Results 221 to 230 of about 464,365 (270)
Blockchain Technology in Digital Health and Medical Technologies. [PDF]
Damar M, Aydın Ö, Erenay FS.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
This chapter delves into the multifaceted aspects of cloud security, highlighting unique challenges posed by the cloud environment, such as multi-tenancy and virtualization, and the critical need for robust data privacy measures. It explores advanced security protocols and measures, emphasizing the importance of encryption and threat mitigation ...
Flavio Lombardi +2 more
+10 more sources
Flavio Lombardi +2 more
+10 more sources
Communications of the ACM, 2014
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
Mihir Nanavati +3 more
openaire +2 more sources
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
Mihir Nanavati +3 more
openaire +2 more sources
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Cloud computing is a change agent to how information technologies are consumed by businesses and consumers. The agility, scale, and resiliency brought by the cloud fundamentally changed the IT economy for many organizations. However, security assurance for cloud continues to be a barrier for adoption.
Natasha Csicsmann +3 more
openaire +2 more sources
Cloud computing is a change agent to how information technologies are consumed by businesses and consumers. The agility, scale, and resiliency brought by the cloud fundamentally changed the IT economy for many organizations. However, security assurance for cloud continues to be a barrier for adoption.
Natasha Csicsmann +3 more
openaire +2 more sources
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011
Can the cloud truly be secured? Can enterprises, universities, small businesses and governments securely utilize the cloud for their critical infrastructure? It will take rethinking our current security policies and what we consider secure. This session will cover what is necessary to utilize the cloud securely today and how the cloud should adapt for ...
openaire +1 more source
Can the cloud truly be secured? Can enterprises, universities, small businesses and governments securely utilize the cloud for their critical infrastructure? It will take rethinking our current security policies and what we consider secure. This session will cover what is necessary to utilize the cloud securely today and how the cloud should adapt for ...
openaire +1 more source
Transparent security for cloud
Proceedings of the 2010 ACM Symposium on Applied Computing, 2010Large distributed systems such as clouds are increasingly becoming targets of attacks. Virtualization can be leveraged to increase the security of such systems by protecting the integrity of guest components. This paper discusses the integrity protection problem in the clouds and sketches a novel architecture, Transparent Cloud Protection System (TCPS)
FLAVIO LOMBARDI, DI PIETRO, ROBERTO
openaire +2 more sources
Cloud Computing: Cloud Security to Trusted Cloud
Advanced Materials Research, 2011Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions
Ji Yi Wu +3 more
openaire +1 more source

