Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

The most secure cloud services with five features

The security cloud service is the cloud computing technology in the network security domain application and expands thus realizes the network security namely the service the technology and the business model, it through will enhance the network security ability (including the access control, the DDoS protection, the virus and the malicious code detection and processing, the network traffic security detection and the filtering, Security filtering for applications such as mail, network scanning, web and other specific applications such as security detection, network anomaly flow detection, etc., such as resource clustering and pooling, so that users do not need their own security facilities for maintenance management and minimize the cost of service and business provider interaction, through mutual ...

Java Security Model framework: Use of secure access control

As a language born of the rise of the Internet, Java from the outset with security considerations, how to ensure that the download to the local Java program on the Internet is safe, how to access the Java program permissions to local resources Limited authorization, these security considerations from the outset to affect the Java Language design and implementation. It can be said that Java in these aspects of exploration and experience, some of the later language and products have brought a positive impact. This article describes the security model in Java and how to take advantage of secure http: ...

Research and improvement of trusted cloud computing platform based on group theory

Research and improvement of trusted cloud computing platform based on group theory Li lei Zheng Lei Zhang Zhihong cloud Computing can reduce the company's investment costs in network services, but there are also issues that concern the company: the cloud of user data security, the credibility of users ' network connections, cloud services, such as the confidentiality of trusted issues. This paper presents an improved design model of trusted cloud computer platform, which adopts the network access control mechanism based on trusted network connection, and uses the key mechanism of the group Cartesian product encryption algorithm to realize the VTPM integrity verification module. The safety analysis proves that ...

On the "cloud" and open the new mode of security service operation

Into the 21st century, especially in recent years, the domestic security market demand situation has undergone significant changes. Professional use and management of video surveillance, anti-theft alarm, access control, and building intercom and other professional systems for the content of the security business is no longer the only focus of security market. For all users to provide information needs, including for individuals, families, shops to provide video alarm networking, remote care, community information services, such as diversification, self-management of the overall security for the content of the civil security demand is growing rapidly. Along with all kinds of security monitoring products in the banking, electricity, government agencies, schools, communities and other fields of widespread application, ...

A survey of data security and privacy protection technologies for public cloud storage services

Public cloud storage Service data security and Privacy Protection Technology Overview Li Sun Wenhai Li Fenghua Wang Boyang with the increasing popularity of cloud computing technology, public cloud storage services have been widely used, DropBox, Google Drive, Jinshan fast-disk and other public cloud storage applications, the rapid growth of users. However, there is also growing concern about the privacy, integrity, and controllable sharing of data that they keep in the cloud. In order to solve this problem, in recent years, the academic circles have fine-grained access control of data in public cloud storage service, ciphertext search, data integrity audit and cloud storage data ...

The SaaS Security Standards Checklist for chief information security officers

Users still need to control potential compliance risks before the SaaS provider improves security standards (visible and controllable to customers).   Clearly, security is the biggest problem in moving business applications out of the enterprise. Without seeing user activity, monitoring, and restricting access control, SaaS is critical to the chief Information Security Officer (CISOS), especially compliance responsibilities.   To reduce security issues, the security team (especially the enterprise) must do a lot of work, including: actively participate in purchasing, take a proactive attitude and audit all SaaS relationships. ...

Research on secure data storage structure based on cloud computing

Research on the security data storage structure based on cloud computing Zhao Yin-chen Ma Guohua Ma Chunlong Wang Juan analyzes the characteristics and architecture of cloud storage, deeply analyzes the existing problems of cloud data security, such as data privacy security, data isolation security, cloud computing platform security hidden danger, cloud computing provider's reliance degree is too high, Cloud security management of user data, the paper puts forward the security solution of cloud data, including data encryption, data isolation, access control, risk assessment, unified threat management and the establishment of security cloud. Security data based on cloud computing ...

Key technology analysis of file sharing in encrypted cloud storage

Key technology analysis of file sharing in encrypted cloud storage Zhang Jidong Shoda as cloud computing concepts become popular, cloud storage is increasingly being mentioned. Cloud storage is widely supported and focused on its low-cost, scalable features, but it also poses new security concerns: In most cases, users do not fully trust the cloud storage service provider, which requires data encryption to ensure the confidentiality of the data. In the existing access control technology based on ciphertext, the data owner (owner) needs to maintain and release the data key for each user, so that in the case of a large number of users, Ow ...

Cloud computing security issues

Cloud computing is already a very hot concept, involving a very large number of services, flexible computing services, file storage services, relational database services, key-value database services, and many others. This article will briefly explain the security issues of elastic computing services, as flexible computing is the most commonly used cloud service and also the cloud service with the highest security risk. 1. Introduction Since many things involve corporate secrets, technical details, implementation or new directions, this article does not explain. Interested can vote for a resume, we work together for cloud computing. 2....

How to set up a CVS server in Redhat9.0 environment

CVS is a well-known http://www.aliyun.com/zixun/aggregation/9591.html "> Version control Tool, which is useful for both individual programmers and a development team." CVS is very powerful, as a whole it is a C/s structure of software, the user should first set up a CVS server, on the CVS server to import project instances, the establishment of CVS Project access control. And customers access the CVS server through the client, ...

