McKenna, 2015 - Google Patents
How federal agencies can secure their cloud migrationsMcKenna, 2015
- Document ID
- 11238857978731273378
- Author
- McKenna M
- Publication year
- Publication venue
- Network Security
External Links
Snippet
The cloud offers increased efficiencies and cost savings, and the US Federal Government has taken notice. A massive migration to commercial cloud services is underway, and it's no mean feat. It necessitates the creation and implementation of a migration strategy that moves …
- 230000005012 migration 0 title abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11722521B2 (en) | Application firewall | |
US10153906B2 (en) | Systems and methods for implementing computer security | |
US8713633B2 (en) | Security access protection for user data stored in a cloud computing facility | |
JP2020530922A (en) | How to dynamically model and group edge networking endpoints, systems, and devices | |
Spanaki et al. | Cloud Computing: security issues and establishing virtual cloud environment via Vagrant to secure cloud hosts | |
Kak | Zero Trust Evolution & Transforming Enterprise Security | |
McKenna | How federal agencies can secure their cloud migrations | |
Eldewahi et al. | The analysis of MATE attack in SDN based on STRIDE model | |
Dhondge | Lifecycle IoT Security for Engineers | |
GB2572471A (en) | Detecting lateral movement by malicious applications | |
Tanque et al. | Cyber risks on IoT platforms and zero trust solutions | |
Udaykumar | Design And Deploy Secure Azure Environment | |
Javaid | Top threats to cloud computing security | |
Beuchelt | UNIX and Linux security | |
Saini et al. | Edge computing challenges and concerns | |
Kouchay | Data Protection in Cloud Computing-vulnerabilities, challenges and Solution | |
Suryambika et al. | A survey on Security Analysis in Cloud computing | |
Lakshmi et al. | Identity protection | |
Edwards | Network Security | |
Haber et al. | Remote Access | |
Ikundi et al. | Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy | |
Udayakumar | Get Started with Azure Security | |
Pavelka et al. | Practical Aspects of Attacks Against Remote MS Windows Corporate Environment | |
Kait et al. | Insights Into Cloud Computing: Unveiling Trends, Addressing Challenges, and Exploring Opportunities-A Systematic Review | |
Edwards | Internet of Things (IoT) Security |