Trap method in ensuring data security
نویسندگان
چکیده
منابع مشابه
Ensuring Data Storage Security in Cloud Computing
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...
متن کاملEnsuring User Security and Data Integrity in Multi- Cloud
The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi – cloud. Provable data possession is a technique for ensuring data integrity. We present a co...
متن کاملEnsuring Security in It Infrastructures
This paper reviews some of the difficulties that arise in the secureoperating system design. Then a formal framework different fromand more powerful than the existing ones in the literature has beenproposed aiming at supporting multiple security policies in moderncomputing environments. Finally, three novel models in thedifferent areas, namely the confidentiality policy mode...
متن کاملEnsuring Data Security for Secure Cloud Hybrid Framework
With increasing technology demand for the cloud application is also increasing. Due to this security demands are also increasing. A user can access a cloud services from anywhere and at any time or almost instantly. These features make cloud computing so flexible and prone to risk. Therefore there are possibilities of lacking confidentiality, integrity and authentication among the cloud users. ...
متن کاملEnsuring food and nutrition security
Ensuring that everyone in the world has access to enough nutritious food should be at the forefront of the post-2015 development discussions, as recently emphasized by the Secretary-General through the launch of the Zero Hunger Challenge.1 The present chapter highlights the changes needed in the food system to ensure food and nutrition security by 2050 and the challenges involved, given that ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology and Nanotechnology
سال: 2019
ISSN: 1613-0073
DOI: 10.18287/1613-0073-2019-2416-189-198