Distributed access control system 1.4.26 Publishing access controls

Distributed access control system abbreviation DACS is a lightweight single sign-on http://www.aliyun.com/zixun/aggregation/38609.html "> Access controller. It provides flexible, modular authentication methods, powerful, transparent rules based Web service authorization checks, CGI programs, or almost any program. Distributed Access Control ...

Windows Azure Solutions Series: Developing and expanding search-rescue applications, saving more drowning people

In an effort to reduce the high risk of sea death in the fishing industry, Royal National Lifeboat centric signed an agreement with Active Web FX (AWS) to create an automated offshore security application. AWS has developed a location-based service infrastructure, code-named "Geopoint", which transmits location data to the central tracking and alerting system. AWS uses Geopoint to build MOB Gu ...

"Cloud storage Gateway"--cloud storage application becomes simpler

With this article, you can learn that cloud storage gateways can help users migrate their applications to cloud storage service platforms and cloud storage systems more easily. Through gateways, cloud storage systems look like traditional storage applications and can be modeled as NAS file servers, block storage arrays, intelligent backup destinations, and even an extension of the application itself.   You will also learn about some of the high value-added technical features that vendors offer to users in their cloud storage gateway offerings. The primary application of cloud storage is the long-term archiving of data and the low cost of saving unimportant data. So ...

Application of "CIA three" to define cloud computing risk and protection measures (II.)

"I": Integrity (Integrity) Risk These risks affect the validity of the information and the assurance of the correctness of the information. Some government regulations pay special attention to ensuring the accuracy of information.   If information is changed without warning, authorization or audit trail, its integrity cannot be guaranteed.   1 failure of a computer and a storage failure may result in data corruption.   Defense: Make sure that your chosen service provider has the appropriate raid redundancy for the storage network built into it, and that archiving important data is part of the service. Detection: Use those ...

Cloud computing data and information security protection

Cloud computing data processing and storage are carried out on the cloud platform, computing resource owners and users of the separation has become the inherent characteristics of the cloud computing model, resulting in users of their own data security storage and privacy concerns are inevitable. Specifically, user data even includes privacy-related content in remote computing, there are potential for intentional or unintentional leaks in storage and communication, as well as data loss caused by failures such as power outages or downtime, even for unreliable cloud infrastructure and service providers, and may be inferred from the analysis of user behavior, Learn about the user's privacy letter ...

Research on data access control strategy of meteorological cloud based on attribute encryption

Study on data access control strategy of meteorological cloud based on attribute encryption Fangzhong Xiazhihua Zhou Shu with the increasing of meteorological service level, the problem of cloud storage and instant sharing of meteorological data is becoming more and more prominent. Aiming at the problem of identity authentication and access control for meteorological data storage and sharing in cloud computing environment, an access control model of attribute encryption based on multiple authorization is proposed. This model adopts a kind of attribute encryption scheme which is suitable for large data in cloud environment, solves the problem of fine-grained access control of data in meteorological department, and introduces the concept of global ID and multiple authorization mechanism to solve ...

Wave Zhang: A big data age, challenges and solutions

The first China cloud Computing conference was opened in June 2013 5-7th at the Beijing National Convention Center. The Conference, with an international perspective, insights into global cloud computing trends, and from the application, explore cloud computing and large data, cloud computing and mobile Internet, cloud security and cloud computing industry applications, such as the focus of the topic. In particular, the Conference has set up a cloud computing services display area, exchange the latest research results of international cloud computing, showcase domestic cloud computing pilot City development achievements, share cloud computing development experience, promote global cloud computing innovation cooperation. Wave group system software director, Cloud Computing Products Department General Manager ...

Where is the outlet for the SP industry at sunset?

Absrtact: Where is the outlet for the SP industry at sunset? Once the scenery of the SP industry is now a more and more difficult, Mii new round of crackdown has been quietly launched, with the 2G voice charges, repeated investment, similar competition, the current domestic SP not sunset SP industry outlet where? Once the scenery of the SP industry is now a more and more difficult, Mii new round of "strike" has been quietly launched, with the 2G voice tariff constantly downward, repetitive investment, similar competition, the current domestic SP no new selling points and ...

Five Things to Consider Before Leaving a Development Project to PaaS

Platform-as-a-service provides many advantages for users over managing your own development infrastructure and allows you to spend more time focusing on design and coding. But PaaS might be the first choice for new projects, but PaaS may not be suitable for existing, legacy development efforts. There are five things to consider before moving a legacy development project to PaaS. How to use PaaS? Different companies, PaaS play a different role to adapt to their IT environment and goals. First, you have to figure out how to put Pa ...

Comparison of enterprise and user authentication standards and protocols IAM related standards and protocols for cloud computing services

"IT168 book" This article extracts from the Zhou Hongpo "cloud computing Security and privacy". In the previous section, we established the requirements and benefits of the IAM principles and practices for applying standards to cloud computing services. In this section, we will discuss the criteria for IAM, which is the catalyst for the enterprise to adopt cloud computing services.   Organizations that are currently evaluating cloud computing services based on business and operational guidelines should take into account the commitment of cloud computing service providers and support for identity and access management standards. 5.7.1 mechanism of the IAM standards and norms below the ia ...

Total Pages: 10 1 .... 3 4 5 6 7 .... 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.