Cloud Computing Security

Results: 3057



#Item
61Computing / Computer security / Security / Identity management / Computer access control / Cloud infrastructure / XACML / PaaSage / Security Assertion Markup Language / Cloud computing

Security Enforcement for Multi-Cloud Platforms K. Kritikos (FORTH), T. Kirkham (STFC), B. Kryza (AGH) & P. Massonet (CETIC

Add to Reading List

Source URL: cf2015.holacloud.eu

Language: English - Date: 2015-10-12 10:38:44
62Security / Computer law / Signature / Computing / Cryptography / E-commerce / EIDAS / General Data Protection Regulation / Electronic signature / Computer security / Cloud computing / Cloud Security Alliance

e-Signatures & e-Seals – Opportunities and Challenges demystifying and preparing for the age of eIDAS Brussels Febkindly hosted by EEMA – Limited Distribution Only

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
63Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
64Computing / Cloud computing / Software engineering / Cloud infrastructure / Cloud Security Alliance / St. Cloud /  Minnesota / Risk / Applied Physics Laboratory / Community cloud / APL / Cloud Strife / Cloud computing issues

Tech Digest Figure Template_2 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2015-09-24 12:49:12
65Computer security / Security / Computing / Computer network security / Crime prevention / Cryptography / National security / FireEye / Digital Guardian / Cloud computing security / Forcepoint / Threat

SCAWARDS2014_honor_Horizontal

Add to Reading List

Source URL: static.webvid.co.uk

Language: English - Date: 2016-06-09 13:10:01
66Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
67Computing / Software / System software / Cloud infrastructure / Microservices / VM / Hyper-V / Cloud computing / Network function virtualization / Application firewall / OpenStack / Web application firewall

Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email: Susanta Nanda

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2016-06-29 21:39:36
68Computing / Computer network security / Cloud infrastructure / Cloud computing / Computer security / Computer networking / Serena Software / Software as a service / ITIL / Multitenancy / Application security / Security service

SERENA SOFTWARE Serena Service Manager Security in the Cloud Author: Amitav Chakravartty

Add to Reading List

Source URL: www.serena.com

Language: English - Date: 2013-01-10 16:22:05
69Computing / Cloud computing / Computer security / Cloud infrastructure / Cloud storage / Data security / Cloud computing security / Information security / Cloud Security Alliance / Data center / Cloud computing issues / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:59
70Computing / Cloud infrastructure / Cloud computing / Japanese martial arts / Morpheus / HP Cloud

Morpheus Helps Meet Compliance & Security Demands provision with Morpheus automatically creates system, database, and application logs that allow you to analyze and troubleshoot in near real-time. Likewise, all the syste

Add to Reading List

Source URL: s3-us-west-1.amazonaws.com

Language: English - Date: 2016-02-13 13:58:58
UPDATE