Cloud Computing Security

Results: 3057



#Item
651Cyberwarfare / Network security / Firewall / Virtual private network / Deep packet inspection / Computer network / Application firewall / Check Point / Computer network security / Computing / Computer security

SMART Secure The private cloud company Managed Next Generation Security for on-premise and

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2014-08-12 09:02:06
652Computer network security / Mandatory access control / Cloud computing / Database / Middleware / Principle of least privilege / Industry Foundation Classes / Security / Computer security / Computing

1 Investigating the Potential of Information Flow Control as a Cloud Security Technology Jean Bacon, Fellow, IEEE, Thomas Pasquier, Member, IEEE, Jatinder Singh, Member, IEEE, Olivier Hermant and David Eyers, Member, IE

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:44:42
653Computer security / Cloud infrastructure / Software as a service / Application firewall / Cloud API / Platform as a service / Virtual machine / Application security / VMware / Cloud computing / Computing / Centralized computing

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: www.jisajournal.com

Language: English
654Cloud applications / Computer security / Cloud infrastructure / Software as a service / Web 2.0 / Malware / Mobile cloud computing / Web threat / Cloud computing / Centralized computing / Computing

Microsoft Word - Essential Guide to Cloud Security.doc

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
655Cloud standards / OAuth / Twitter / Two-factor authentication / Meetup / Password / Access token / Authentication / Security / Computing / Technology

Mastering MEAN: Managing authentication with OAuth and Passport Scott Davis Founder ThirstyHead.com

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-03-13 16:07:57
656Cloud infrastructure / Computer storage / Data security / Cloud storage / Backup / Storage area network / Disk encryption / Database / Converged storage / Cloud computing / Computing / Centralized computing

Defending Cloud Data with Infrastructure Encryption Version 1.0 Released: July 12, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-07-22 15:54:06
657Computer security / Cloud collaboration / Central Desktop / Remote desktop / Cloud applications / Remote desktop software / Centralized computing / Cloud computing / Computing

Central Desktop Makes 2012 “The Year of Cloud Security” with Additional Certifications for Cloud Collaboration Platform Leading Collaboration Solution, SocialBridge®, Provides Enterprise-Grade Security and Controlle

Add to Reading List

Source URL: cd.centraldesktop.com

Language: English - Date: 2013-09-21 18:06:04
658Privacy / National security / USA PATRIOT Act / Cloud computing / Electronic Communications Privacy Act / Telecommunications data retention / Patriot Act / Internet privacy / National security letter / Privacy law / Privacy of telecommunications / Law

Microsoft Word - Revised Government Access to Cloud Data PaperClean)

Add to Reading List

Source URL: www.hoganlovells.com

Language: English - Date: 2012-07-19 17:03:33
659Crime prevention / Mass surveillance / Law enforcement / National Security Agency / Surveillance / Computer security / Cloud computing / NSA warrantless surveillance controversy / NSA call database / Security / National security / Public safety

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based

Add to Reading List

Source URL: www.newamerica.org

Language: English - Date: 2015-02-10 12:49:49
660OpenFlow / Computing / Public safety / Security / Cloud computing / Computer security

The utilization of cloud services by corporate users is increasing year after year. According to the Ministry of Internal Affairs and Communications’ FY 2014 Information and Communications White Paper, the ratio of com

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-12-26 02:03:30
UPDATE