim of our present project is to modernize the methods of automatic inventory management and asset protection with the help of the application of radio frequency identification technology
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss