Cloud computing security

Results: 3057



#Item
341Public-key cryptography / Computer network security / Capability-based security / Tahoe Least-Authority Filesystem / Key management / Internet privacy / Computer security / Authentication / Cloud computing / Cryptography / Security / Access control

Tamias: a privacy aware distributed storage Jean Lorchat, Cristel Pelsser, Randy Bush, Keiichi Shima Internet Initiative Japan, Inc. {jean,cristel,randy,keiichi}@iijlab.net 1

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2011-02-12 20:29:24
342Identification / Surveillance / Voxeo / Authentication / Cloud computing / Speaker recognition / Two-factor authentication / Biometrics Institute / Security / Biometrics / Cryptography

Wireless Listings: It’s Q-Sent Out in the Open

Add to Reading List

Source URL: voxeo.com

Language: English - Date: 2013-02-22 10:31:53
343Computing / Cloud computing / Provisioning / Mobile device management / Technology / Electronics / Computer network security / Content-control software / Fortinet

DATA SHEET FortiCloud™ Hosted Wireless and Security Device Provisioning, Management and Analytics

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:14
344Centralized computing / Data center / Computing / Cloud computing / Concurrent computing

ide: cloud securiTy. Quick gu Ty curi cloud se IT SECURITY HAS NEVER

Add to Reading List

Source URL: www.t-systems.nl

Language: English - Date: 2014-12-22 09:33:04
345Iland / Governance /  risk management /  and compliance / Regulatory compliance / IICCRD / HP Cloud Service Automation Software / Cloud computing / Centralized computing / Computing

white paper Four steps to improving cloud security and compliance Despite the widespread

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-02-02 16:40:16
346Data security / Crime prevention / National security / Public safety / Computing / Information security / Cloud computing / Security controls / Privacy / Security / Computer security / Computer network security

Microsoft Word - Information System Product Review Policy

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2015-01-29 14:32:03
347Cloud computing / Centralized computing / Computing

CLOUD COMPUTING Spanish SECURITY State-of-the-Art Analysis 2014 Cloud Security Alliance, Spanish Chapter Coordination

Add to Reading List

Source URL: www.ismsforum.es

Language: English - Date: 2014-11-24 09:52:28
348Cloud infrastructure / Hybrid cloud / Intelligent workload management / Kaavo / Java enterprise platform / Cloud computing / Centralized computing / Computing

APCERA.COM Hybrid Cloud Operating System Apcera’s Hybrid Cloud OS: The Security and Freedom IT Demands. The Speed Developers Love The modern enterprise operates in a complex world, which requires that IT and developer

Add to Reading List

Source URL: www.apcera.com

Language: English - Date: 2015-06-08 12:33:45
349Cloud clients / Android / Embedded Linux / Smartphones / Internet privacy / Bolt / Gmail / Google / Mobile business intelligence / Computing / Software / Cloud computing

Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security Denzil Ferreira; Vassilis Kostakos University of Oulu Community Imaging Group

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2015-05-18 18:23:27
350Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
UPDATE