Cloud computing security

Results: 3057



#Item
1Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2011-06-20 08:16:21
    2®  Security is a Shared Responsibility The adoption of public cloud computing among established businesses and startups is outpacing the adoption of new cybersecurity defenses. The absence of a physical network boundary

    ® Security is a Shared Responsibility The adoption of public cloud computing among established businesses and startups is outpacing the adoption of new cybersecurity defenses. The absence of a physical network boundary

    Add to Reading List

    Source URL: info.redlock.io

    Language: English - Date: 2018-03-12 12:45:49
      3COMPUTATIONAL SECURITY AND THE ECONOMICS OF PASSWORD HACKING Abstract Given the recent rise of cloud computing at cheap prices and the increase in cheap parallel computing options, brute force attacks against stolen pass

      COMPUTATIONAL SECURITY AND THE ECONOMICS OF PASSWORD HACKING Abstract Given the recent rise of cloud computing at cheap prices and the increase in cheap parallel computing options, brute force attacks against stolen pass

      Add to Reading List

      Source URL: courses.csail.mit.edu

      Language: English
        4Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham  Security of cloud computing

        Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        Language: English - Date: 2011-06-20 08:16:21
          5DEVOPS: THE SECURITY GAP The evolution of cloud computing, SaaS and mobile apps has helped accelerate the transformation of how software is developed and released. It has highlighted the requirement for leaner, more agil

          DEVOPS: THE SECURITY GAP The evolution of cloud computing, SaaS and mobile apps has helped accelerate the transformation of how software is developed and released. It has highlighted the requirement for leaner, more agil

          Add to Reading List

          Source URL: public.brighttalk.com

          - Date: 2015-03-18 13:55:40
            6Cloud computing – security issues to consider Purpose: To guide all barristers on security issues relating to cloud computing

            Cloud computing – security issues to consider Purpose: To guide all barristers on security issues relating to cloud computing

            Add to Reading List

            Source URL: www.barcouncil.org.uk

            - Date: 2015-12-11 11:26:28
              7Cloud Computing ISO Security and Privacy Standards: 27017, 27018, 27001 Mike Edwards (Chair UK Cloud Standards Committee)  © 2015 Mike Edwards

              Cloud Computing ISO Security and Privacy Standards: 27017, 27018, 27001 Mike Edwards (Chair UK Cloud Standards Committee) © 2015 Mike Edwards

              Add to Reading List

              Source URL: www.cloud-council.org

              - Date: 2016-08-12 16:57:55
                8Issue Brief  Leveraging End-User Computing to Improve Government Services Virtualization, enterprise mobility management and cloud computing help state and local governments increase productivity, efficiency and security

                Issue Brief Leveraging End-User Computing to Improve Government Services Virtualization, enterprise mobility management and cloud computing help state and local governments increase productivity, efficiency and security

                Add to Reading List

                Source URL: www.air-watch.com

                - Date: 2016-04-11 15:04:42
                  9April 15, 2016 To: UCSB IT Leaders From: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer Re:

                  April 15, 2016 To: UCSB IT Leaders From: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer Re:

                  Add to Reading List

                  Source URL: cio.ucsb.edu

                  Language: English