Cloud Computing Security

Results: 3057



#Item
241

Secure & Interconnected Mobility: Integrated Security for Mobile, Automotive, and Cloud Computing Prof. Dr. Ahmad-Reza Sadeghi TU Darmstadt Academic Principal Investigator

Add to Reading List

Source URL: www.icri-sc.org

Language: English - Date: 2013-11-08 09:42:10
    242Smartphones / Cross-platform software / Cloud storage / Cloud clients / Mobile operating systems / Mobile application development / Google Play / Cross-site request forgery / App store / Google Drive / Android / Mobile app

    Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-20 23:58:45
    243

    Cloud Computing Security Nanyang Technical University, Singapore 6th February 2012 Mark D. Ryan University of Birmingham

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2012-02-01 08:16:38
      244Computing / Business / Cloud infrastructure / Cloud computing / IBM

      2010 ACM Cloud Computing Security Workshop (CCSW) 8 October 2010, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw10 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2010-08-04 14:22:45
      245Computing / Software / Cloud storage / File hosting / Online backup services / Data synchronization / Internet protocols / OwnCloud / CardDAV / Client-side encryption / Dropbox / Frank Karlitschek

      UnPLUGging From Freemium File Hosting With ownCloud Searching for Privacy & Security in the Era of Big Data Jesse Bufton

      Add to Reading List

      Source URL: pdxlinux.org

      Language: English - Date: 2014-12-02 16:01:11
      246

      Cloud computing security: the scientific challenge, and a survey of solutions Mark D. Ryan University of Birmingham January 28, 2013 Abstract

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2014-11-11 06:12:58
        247

        2012 ACM Cloud Computing Security Workshop (CCSW) 19 October 2012, Sheraton Raleigh, Raleigh, NC, USA http://crypto.cs.stonybrook.edu/ccsw12 Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.

        Add to Reading List

        Source URL: digitalpiglet.org

        Language: English - Date: 2012-04-13 18:02:24
          248Computing / Internet of Things / Ambient intelligence / Cryptography / Constrained Application Protocol / Internet privacy / Computer security / Bluetooth / Big data / Cloud computing / Privacy / Communications protocol

          ESORICS 2015 Program Guide 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

          Add to Reading List

          Source URL: esorics2015.sba-research.org

          Language: English - Date: 2015-09-22 04:00:14
          249Secure communication / Data security / Computer security / Crime prevention / National security / Data breach / Data loss prevention software / Identity theft / Laptop theft / Security / Cloud computing / Insider threat

          Report Grand Theft Data Data exfiltration study: Actors, tactics, and detection

          Add to Reading List

          Source URL: www.mcafee.com

          Language: English - Date: 2015-09-22 16:22:57
          UPDATE