<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rosen Iliev</style></author><author><style face="normal" font="default" size="100%">Kristina Ignatova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Cloud Technologies for Building Data Centers in Defence and Security</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">cloud technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">data centre</style></keyword><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">virtualization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">89-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents an analysis of cloud technologies as key current trend in the development of IT infrastructure, their main characteristics, security levels and the increased requirements they must meet when considered for defence and security applications. It provides an overview of main standards and requirements that modern data centres have to meet to ensure a high level of availability of the provided IT services. Specific requirements have been formulated for building a sustainable system of modern data centres for defence and security needs, and attention has been paid to data protection when using cloud technologies. A solution is proposed for implementing cloud technologies and an approach for building an integrated data centre system for defence and security needs in organizing collaborative work between officials within the organization.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">89</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Luke Topham</style></author><author><style face="normal" font="default" size="100%">Kashif Kifayat</style></author><author><style face="normal" font="default" size="100%">Younis A. Younis</style></author><author><style face="normal" font="default" size="100%">Qi Shi</style></author><author><style face="normal" font="default" size="100%">Bob Askwith</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Teaching and Learning Laboratories: A Survey</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">Computing Laboratory</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">Pedagogy</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword><keyword><style  face="normal" font="default" size="100%">Virtualisation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">51-80</style></pages><abstract><style face="normal" font="default" size="100%">Currently there is a great demand for trained cyber security professionals with hands-on skills. The need for these professionals stems from our reliance on technology in many aspects of our daily lives and the smooth running of modern governments, education and health services. These professionals are desperately needed to defend cyberspace from threats such as hackers and malware who threaten to disrupt such services daily. This paper presents an insight into current approaches taken in the practical teaching of cyber security. We also give requirements and best practices for future training platforms based on a defined teaching process.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">51</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Vilkomir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cloud Testing: A State-of-the-Art Review</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">cloud testing</style></keyword><keyword><style  face="normal" font="default" size="100%">TaaS</style></keyword><keyword><style  face="normal" font="default" size="100%">Testing as a Service</style></keyword><keyword><style  face="normal" font="default" size="100%">testing tools.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">17</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">213-222</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper provides a state-of-the-art review of cloud testing. Cloud computing, a new paradigm for developing and delivering computing applications and services, has gained considerable attention in recent years. Cloud computing can impact all software life cycle stages, including the area of software testing. TaaS (Testing as a Service) or cloud testing, which includes testing the cloud and testing using the cloud, is a fast developing area of research in software engineering. The paper addresses the following three areas: (1) general research in cloud testing, (2) specific cloud testing research, i.e., tools, methods, and systems under test, and (3) commercial TaaS tools and solutions</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andrey Melenets</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">data protection</style></keyword><keyword><style  face="normal" font="default" size="100%">database-as-a-service</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid cloud</style></keyword><keyword><style  face="normal" font="default" size="100%">internet service</style></keyword><keyword><style  face="normal" font="default" size="100%">private cloud</style></keyword><keyword><style  face="normal" font="default" size="100%">public cloud</style></keyword><keyword><style  face="normal" font="default" size="100%">software as a service</style></keyword><keyword><style  face="normal" font="default" size="100%">State information resource</style></keyword><keyword><style  face="normal" font="default" size="100%">State register of potentially dangerous objects</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">52-62</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This papers presents the considerations for maintaining information resources of the state with implementation of cloud computing. In particular, it examines a scheme for maintaining the state register of potentially dangerous objects on the basis of cloud computing technology. Special attention is paid to the issue of information protection in cloud computing and the implementation of the hybrid cloud model for maintaining information resources of the state</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>