{"id":"https://openalex.org/W7153623709","doi":"https://doi.org/10.1145/3779657.3779684","title":"A Secured Cloud Integration Network Design and Fault Tolerant for file and Application Sharing in a Medium Size Business Environment","display_name":"A Secured Cloud Integration Network Design and Fault Tolerant for file and Application Sharing in a Medium Size Business Environment","publication_year":2025,"publication_date":"2025-10-24","ids":{"openalex":"https://openalex.org/W7153623709","doi":"https://doi.org/10.1145/3779657.3779684"},"language":null,"primary_location":{"id":"doi:10.1145/3779657.3779684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3779657.3779684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 7th World Symposium on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057896901","display_name":"Bryan B. Penuliar","orcid":null},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Bryan B. Penuliar","raw_affiliation_strings":["Mapua University, School of Information Technology, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"Mapua University, School of Information Technology, Manila, Philippines","institution_ids":["https://openalex.org/I137967721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133401596","display_name":"William P. Rey","orcid":"https://orcid.org/0000-0002-1345-2335"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"William P. Rey","raw_affiliation_strings":["Mapua University, School of Information Technology, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"Mapua University, School of Information Technology, Manila, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057896901"],"corresponding_institution_ids":["https://openalex.org/I137967721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8767051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"180","last_page":"188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.2506999969482422,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.2506999969482422,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.13429999351501465,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.09549999982118607,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6693000197410583},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.578000009059906},{"id":"https://openalex.org/keywords/dynamic-host-configuration-protocol","display_name":"Dynamic Host Configuration Protocol","score":0.5418000221252441},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.4212000072002411},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3334999978542328},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.31540000438690186},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3043000102043152}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6741999983787537},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6693000197410583},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.578000009059906},{"id":"https://openalex.org/C26876914","wikidata":"https://www.wikidata.org/wiki/Q11166","display_name":"Dynamic Host Configuration Protocol","level":3,"score":0.5418000221252441},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.531499981880188},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.4212000072002411},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3968000113964081},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3878999948501587},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C58861120","wikidata":"https://www.wikidata.org/wiki/Q1330734","display_name":"Virtual file system","level":5,"score":0.2800999879837036},{"id":"https://openalex.org/C65813073","wikidata":"https://www.wikidata.org/wiki/Q1622420","display_name":"High availability","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.26030001044273376},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3779657.3779684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3779657.3779684","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 7th World Symposium on Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4412294626235962,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W71828450","https://openalex.org/W222231401","https://openalex.org/W2032665639","https://openalex.org/W2115658704","https://openalex.org/W2920244809","https://openalex.org/W3085234226"],"related_works":[],"abstract_inverted_index":{"This":[0],"study":[1,74],"designs":[2],"and":[3,24,32,47,55,66,87],"implements":[4],"a":[5,29,77],"cloud":[6,79],"network":[7],"connecting":[8],"multiple":[9],"simulated":[10],"branch":[11],"locations":[12],"using":[13],"GNS3.":[14],"It":[15],"integrates":[16],"site-to-site":[17],"VPNs,":[18,43],"VLANs,":[19],"DHCP":[20],"relay,":[21],"Active":[22],"Directory,":[23],"high":[25],"availability":[26],"to":[27],"create":[28],"secure,":[30],"scalable,":[31],"resilient":[33],"network.":[34],"Remote":[35],"sites":[36],"(ACN,":[37],"CBRANCH,":[38],"OHO)":[39],"connect":[40],"via":[41],"encrypted":[42],"with":[44,70],"centralized":[45],"identity":[46],"access":[48],"management":[49],"on":[50],"cloud-hosted":[51],"domain":[52,61],"controllers":[53],"(DC01":[54],"DC02).":[56],"Testing":[57],"included":[58],"IP":[59],"distribution,":[60],"joining,":[62],"file":[63],"server":[64],"access,":[65],"firewall":[67],"failover,":[68],"along":[69],"user":[71],"validation.":[72],"The":[73],"shows":[75],"that":[76],"FortiGate-based":[78],"setup":[80],"can":[81],"effectively":[82],"demonstrate":[83],"enterprise-level":[84],"security,":[85],"management,":[86],"fault":[88],"tolerance.":[89]},"counts_by_year":[],"updated_date":"2026-04-12T06:10:36.643156","created_date":"2026-04-12T00:00:00"}
