Sökning: "Cloud Security"

Visar resultat 1 - 5 av 11 avhandlingar innehållade orden Cloud Security.

  1. 1. Secure Service Provisioning in a Public Cloud

    Detta är en avhandling från Mälardalen Univsersity

    Författare :Mudassar Aslam; Mälardalens högskola.; SICS.; [2012]
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Computer Science; datavetenskap; VM migration; trusted platforms; cloud security; IaaS; TPM; Security; Trusted Computing; Virtualization; Cloud Computing; trust;

    Sammanfattning : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. LÄS MER

  2. 2. Bringing Visibility in the Clouds using Security, Transparency and Assurance Services

    Detta är en avhandling från Västerås : Mälardalen University

    Författare :Mudassar Aslam; Mälardalens högskola.; Mälardalens högskola.; SICS.; [2014]
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Computer Science; datavetenskap; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine;

    Sammanfattning : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. LÄS MER

  3. 3. CryptoNET Generic Security Framework for Cloud Computing Environments

    Detta är en avhandling från Kista : KTH Royal Institute of Technology

    Författare :Abdul Ghafoor Abbasi; KTH.; [2011]
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Generic Security Object; CryptoNET; Security; Framework; SOCIAL SCIENCES Statistics; computer and systems science Informatics; computer and systems science Information technology; SAMHÄLLSVETENSKAP Statistik; data- och systemvetenskap Informatik; data- och systemvetenskap Informationsteknologi; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Sammanfattning : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. LÄS MER

  4. 4. Security and Privacy of Sensitive Data in Cloud Computing

    Detta är en avhandling från KTH Royal Institute of Technology

    Författare :Ali Gholami; KTH.; [2016]
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cloud Computing; Security; Privacy; Trust; Opertaing System; Datalogi; Computer Science;

    Sammanfattning : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. LÄS MER

  5. 5. Trust but Verify : Trust Establishment Mechanisms in Infrastructure Clouds

    Detta är en avhandling från The Department of Electrical and Information Technology

    Författare :Nicolae Paladi; Lunds universitet.; Lund University.; [2017-09-04]
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cloud computing infrastructure; security; trust;

    Sammanfattning : In the cloud computing service model, users consume computation resources provided through the Internet, often without any awareness of the cloud service provider that owns and operates the supporting hardware infrastructure. This marks an important change compared to earlier models of computation, for example when such supporting hardware infrastructure was under the control of the user. LÄS MER