منابع مشابه
Securing the Cloud
Identity management (IdM) is the complex and constantly evolving practice of identifying individuals and controlling their access to a network and connected resources. IdM research focuses primarily on making systems secure while the quality of the user experience is largely ignored. This article explores reasons why creating a user-centric IdM paradigm has become necessary, discusses existing ...
متن کاملSecuring the Cloud
In a Service-Oriented Architecture (SOA) system, services contain operations with openly defined input and output parameters. While satisfying functional requirements, a service also exposes its attack surface via published operations, open protocols, and accessible data as an adverse side effect, which makes it susceptible to exploitation by malicious actors. With this context, it is a challen...
متن کاملSecuring Cloud from Cloud Drain
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1...
متن کاملSecuring Cloud - The Quantum Way
Before we move forward a basic question arises that, what are quantum properties? To answer this question, we'll look at the basis of quantum mechanics – The Heisenberg's Uncertainty Principle. The uncertainty principle states that the more precisely the position is determined, the less precisely the momentum is known in this instant, and vice versa. For instance, if you measure the position of...
متن کاملSecuring Data Provenance in the Cloud
Cloud storage offers the flexibility of accessing data from anywhere at any time while providing economical benefits and scalability. However, cloud stores lack the ability to manage data provenance. Data provenance describes how a particular piece of data has been produced. It is vital for a post-incident investigation, widely used in healthcare, scientific collaboration, forensic analysis and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2010
ISSN: 0001-0782,1557-7317
DOI: 10.1145/1743546.1743565