Trap method in ensuring data security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ensuring Data Storage Security in Cloud Computing

Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...

متن کامل

Ensuring User Security and Data Integrity in Multi- Cloud

The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi – cloud. Provable data possession is a technique for ensuring data integrity. We present a co...

متن کامل

Ensuring Security in It Infrastructures

This paper reviews some of the difficulties that arise in the secureoperating system design. Then a formal framework different fromand more powerful than the existing ones in the literature has beenproposed aiming at supporting multiple security policies in moderncomputing environments. Finally, three novel models in thedifferent areas, namely the confidentiality policy mode...

متن کامل

Ensuring Data Security for Secure Cloud Hybrid Framework

With increasing technology demand for the cloud application is also increasing. Due to this security demands are also increasing. A user can access a cloud services from anywhere and at any time or almost instantly. These features make cloud computing so flexible and prone to risk. Therefore there are possibilities of lacking confidentiality, integrity and authentication among the cloud users. ...

متن کامل

Ensuring food and nutrition security

Ensuring that everyone in the world has access to enough nutritious food should be at the forefront of the post-2015 development discussions, as recently emphasized by the Secretary-General through the launch of the Zero Hunger Challenge.1 The present chapter highlights the changes needed in the food system to ensure food and nutrition security by 2050 and the challenges involved, given that ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology and Nanotechnology

سال: 2019

ISSN: 1613-0073

DOI: 10.18287/1613-0073-2019-2416-189-198