[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cockrell, 2011 - Google Patents

Avoiding a Storm by Evaluating the Clouds: A Guide to Cloud Computing

Cockrell, 2011

View PDF
Document ID
8568402842397754897
Author
Cockrell V
Publication year

External Links

Snippet

If you are alive and have touched a computer, smart phone or other WIFI enabled device within the past two years, you have been exposed to cloud computing. Cloud computing has infiltrated the world of technology in recent years in a massive way and its popularity …
Continue reading at vincentcockrell.wordpress.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Subashini et al. A survey on security issues in service delivery models of cloud computing
Hu et al. A review on cloud computing: Design challenges in architecture and security
US8910278B2 (en) Managing services in a cloud computing environment
Khan et al. Establishing trust in cloud computing
Viega Cloud computing and the common man
Jain et al. Security Issues and their solution in cloud computing
Karadsheh Applying security policies and service level agreement to IaaS service model to enhance security and transition
Robinson et al. The cloud: understanding the security, privacy and trust challenges
Piplode et al. An overview and study of security issues & challenges in cloud computing
Singh et al. Overview of security issues in cloud computing
Uddin et al. Mobile agent based multi-layer security framework for cloud data centers
Kumar et al. Assurance of data security and privacy in the cloud: A three-dimensional perspective
Mehra et al. Analyzing cloud computing security issues and challenges
Kumar et al. Migration of services to the cloud environment: Challenges and best practices
Pramod et al. Limitations and challenges in cloud-based applications development
Del Mar López Ruiz et al. Privacy risks in cloud computing
Cockrell Avoiding a Storm by Evaluating the Clouds: A Guide to Cloud Computing
Latekar et al. Resolving Multi Tenancy Issues Using Cloud Automation
Tiwari et al. Cloud virtual image security for medical data processing
Kate Tomchik Comparison of the IaaS Security Available from the Top Three Cloud Providers
Sebastian et al. A review on cloud security threats and solutions
Sahoo Cloud computing and its security measures
EFUNTADE et al. Cloud Technology-Based Auditing and Accounting Services: General Outlook, Conditions, Issues and Review of Nigerian Accounting System
IFAWOYE et al. CURRENT DATA SECURITY AND PRIVACY CHALLENGES IN CLOUD COMPUTING: A REVIEW
Anitha et al. A Smart Cloud architecture to handle security issues and vulnerabilities in cloud