Cloud computing security

Results: 3057



#Item
491Computer security / Computing / Auditing / Crime prevention / National security / Cloud computing security / Information security / Internal audit / Information technology security audit / Centralized computing / Security / Cloud computing

IS THERE AUDITABLE SECURITY IN THE CLOUD? by Preston Williams III

Add to Reading List

Source URL: media.cloudbook.net

Language: English - Date: 2013-04-15 05:27:59
492Centralized computing / Data security / Security / Cloud storage / Data center / Security controls / Information security / Computing / Cloud computing / Computer security

Evaluating Cloud Risk for the Enterprise: A Shared Assessments Guide October 2010 Published By

Add to Reading List

Source URL: sharedassessments.org

Language: English - Date: 2012-01-25 21:17:36
493Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Google Chrome / Malware / Software / Computing / Cloud clients

This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2012-03-08 13:27:49
494Trustworthy computing / Ronny / Electronic signature / Electronic identity card / Privacy / Security / Ethics / Computer security / Information technology management

Ronny Bjones Director of Cloud Identity & Privacy Services Microsoft Ronny Bjones is currently working for Microsoft Engineering (Server & tools division) as Director of Cloud Identity & Privacy Services. Ronny builds ne

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:38:29
495Computer network security / Internet privacy / Crypto-anarchism / Virtual private network / MPLS VPN / Customer-premises equipment / Single-pair high-speed digital subscriber line / Service-level agreement / Cloud computing / Network architecture / Computing / Computer architecture

Standard Form of Agreement Service Description (MPLS VPN Cloud) Revised 15-Aug-2012 1

Add to Reading List

Source URL: www.zetta.net.au

Language: English - Date: 2012-08-15 04:33:16
496Application programming interfaces / Computer security / API Management / Identity management / Privileged Identity Management / Two-factor authentication / Cloud applications / Infrastructure optimization / Accellion /  Inc. / Cloud computing / Computing / Centralized computing

BUYER’S GUIDE Identity, Access and API Management Solutions

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2015-02-20 17:46:41
497Cyberwarfare / National security / Internet protocols / Internet standards / Infrastructure security / Denial-of-service attack / Cloud computing / Computer security / Border Gateway Protocol / Internet / Computer network security / Computing

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:14
498Computing / Ambient intelligence / Internet of Things / Tcpcrypt / Secure multi-party computation / Dan Boneh / Cloud computing / Computer security / Cryptography / Cryptographic protocols / Computer network security

IoT: a Security and Privacy Perspective! Dan Boneh! Stanford University! Secure Internet of Things Project Workshop! Stanford University!

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:07
499Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2015-04-08 06:50:03
500File hosting / Cloud computing / Online backup services / Cloud applications / Cloud storage / Dropbox / Software / Computing / Data synchronization

Security overview | Dropbox for Business

Add to Reading List

Source URL: www.dropbox.com

Language: English - Date: 2015-04-14 17:31:08
UPDATE