Cockrell, 2011 - Google Patents
Avoiding a Storm by Evaluating the Clouds: A Guide to Cloud ComputingCockrell, 2011
View PDF- Document ID
- 8568402842397754897
- Author
- Cockrell V
- Publication year
External Links
Snippet
If you are alive and have touched a computer, smart phone or other WIFI enabled device within the past two years, you have been exposed to cloud computing. Cloud computing has infiltrated the world of technology in recent years in a massive way and its popularity …
- 238000005516 engineering process 0 abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Subashini et al. | A survey on security issues in service delivery models of cloud computing | |
Hu et al. | A review on cloud computing: Design challenges in architecture and security | |
US8910278B2 (en) | Managing services in a cloud computing environment | |
Khan et al. | Establishing trust in cloud computing | |
Viega | Cloud computing and the common man | |
Jain et al. | Security Issues and their solution in cloud computing | |
Karadsheh | Applying security policies and service level agreement to IaaS service model to enhance security and transition | |
Robinson et al. | The cloud: understanding the security, privacy and trust challenges | |
Piplode et al. | An overview and study of security issues & challenges in cloud computing | |
Singh et al. | Overview of security issues in cloud computing | |
Uddin et al. | Mobile agent based multi-layer security framework for cloud data centers | |
Kumar et al. | Assurance of data security and privacy in the cloud: A three-dimensional perspective | |
Mehra et al. | Analyzing cloud computing security issues and challenges | |
Kumar et al. | Migration of services to the cloud environment: Challenges and best practices | |
Pramod et al. | Limitations and challenges in cloud-based applications development | |
Del Mar López Ruiz et al. | Privacy risks in cloud computing | |
Cockrell | Avoiding a Storm by Evaluating the Clouds: A Guide to Cloud Computing | |
Latekar et al. | Resolving Multi Tenancy Issues Using Cloud Automation | |
Tiwari et al. | Cloud virtual image security for medical data processing | |
Kate Tomchik | Comparison of the IaaS Security Available from the Top Three Cloud Providers | |
Sebastian et al. | A review on cloud security threats and solutions | |
Sahoo | Cloud computing and its security measures | |
EFUNTADE et al. | Cloud Technology-Based Auditing and Accounting Services: General Outlook, Conditions, Issues and Review of Nigerian Accounting System | |
IFAWOYE et al. | CURRENT DATA SECURITY AND PRIVACY CHALLENGES IN CLOUD COMPUTING: A REVIEW | |
Anitha et al. | A Smart Cloud architecture to handle security issues and vulnerabilities in cloud |