[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Soubra et al., 2017 - Google Patents

An assessment of recent Cloud security measure proposals in comparison to their support by widely used Cloud service providers

Soubra et al., 2017

View PDF
Document ID
13885744257616398039
Author
Soubra M
Tanrıöver Ã
Publication year
Publication venue
Mugla Journal of Science and Technology

External Links

Snippet

In this paper, we aim to present the recent security approaches and solutions proposed for cloud service providers and those provided by widely used cloud service providers. Through a review, recent cloud security mechanisms are discussed with respect to their mode of …
Continue reading at dergipark.org.tr (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/589Message switching systems, e.g. electronic mail systems unified messaging, e.g. interactions between instant messaging [IM], e-mail or other types of messages such as Converged IP Messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5885Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5855Message switching systems, e.g. electronic mail systems with selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Chadwick et al. A cloud-edge based data security architecture for sharing and analysing cyber threat information
Singh et al. Cloud security issues and challenges: A survey
Kulkarni et al. A security aspects in cloud computing
Ardagna et al. From security to assurance in the cloud: A survey
Bhathal et al. Big Data: Hadoop framework vulnerabilities, security issues and attacks
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Belapurkar et al. Distributed systems security: issues, processes and solutions
Ahmed et al. A review of challenges and security risks of cloud computing
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Chowdhury Security in cloud computing
Lonea et al. Identity management for cloud computing
Soares et al. Cloud security: state of the art
Munir et al. Secure cloud architecture
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Al Aqrabi et al. A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service
Pal et al. A novel open security framework for cloud computing
Alani et al. Security threats in cloud computing
Balamurugan et al. Enhanced role-based access control for cloud security
Yellamma et al. Intelligent Data Security In Cloud Computing
Soubra et al. An assessment of recent Cloud security measure proposals in comparison to their support by widely used Cloud service providers
Li et al. A deep understanding of cloud computing security
Priyam Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Udaykumar Design And Deploy Secure Azure Environment
Kuzminykh et al. Mechanisms of ensuring security in Keystone service