Results 251 to 260 of about 51,827 (294)
Some of the next articles are maybe not open access.

Cloud security

Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011
Can the cloud truly be secured? Can enterprises, universities, small businesses and governments securely utilize the cloud for their critical infrastructure? It will take rethinking our current security policies and what we consider secure. This session will cover what is necessary to utilize the cloud securely today and how the cloud should adapt for ...
openaire   +1 more source

Transparent security for cloud

Proceedings of the 2010 ACM Symposium on Applied Computing, 2010
Large distributed systems such as clouds are increasingly becoming targets of attacks. Virtualization can be leveraged to increase the security of such systems by protecting the integrity of guest components. This paper discusses the integrity protection problem in the clouds and sketches a novel architecture, Transparent Cloud Protection System (TCPS)
FLAVIO LOMBARDI, DI PIETRO, ROBERTO
openaire   +2 more sources

Cloud Computing: Cloud Security to Trusted Cloud

Advanced Materials Research, 2011
Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions
Ji Yi Wu   +3 more
openaire   +1 more source

Cloud Access Security Brokers: Strengthening Cloud Security

International Journal of Research Publication and Reviews, 2023
Latika Kharb, Deepak Chahal
openaire   +1 more source

Cloud Security

2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2022
Pallav Raj   +2 more
openaire   +1 more source

Securing Cloud

The rapid use of cloud computing services for processing, storing data, and deploying applications has raised serious security issues. Traditional security measures are further insufficient against the complex and constantly changing cyberthreat landscape.
Deepa Nehra, Karanbir Singh
openaire   +1 more source

Federated Cloud Security Architecture for Secure and Agile Clouds

2013
Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development.
Weiliang Luo   +4 more
openaire   +1 more source

Cloud Security

2013
Thomas W. Shinder   +2 more
openaire   +2 more sources

Cloud Security Risk Management

2016
Cloud Security Risk Management is a frequently discussed and analyzed topic that, in recent years, has captured the interest of many scholars and professionals. It reunites under a single category different remarkable elements: The technical and economic relevance of cloud systems, whose diffusion has been one of the most notable phenomena of the last ...
openaire   +3 more sources

Home - About - Disclaimer - Privacy