• Nenhum resultado encontrado

Cloud security

Cloud security risk and readiness

Cloud security risk and readiness

... through Cloud Computing, a paradigm which has emerged with special relevance in the IT market and which, according to experts in the field, has had a notable growth with increasing adoption by organizations from ...

86

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... a cloud computing security ...the Security Content Automation Protocol which identifies a quite of specifications for organizing and expressing security-related information in standard ways, ...

5

Analysis of interoperability and standards for cloud computing

Analysis of interoperability and standards for cloud computing

... Apart from the benefits, the former techniques also present new threats that have the capability to jeopardize cloud security. For instance, modern data center suffers bandwidth under-provisioning problems ...

4

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

... proposed security solution by BlueTie allows to provide safe scenario for data ...for security is outlined not only to protect data in transit, but also to protect it while at rest in the cloud ...is ...

10

The Risk and Challenges of Cloud Computing

The Risk and Challenges of Cloud Computing

... public cloud environments, new security challenges need to be ...Optimal cloud security practices should include encryption of sensitive data used by cloud- based virtual machines; ...

6

Architecture Design & Network Application of Cloud Computing

Architecture Design & Network Application of Cloud Computing

... the Cloud Security Alliance, the top three threats in the cloud are Insecure Interfaces and API's, Data Loss & Leakage, and Hardware Failure which accounted for 29%, 25% and 10% of all ...

8

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

... Cloud security covers several ...on cloud security issues, addressing vulnerabilities, threats, and ...understand security risks, the authors identify the basic concepts underlying ...

12

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

... the security solution proposed by these authors, trust and security threats identifi- cation are both the focus of the solution proposed for Cloud Security, where clients are leveraged from ...

110

Secure Cloud Architecture

Secure Cloud Architecture

... a cloud security that contains threats/attacks and ...implementing cloud computing by expanding their on-premise infrastructure, should be aware of the security challenges faced by ...

14

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES

... like Cloud Security Alliance, European Network and Information Security Agency, Cloud Standards Customer Council, ...Open Cloud Consortium, National Institute of Standards and ...

8

A digital vault solution for banking institutions

A digital vault solution for banking institutions

... offer cloud support a NoSQL solution had to be ...of cloud systems and is capable of handling large amounts of information with better performance than other similar database systems ...a ...

78

Cloud Computing para a Administração Pública Portuguesa

Cloud Computing para a Administração Pública Portuguesa

... Das diversas definições encontradas na bibliografia, a que, na perspetiva do candidato, melhor define este conceito é a descrita na versão final do NIST 2 (MELLl, et al., 2011) onde é referido que ―Cloud computing ...

69

Conceção de arquiteturas para Cloud Computing : casos de demonstração da utilização do modelo de referência do NIST

Conceção de arquiteturas para Cloud Computing : casos de demonstração da utilização do modelo de referência do NIST

... de cloud computing disponibilizadas através na Internet e disponibilizadas no website criado para o efeito, o ...de cloud numa plataforma tecnológica aplicacional e de comunicações com contratos de ...

131

Digital Transformation Journey: a discussion

Digital Transformation Journey: a discussion

... The using of cloud technology is a major enabler to the digital transformation journey of any business as it provides data security, ensures Continuity of Operations (COOP), and allow [r] ...

32

Role of cloud computing in higher study

Role of cloud computing in higher study

... Compute Cloud. [8] In Early,1950s, The underlying concept of cloud computing dates to the 1950s, when large-scale mainframe computers were seen as the future of computing, and became available in academia ...

7

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

... The system has four components (a) Data Owner: The data owner is responsible for originating the file data to be stored on the cloud. It can be a user-level program, a file system on a personal computer, a mobile ...

2

AN IN-DEPTH ANALYSIS ON INTEGRATING CAMPUS RADIO FREQUENCY IDENTIFICATION SYSTEM ON CLOUDS FOR ENHANCING SECURITY

AN IN-DEPTH ANALYSIS ON INTEGRATING CAMPUS RADIO FREQUENCY IDENTIFICATION SYSTEM ON CLOUDS FOR ENHANCING SECURITY

... ameliorate security technology at campuses using latest technologies ...IT security including human, campus IT asset traceability, student’s valuables tracking, exam papers leakage security and issue ...

5

A Survey of Cloud Computing: Designing, Applications, Security  Issues and Related Technologies

A Survey of Cloud Computing: Designing, Applications, Security Issues and Related Technologies

... Although cloud computing is providing many facilities but there are many issues which is yet to be ...of cloud computing, its key concepts, state-of-the-art implementation and research issues as ...of ...

8

A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack

A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack

... between the legitimate traffic and “fake” traffic. Situations become more complicated when the attackers use spoofed IP addresses as source to send the packets, which make it difficult to identify the origins of attacks. ...

4

CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY

... of cloud computing are software as a service, platform as a service and infrastructure as a ...another cloud provider’s PaaS or IaaS service ...Compute Cloud (EC2) and Secure Storage Service (S3) are ...

6

Show all 1741 documents...

temas relacionados