Soubra et al., 2017 - Google Patents
An assessment of recent Cloud security measure proposals in comparison to their support by widely used Cloud service providersSoubra et al., 2017
View PDF- Document ID
- 13885744257616398039
- Author
- Soubra M
- Tanrıöver Ã
- Publication year
- Publication venue
- Mugla Journal of Science and Technology
External Links
Snippet
In this paper, we aim to present the recent security approaches and solutions proposed for cloud service providers and those provided by widely used cloud service providers. Through a review, recent cloud security mechanisms are discussed with respect to their mode of …
- 241001489523 Coregonus artedi 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/589—Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5885—Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5855—Message switching systems, e.g. electronic mail systems with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
Chadwick et al. | A cloud-edge based data security architecture for sharing and analysing cyber threat information | |
Singh et al. | Cloud security issues and challenges: A survey | |
Kulkarni et al. | A security aspects in cloud computing | |
Ardagna et al. | From security to assurance in the cloud: A survey | |
Bhathal et al. | Big Data: Hadoop framework vulnerabilities, security issues and attacks | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
Belapurkar et al. | Distributed systems security: issues, processes and solutions | |
Ahmed et al. | A review of challenges and security risks of cloud computing | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Chowdhury | Security in cloud computing | |
Lonea et al. | Identity management for cloud computing | |
Soares et al. | Cloud security: state of the art | |
Munir et al. | Secure cloud architecture | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Al Aqrabi et al. | A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service | |
Pal et al. | A novel open security framework for cloud computing | |
Alani et al. | Security threats in cloud computing | |
Balamurugan et al. | Enhanced role-based access control for cloud security | |
Yellamma et al. | Intelligent Data Security In Cloud Computing | |
Soubra et al. | An assessment of recent Cloud security measure proposals in comparison to their support by widely used Cloud service providers | |
Li et al. | A deep understanding of cloud computing security | |
Priyam | Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack | |
Udaykumar | Design And Deploy Secure Azure Environment | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service |