Results 271 to 280 of about 46,558 (308)
Some of the next articles are maybe not open access.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
This article presents a brief overview on cloud computing security in terms of security considerations, models, threats and precautions. The articles published in recent years were classified and they were then analyzed in terms of problems, solutions and challenges.
SAĞIROĞLU, ŞEREF, SİNANÇ, DUYGU
openaire +2 more sources
This article presents a brief overview on cloud computing security in terms of security considerations, models, threats and precautions. The articles published in recent years were classified and they were then analyzed in terms of problems, solutions and challenges.
SAĞIROĞLU, ŞEREF, SİNANÇ, DUYGU
openaire +2 more sources
Transparent security for cloud
Proceedings of the 2010 ACM Symposium on Applied Computing, 2010Large distributed systems such as clouds are increasingly becoming targets of attacks. Virtualization can be leveraged to increase the security of such systems by protecting the integrity of guest components. This paper discusses the integrity protection problem in the clouds and sketches a novel architecture, Transparent Cloud Protection System (TCPS)
FLAVIO LOMBARDI, DI PIETRO, ROBERTO
openaire +3 more sources
2021
This chapter highlights what it takes to secure the cloud. Some still consider the cloud an inherently dangerous and unsecure place, while others are moving to the cloud precisely because they think security is better there. It can be difficult to get your head around why both things can be true at the same time, but they can. It all has to do with how
openaire +2 more sources
This chapter highlights what it takes to secure the cloud. Some still consider the cloud an inherently dangerous and unsecure place, while others are moving to the cloud precisely because they think security is better there. It can be difficult to get your head around why both things can be true at the same time, but they can. It all has to do with how
openaire +2 more sources
2010
Despite the excitement surrounding the cloud, a relatively small percentage of organizations have actually begun incorporating cloud computing into their technology portfolios. Of the many obstacles to adopting the cloud model of delivery and consumption of computing resources, the number one concern, from users to CIOs/CTOs, is security.
Derek Rustvold+3 more
openaire +2 more sources
Despite the excitement surrounding the cloud, a relatively small percentage of organizations have actually begun incorporating cloud computing into their technology portfolios. Of the many obstacles to adopting the cloud model of delivery and consumption of computing resources, the number one concern, from users to CIOs/CTOs, is security.
Derek Rustvold+3 more
openaire +2 more sources
2018
This chapter discusses why anyone needs security and why anyone would want to secure their data in the current world. It also covers the security options that each cloud vendor provides and how to achieve maximum security using those options. There might differences in ways of securing data for each vendor, but the ultimate goal is the same—secured ...
Avinash Vallarapu, Baji Shaik
openaire +2 more sources
This chapter discusses why anyone needs security and why anyone would want to secure their data in the current world. It also covers the security options that each cloud vendor provides and how to achieve maximum security using those options. There might differences in ways of securing data for each vendor, but the ultimate goal is the same—secured ...
Avinash Vallarapu, Baji Shaik
openaire +2 more sources
Communications of the ACM, 2010
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
openaire +1 more source
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
openaire +1 more source
Security Wrapper Orchestration in Cloud
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018We present an architecture and implementation of the security wrapper concept for the protection of virtualized network functions in a cloud environment. The security wrapper is the enclosing of a set of virtualized resources within a data plane transparent protective envelope in the network forwarding graph.
Lal, Shankar+6 more
openaire +3 more sources
2015
The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered.
Khalid Al-Begain+3 more
openaire +1 more source
The chapter presents current security concerns in the Cloud Computing Environment. The cloud concept and operation raise many concerns for cloud users since they have no control of the arrangements made to protect the services and resources offered.
Khalid Al-Begain+3 more
openaire +1 more source
2015
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing.
Natasha Csicsmann+3 more
openaire +1 more source
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing.
Natasha Csicsmann+3 more
openaire +1 more source
Security Issues in Cloud Federations
2012The cloud paradigm, based on the idea of delegating to the network any kind of computational resources, is showing a considerable success. The estimated trend is that the number of different cloud-based solutions, approaches, and service providers (CSP) will continue growing.
RAK, Massimiliano+6 more
openaire +3 more sources