نتایج جستجو برای: security as a service

تعداد نتایج: 14071652  

Journal: :International Journal of Computer Applications 2016

2014
Andy Sayler Dirk Grunwald

In the age of cloud computing, securely storing, tracking, and controlling access to digital “secrets” (e.g. private cryptographic keys, hashed passwords, etc) is a major challenge for developers, administrators, and end-users alike. Yet, the ability to securely store such secrets is critical to the security of the web-connected applications on which we rely. We believe many of the traditional ...

Journal: :Journal of Computer Security 2015
Giampaolo Bella Paul Curzon Gabriele Lenzini

The security and privacy of the data that users transmit, more or less deliberately, to modern services is an open problem. It is not solely limited to the actual Internet traversal, a sub-problem vastly tackled by consolidated research in security protocol design and analysis. By contrast, it entails much broader dimensions pertaining to how users approach technology and understand the risks f...

2013
Ali Imran Jehangiri Edwin Yaqub Ramin Yahyapour

Cloud computing is transforming the software landscape. Software services are increasingly designed in modular and decoupled fashion that communicate over a network and are deployed on the Cloud. Cloud offers three service models namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Softwareas-a-Service (SaaS). Although this allows better management of resources, the Qual...

Journal: :EURASIP J. Information Security 2016
Yumna Ghazi Rahat Masood Abid Rauf Muhammad Awais Shibli Osman Hassan

The trend of Cloud databases is leaning towards Not only SQL (NoSQL) databases as they provide better support for scalable storage and quick retrieval of exponentially voluminous data. One of the more prominent types of NoSQL databases is document-based storage, which is being increasingly used in the dynamic Cloud paradigm. However, there are inherent security issues in Cloud, including remote...

Journal: :CoRR 2018
Nane Kratzke

Cloud applications expose – beside service endpoints – also potential or actual vulnerabilities. And attackers have several advantages on their side. They can select the weapons, the point of time and the point of attack. Very often cloud application security engineering efforts focus to harden the fortress walls but seldom assume that attacks may be successful. So, cloud applications rely on t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید