Cloud Computing Security

Results: 3057



#Item
901Business / Software as a service / Software industry / Software / Thomson Reuters / Computing / Software distribution / Cloud computing

Scalability, Sustainability and Security – The Three Keys to Deploying an Effective Land Information System Government entities charged with deploying an effective and efficient “fit for purpose” land information s

Add to Reading List

Source URL: tax.thomsonreuters.com

Language: English - Date: 2015-03-13 09:42:47
902Cloud infrastructure / Web services / Amazon Elastic Compute Cloud / Virtual firewall / Cloud storage / Utility computing / Amazon Web Services / IBM cloud computing / Cloud.com / Cloud computing / Computing / Centralized computing

Cloud Hooks: Security and Privacy Issues in Cloud Computing

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2010-11-27 16:02:00
903Security / Secure communication / Internet standards / Computer network security / Transport Layer Security / Password / Public-key cryptography / HTTP Secure / Session hijacking / Cryptography / Cryptographic protocols / Computing

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-01-25 08:24:32
904Security / Computer network security / Data security / Crime prevention / National security / Trustworthy computing / Microsoft Online Services / Microsoft / Security controls / Computing / Computer security / Cloud computing

Securing Microsoft’s Cloud Infrastructure This paper introduces the reader to the Online Services Security and Compliance team, a part of the Global Foundation Services division who manages security for the Microsoft c

Add to Reading List

Source URL: www.rosebudtech.com

Language: English - Date: 2012-08-14 16:06:28
905Identity management / Federated identity / Java enterprise platform / Cloud standards / Security Assertion Markup Language / SAML 2.0 / OAuth / Spring Security / OpenID / Computing / Computer security / System software

Spring Security This in-depth, 4-day course introduces the Java web developer to the Spring Security framework. We start with an overview and practical exercises in basic usage: XML configuration for authentication and

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-03-25 11:30:36
906Cyberwarfare / Computer network security / Data security / National security / Vulnerability / Physical security / Social engineering / Information security / Asset / Security / Computer security / Public safety

2013 IEEE International Conference on Cloud Computing Technology and Science Defining “The Weakest Link”: Comparative Security in Complex Systems of Systems Wolter Pieters TU Delft and University of Twente

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2014-04-03 05:54:29
907Computing / Identity assurance / Liberty Alliance / Peer-to-peer / Security Assertion Markup Language / Cloud computing / Information Card / OpenID / Identity management / Identity / Computer security

A Field Guide to Internet Trust by Kaliya “Identity Woman” Hamlin and Steve Greenberg Summary The decreasing cost of computation and communication has made it easier than ever before to be a service provider, and has

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2014-05-05 14:05:14
908Virtual machines / Virtualization / Hypervisor / Virtual private server / Hyper-V / VMware / X86 virtualization / Dynamic infrastructure / Virtual firewall / System software / Software / Computing

Solution Brief HyTrust and Intel Provide a Foundation of Enterprise-class Security for Server Virtualization and Cloud Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst, and Wayne Pauley, Senior Analyst A

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-01 01:19:35
909Computer security / Etiquette / Internet / Internet culture / Cloud computing / Email / Computing / Acceptable use policy

ACCEPTABLE USE POLICY This ACCEPTABLE USE POLICY ("AUP") describes acceptable use of and access to the Services offered by Cloud Data Centre Ltd and its subsidiaries and affiliates (collectively, "Cloud DC") such as, but

Add to Reading List

Source URL: www.clouddc.com.au

Language: English - Date: 2015-01-21 22:43:00
910Network performance / Ciena / Carrier Ethernet / Cloud computing / Low latency / Wireless security / Lag / InfiniBand / 100 Gigabit Ethernet / Computing / Ethernet / Metro Ethernet

MODERNIZED NETWORKS HELP FINANCIAL SERVICES FIRMS MEET REGULATORY REQUIREMENTS Companies in the financial industry must comply with regulations that often are as much about data as they are about money. Today, CIOs and I

Add to Reading List

Source URL: www.wsta.org

Language: English - Date: 2015-04-01 09:24:51
UPDATE