Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 22804 dokumen yang sesuai dengan query
cover
Devi Thiyagarajan
"Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud."
Depok: Faculty of Engineering, Universitas Indonesia, 2015
UI-IJTECH 6:3 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
Bayu Kurnianto
"ABSTRAK
TNI Angkatan Laut sebagai komponen utama pertahanan negara di laut memiliki tugas diantaranya melaksanakan bidang pertahanan matra laut, menegakkan hukum dan menjaga keamanan di wilayah laut yurisdiksi nasional. Adapun ancaman yang dihadapi yaitu Operasi Militer Perang OMP berupa Agresi Militer dan Operasi Militer Selain Perang OMSP antara lain Bencana Alam, Kejahatan Lintas Negara, Pelanggaran Keamanan Laut, SAR / Kecelakaan Laut, dan untuk mendukung pelaksanaan OMP dan OMSP dibutuhkan peran Teknologi Informasi dan Komunikasi.Dinas Informasi dan Pengolahan Data Angkatan Laut sebagai Pembina Teknis Sistem Informasi di Lingkungan TNI AL harus mampu menyiapkan segala sarana dan prasarana yang meningkatkan kinerja Teknologi Informasi TI . Berkaitan dengan TI, TNI AL harus memiliki Arsitektur TI yang mampu memberikan layanan sistem informasi dan infrastruktur TI untuk seluruh bidang dan fungsi yang ada di TNI AL. Penggunaan informasi yang terdiri dari bidang operasi, intelijen, logistik. personel, perencanaan anggaran dan keuangan serta bidang khusus menuntut arsitektur TI yang handal dan lentur terhadap perkembangan.The Open Grup Architecture Kerangka kerja TOGAF memiliki kemampuan yang dapat mendukung perancangan Arsitektur TI di TNI AL. Kondisi TI yang belum terintegrasi, kebutuhan SI yang terus meningkat, kemajuan teknologi seperti virtualisasi cloud computing, maka perlu rancangan arsitektur TI. Hasil akhir dari penelitian ini adanya Rancangan Arsitektur Teknologi Informasi di lingkungan TNI AL yang dapat diimplementasikan oleh Disinfolahtal sebagai Pembina teknis sistem informasi.

ABSTRACT
Indonesia Navy as a major component of the national defense in the sea has the task of which carry out naval defense field, enforcing the law and maintaining security in the sea areas of national jurisdiction. Some threats that has to face are the Military Operation of War MOW such as military aggression and the Military Operations Other Than War MOTW such as Natural Dissaster, Transnational Crime, Sea Security Breach, SAR Marine Accidents, and to deal with that required a major tool weapon systems Alutsista superior.Information and Data Manajemen Services of the Navy as supervisor Technical Environmental Information System in the Indonesia Navy to be able to prepare all facilities and infrastructure is useful to enhance the performance of Information Technology. In connection with the Navy IT should have IT architecture capable of providing information system services and IT infrastructure for the entire area and functions that exist in the Indonesia Navy. Use of information consisting of field operations, intelligence, logistics. personnel, budget and financial planning as well as specialized field requires IT architecture to the development of a reliable and flexible.The Open Grup Architecture Framework TOGAF has the capability to support the design of the IT architecture in the Indonesian Navy. Conditions Information Technology that are not integrated, the need for information systems continues to increase, technological advances such as virtualization and cloud computing, it is necessary to design the architecture of Information Technology. The end result of this research the Architectural Design of Information Technology in the Indonesia Navy that can be implemented by Information and Data Manajemen Services of the Navy as supervisor of technical information systems."
2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Brian Samuel Matthew
"Skripsi ini menyajikan analisis kinerja komprehensif penyeimbang beban dalam konteks lingkungan Apache CloudStack berbasis Prometheus. Seiring dengan berkembangnya komputasi awan, efisiensi mekanisme penyeimbangan beban memainkan peran penting dalam memastikan pemanfaatan sumber daya yang optimal dan keandalan layanan. Memanfaatkan Prometheus untuk pemantauan dan pengumpulan metrik, penelitian ini bertujuan untuk mengevaluasi kinerja berbagai konfigurasi penyeimbang beban yang diterapkan di Apache CloudStack, serta memberikan analisis terhadap mengapa penyeimbang beban dapat meningkatkan efisiensi distribusi paket sebesar 23%.

