名义群技术在医疗保健云计算风险评估中的应用

G. C. Kumar, D. Prasad, V. Rao, N. Sai
{"title":"名义群技术在医疗保健云计算风险评估中的应用","authors":"G. C. Kumar, D. Prasad, V. Rao, N. Sai","doi":"10.1109/ICIRCA51532.2021.9544895","DOIUrl":null,"url":null,"abstract":"The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare\",\"authors\":\"G. C. Kumar, D. Prasad, V. Rao, N. Sai\",\"doi\":\"10.1109/ICIRCA51532.2021.9544895\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.\",\"PeriodicalId\":245244,\"journal\":{\"name\":\"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIRCA51532.2021.9544895\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIRCA51532.2021.9544895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

分布式计算的出现,具有适应性、改进的信息访问和成本节约,使这种创新成为可能并迅速发展。由于分布式计算的兴起,公司正在转向使用分布式计算。尽管分布式计算为客户提供了无数好处,但上述回顾显示,分布式计算进入医疗保健领域的机会仍然很低。有了令人信服的云风险评估系统,云客户将从这一创新中获得保障。研究评估云的危险的方法,它仍然是一个婴儿,以及区分安全危险的复杂性,实际上正在讨论。本文将该技术引入到危害评价措施中,对危害评价措施进行了探讨。危害评价是危害评价测量的关键环节。分析危害调查措施的结果,决定是否承认或支持危害规则以解决危害评审。从我们的调查来看,ngtechnique熟悉思考检查前一阶段造成的危险。由于危害评估取决于授权目的地、内部和外部环境以及合作伙伴的观点,因此NGT承诺得出令人信服的结果。这种审查不仅增加了对系统地综合危险和危险的关注,而且隐含地,NGT措施使合作伙伴意识到合作伙伴关系中安全云的当前威胁环境。在这个中心可以看到同样的交流自由,它满足了人们的期望,并可以在风险评估的结果中产生出色的处置。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare
The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Morse Code Detector and Decoder using Eye Blinks Detection of Social and Newsworthy events using Tweet Analysis An Efficient Workflow Management Model for Fog Computing Application Analysis of Image Enhancement Method in Deep Learning Image Recognition Scene Virtual Learning Assistance for Students
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1