Infrastructure security

Results: 6100



#Item
141Computing / Concurrent computing / Cloud infrastructure / Parallel computing / Distributed computing architecture / Apache Software Foundation / MapReduce / Apache Hadoop / Data / Software Guard Extensions / Cloud computing

2015 IEEE Symposium on Security and Privacy VC3: Trustworthy Data Analytics in the Cloud using SGX Felix Schuster∗ , Manuel Costa, C´edric Fournet, Christos Gkantsidis Marcus Peinado, Gloria Mainar-Ruiz, Mark Russino

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:59
142United States Department of Homeland Security / Government / National security / Prevention / DHS National Protection and Programs Directorate / Resilience / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / Federal Protective Service / Homeland security / National Cyber Security Division

AprilVolume 2, Issue 1 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights cross-sector initiatives, and identifies training and exercise opportunities, new tool

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2015-07-02 14:45:27
143Cryptography / Key management / Public key infrastructure / Public-key cryptography / Certificate authorities / Transport Layer Security / Comodo Group / Public key certificate / Comodo Internet Security / Code signing / Comodo / Phishing

Centrally Managing Trust, Security & Compliance in Educational Institutions Public Key Infrastructure (PKI) CASE STUDY: Education SSL Certificate Management Too many SSLCertificates, Not EnoughTime Large, thriving enterp

Add to Reading List

Source URL: www.instantssl.cn

Language: English
144Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Authentication / Energy Sciences Network

DOE Grids Certificate Policy And Certification Practice Statement Version 2.9

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2006-12-15 16:35:48
145Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / GlobalSign / Certificate authority / Extended Validation Certificate / CA/Browser Forum / Root certificate / Certificate policy

GlobalSign Certificate Policy Date: 16th June 2016 Version: v5.2

Add to Reading List

Source URL: jp.globalsign.com

Language: English - Date: 2016-07-19 21:31:07
146Emerging technologies / Computing / Network architecture / Cloud infrastructure / Cloud computing / Technology / Internet of things / Network function virtualization / Software-defined networking / 9 / Cloud computing issues

NETEVENTS APAC PRESS & SERVICE PROVIDER VIP SUMMIT Draft Innovation in the Cloud & the Importance of Security Guest Speaker: Steve Chappell, Chief Operating Officer, Wedge

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2015-06-04 08:03:01
147Computing / Security / Data management / Crime prevention / National security / Cloud storage / Computer networking / Data center / Telecommunications data retention / Privacy policy / Internet privacy / Database

Milestone MNA3.2: Requirements on data to protect from AAI, community, resource providers and e-infrastructure

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:15
148Computing / Cloud infrastructure / Computer network security / Computer security / Cloudera / Hadoop / Threat / Big data / Cloud computing / Analytics

Cloudwick One® OSAS Cloud and Data Center Cybersecurity OPEN SOURCE ADAPTIVE SECURITY (OSAS) In today’s world of one data breach after another, enterprises are faced with a hostile information security environment. It

Add to Reading List

Source URL: www.cloudwick.com

Language: English
149Cryptography / Computer architecture / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Virtual private networks / Layer 2 Tunneling Protocol / Root certificate / Certificate authority / Control Panel

Microsoft Word - L2TP Windows XP OR VISTA.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:03
150Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Public key certificate / Certificate authority / Professional certification / Conveyancing / Information security

ARNECC Response to Draft v2 MOR Feedback

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:33
UPDATE