[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

McKenna, 2015 - Google Patents

How federal agencies can secure their cloud migrations

McKenna, 2015

Document ID
11238857978731273378
Author
McKenna M
Publication year
Publication venue
Network Security

External Links

Snippet

The cloud offers increased efficiencies and cost savings, and the US Federal Government has taken notice. A massive migration to commercial cloud services is underway, and it's no mean feat. It necessitates the creation and implementation of a migration strategy that moves …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Similar Documents

Publication Publication Date Title
US11722521B2 (en) Application firewall
US10153906B2 (en) Systems and methods for implementing computer security
US8713633B2 (en) Security access protection for user data stored in a cloud computing facility
JP2020530922A (en) How to dynamically model and group edge networking endpoints, systems, and devices
Spanaki et al. Cloud Computing: security issues and establishing virtual cloud environment via Vagrant to secure cloud hosts
Kak Zero Trust Evolution & Transforming Enterprise Security
McKenna How federal agencies can secure their cloud migrations
Eldewahi et al. The analysis of MATE attack in SDN based on STRIDE model
Dhondge Lifecycle IoT Security for Engineers
GB2572471A (en) Detecting lateral movement by malicious applications
Tanque et al. Cyber risks on IoT platforms and zero trust solutions
Udaykumar Design And Deploy Secure Azure Environment
Javaid Top threats to cloud computing security
Beuchelt UNIX and Linux security
Saini et al. Edge computing challenges and concerns
Kouchay Data Protection in Cloud Computing-vulnerabilities, challenges and Solution
Suryambika et al. A survey on Security Analysis in Cloud computing
Lakshmi et al. Identity protection
Edwards Network Security
Haber et al. Remote Access
Ikundi et al. Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy
Udayakumar Get Started with Azure Security
Pavelka et al. Practical Aspects of Attacks Against Remote MS Windows Corporate Environment
Kait et al. Insights Into Cloud Computing: Unveiling Trends, Addressing Challenges, and Exploring Opportunities-A Systematic Review
Edwards Internet of Things (IoT) Security