This thesis provides a complete performance analysis of load balancers in Prometheus-based Apache CloudStack setups. As cloud computing evolves, the effectiveness of load balancing techniques becomes critical in guaranteeing optimal resource usage and service reliability. Using Prometheus for monitoring and metric collecting, this study seeks to assess the performance of several load balancer configurations implemented in Apache CloudStack, and also providing analysis as to why load balancer can increase the efficiency of traffic distribution by up to 23%."
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"The book presents innovative scientific research works by academics, research scholars and students, presented at the 2017 International Conference on Energy, Materials and Information Technology at Amity University Jharkhand, India. It includes contributions on system solutions based on soft computing techniques, and covers innovative soft computing techniques and tools with advanced applications. A major focus of the book is on presenting interdisciplinary problems and how they can be solved using information technology, together with innovative connections to other disciplines. It also includes papers on cloud computing and WSN-related real-time research. "
Singapore: Springer Nature, 2019
e20509041
eBooks  Universitas Indonesia Library
cover
Messier, Ric
"Collaboration with cloud computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses :
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network"
Waltham, MA: Syngress, 2014
e20426883
eBooks  Universitas Indonesia Library
cover
Messier, Ric
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- Provided by publisher."
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks SO  Universitas Indonesia Library
cover
Deshpande, Prachi S.
"This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike."
Singapore: Springer Nature, 2019
e20509833
eBooks  Universitas Indonesia Library
cover
Dyani Mustikarini
"Skripsi ini berisi mengenai konsep dasar, perancangan dan implementasi enkripsi data dengan RSA yang diterapkan pada private cloud Infrastucture as a Service (IaaS). Tujuan dari skripsi ini menganalisa keamanan pengiriman data dan waktu dari implementasi kriptografi RSA pada sistem Eucalyptus private cloud. Pengiriman data pada sistem virtualisasi private cloud membutuhkan enkripsi untuk mengantisipasi serangan dari man-in-the-middle sehingga penyerang tidak mengetahui isi data dengan mudah.
Hasil penelitian menunjukkan bahwa waktu eksekusi program RSA dipengaruhi oleh ukuran data dan nilai kunci RSA yang dibangkitkan. Peningkatan ukuran data akan mempengaruhi peningkatan waktu eksekusi program RSA. Peningkatan waktu eksekusi untuk format .txt sebesar 31,44%, untuk format .doc sebesar 24,83% dan untuk format .pdf sebesar 24,85%. Nilai d untuk kunci privat RSA yang besar akan sangat mempengaruhi waktu eksekusi karena membutuhkan waktu dekripsi yang lebih lama.
Sedangkan nilai e yang besar untuk kunci publik RSA tidak terlalu signifikan mempengaruhi waktu enkripsi menjadi lebih lama namun tetap berkontribusi terhadap waktu eksekusi RSA. Keamanan pengiriman data pada sistem private cloud dibutuhkan terutama dengan RSA 2048 bit dan sistem padding, namun pada skripsi ini hanya digunakan enkripsi plain RSA.

This thesis contains about fundamental concept, the design and the implementation of data encryption using RSA which is applied on private cloud Infrastucture as a Service (IaaS). The purposes of this thesis are to analyze the the data transfer security and the time of RSA cryptography appliance on Eucalyptus private cloud system. Secret data transfer on private cloud virtualization requires encryption in order to anticipated the attack from man-in-the-middle so that the attacker won?t know the contents of data easily.
The result of this research prove that RSA execution time influented by the size of data and the value of the generated RSA keys. Data size increment will influence the execution times of RSA. The increment time for .txt is 31,44%, increment time for .doc is 24,83%, and increment time for .pdf is 24,85%. Large values of d for RSA private key greatly affect the execution time because need a longer decryption time.
However, the large value of e for public keys isn?t influence the encryption time significantly but still contributes the execution time. The security of data transfer on private cloud system is needed especially using RSA 2048 bit and padding system appliance,however this thesis only implement plain RSA encryption.
"
Depok: Fakultas Teknik Universitas Indonesia, 2012
S43449
UI - Skripsi Open  Universitas Indonesia Library
cover
Velte, Anthony T.
New York: McGraw-Hill, 2010
006.78 VEL c
Buku Teks  Universitas Indonesia Library
cover
Crookes, David
Unites States: Financial World, 2012
004.678 2 CRO c
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>