Cloud Computing Security

Results: 3057



#Item
81Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
82Computer security / Computing / Query languages / Cloud computing / Hadoop / Apache Software Foundation / Pig / Blacklist / Whitelist / TiVo Corporation

Administration Table of contents 1 Output location strict check............................................................................................... 2 2 Disabling Pig commands and operators.....................

Add to Reading List

Source URL: pig.apache.org

Language: English - Date: 2015-06-06 13:03:20
83Computing / Cloud computing / Cloud infrastructure / Cloud storage / Software as a service / Cloud computing issues / Cloud computing security

Are enterprises really ready to move into the cloud? By Sichao Wang Many businesses are interested in finding out how they can benefit from the cloud computing hot wave. Cloud based services such as Saas, Paas and Iaas,

Add to Reading List

Source URL: cloudsecurityalliance.org

Language: English - Date: 2015-04-27 14:00:33
84Software / Computing / Web browsers / Mozilla / Internet advertising / Hacking / Cloud clients / Browser extension / Google Chrome / Browser security / Cross-site scripting / Firefox

2015 IEEE Symposium on Security and Privacy Ad Injection at Scale: Assessing Deceptive Advertisement Modifications  

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
85Computer security / Computing / Security / Veracode / Software testing / Application security / Vulnerability / Cloud computing

HIGHLIGHTS A state government meets compliance requirements and reduces risk in a scalable application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-06-03 10:46:07
86Computing / Security / Prevention / Bitcoin / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet of things / Cloud computing / Blockchain

EEMA online March 2016 Issue 5 Diary dates 2016 Below are some of the events that we are holding this year. Be sure to bookmark them now! For further information visit www.eema.org/events. 19 April

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
87Videotelephony / Teleconferencing / Computer-mediated communication / Computing / Technology / Zoom Video Communications / Videoconferencing / Cloud computing / Web conferencing / H.323

Zoom Video Communications, Inc. Global Infrastructure and Security Guide January 2016 Global Infastructure & Security Guide Zoom Video Communications Inc.

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2016-08-08 05:14:24
88Computing / Data management / Telecommunications engineering / Computer networking / Local area networks / Cloud storage / Data center / Storage area network / Virtualization / Virtual LAN / Ethernet / Computer network

Genesis Hosting Solutions, LLC Data Center Security and Reliability Controls Genesis Hosting Solutions’ equipment is collocated at an XO Communications facility downtown Chicago, at 140 S. Dearborn St (the Marquette B

Add to Reading List

Source URL: www.genesishosting.com

Language: English - Date: 2009-03-17 20:50:02
89Computing / Concurrent computing / Cloud infrastructure / Parallel computing / Distributed computing architecture / Apache Software Foundation / MapReduce / Apache Hadoop / Data / Software Guard Extensions / Cloud computing

2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:59
90Emerging technologies / Computing / Network architecture / Cloud infrastructure / Cloud computing / Technology / Internet of things / Network function virtualization / Software-defined networking / 9 / Cloud computing issues

NETEVENTS APAC PRESS & SERVICE PROVIDER VIP SUMMIT Draft Innovation in the Cloud & the Importance of Security Guest Speaker: Steve Chappell, Chief Operating Officer, Wedge

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2015-06-04 08:03:01
UPDATE