Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

Workflow scheduler azkaban installed

Overview 2.1.1 Why a Workflow Dispatching System A complete data analysis system is usually composed of a large number of task units: shell scripts, java programs, mapreduce programs, hive scripts, etc. There is a time-dependent contextual dependency between task units In order to organize such a complex execution plan well, a workflow scheduling system is needed to schedule execution; for example, we might have a requirement that a business system produce 20G raw data a day and we process it every day, Processing steps are as follows: ...

CA Virtual Environment Access Control: Protecting Virtualization Security is imminent

Today, CA Technologies, a provider of cloud computing solutions, officially announced the CA Access Control for Virtual Environments solution, which extends its identity and access management (IAM) security expertise, Can complement and protect VMware virtual environments. With a perfect solution to several security and compliance issues and to help control privileged users' access to the virtual environment, the CA virtual environment ...

Ck-erp 0.31.1 Release multi-function ERP system

Ck-erp is a multifunctional accounting/education/MRP/ERP/CRM system for enterprises that can operate on multiple intermediary devices. It provides multi-currency, http://www.aliyun.com/zixun/aggregation/9348.html, multi-warehouse accounting, and back office functions for medium-to > Small businesses, providing high-density access control security and multi-language operations. CK-ERP consists of 32 modules, including: contact management, customer relationship management, guest ...

Opendocman 1.2.6.1 Release Document management system

Opendocman is a web-based multifunctional http://www.aliyun.com/zixun/aggregation/7453.html "> Document management System (DMS), written in PHP and designed to conform to ISO 17025 /iec Standard. Main features include: Automatic installation scripts, custom themes, Plug-ins, check-in/out, module access control, file auditing, user access control, and excellent search capabilities. Open ...

Analysis of key technologies in cloud storage security

The Internet of things is a kind of network which uses computer technology, Internet technique, communication technology, sensing technology and so on to connect the goods with the net to realize the function of information transmission, intelligent recognition and object management. With the wide attention to cloud computing technology, cloud storage technology has been widely paid attention to. Cloud storage can integrate a variety of storage devices under the support of a series of software, which forms the use of empty users of mass storage space.   Using cloud storage Service, IoT suppliers can achieve the goal of avoiding the data storage center, saving operation cost and improving service quality. One...

How IDC protects the information security in the cloud computing age

Now has entered the cloud computing era, distributed computing, flexible billing has become possible, "resources + operation + security" is the basic services of IDC service providers, focus on resources and operation, and the relatively weak security protection of IDC service providers, how to ensure the cloud computing era of information security? With the Mengjin of information technology, all kinds of powerful security tools are emerging, but the problem of information security is not only alleviated, but increasingly serious.   Especially for IDC service providers, not only to face the traditional threat, but also to face endless, unpredictable new challenges. But security issues ...

Analysis of database security and development based on cloud computing

Cloud services and cloud computing any web-based applications and services provided by cloud computing can become cloud services. Cloud services This model can significantly improve the interests of smaller companies and enterprises, compared with the company-specific ERP, the use of cloud services such a model can achieve centralized resource allocation and resource management, but also better meet the needs of users, to achieve procurement configuration, to avoid waste of resources. The company's professional and technical personnel will be regularly maintained and maintained, can significantly reduce costs.   The reliability, expansibility and stability of the system are improved remarkably. The advantages of cloud services are low cost and similar to China ...

Four security issues to torture SaaS and cloud computing

First, the cloud standard is very weak ISO27001 is a fairly comprehensive standard that covers a wide range of customer-focused operational security issues. "This is, for me, at least a basic basis for assessing the maturity of SaaS providers," said Chenxiwang, a Forrester analyst. However, handing your data to suppliers passing the ISO27001 standard does not guarantee the security of your data. The survey found that many companies claimed to conform to the ISO27001 standards, and then admitted "there is a shortage of privileged user management ...

Cloud computing security and privacy: identity and access management

Page 1th: Why use the IAM in the traditional sense, organizations invest in IAM practices to improve operational efficiency and meet requirements for regulatory, privacy, and data protection: improved operational efficiency The architecture of good IAM technologies and processes automates repetitive work such as user entry,   Thus improving efficiency (for example, self-service reset user request password without system administrator using Help desk dispatch system intervention). Compliance Management to protect systems, applications, and information from internal and external threats such as ...

Full solution of the relationship between intelligent home and cloud computing

This paper first introduces the concept of intelligent home and cloud computing, then, according to the traditional method of mass data processing, the hardware cost is too high and the problem of calculating bottleneck exists, the data processing platform based on Hadoop is built on the basis of cloud computing theory aiming at the access control system, temperature and humidity system, drip irrigation system and illumination system in intelligent home.   A large number of sensor information can be distributed in parallel processing, and according to processing results to the bottom of the device to send instructions to achieve intelligent services. Smart home and Cloud computing 1.1 smart home at present, the smart home is usually defined as the use of electricity ...

Splunk software integrates with Apache (TM) Hadoop (tm)

Splunk Inc., the leading operating intelligence software provider, announced today that it will integrate Splunk enterprise™ software with apache™hadoop™. A new package named Splunk Enterprise™with Hadoop will benefit Splunk users and businesses that plan to configure Hadoop. Incumbent Battery Ventures entrepreneur, former chief architect of Yahoo Global Cloud computing group Tod ...

PHP the most important seven security vulnerabilities

PHP is a great language for the fast-growing dynamic web pages. PHP also has the characteristics of junior programmers friendly, such as PHP do not need dynamic statement. However, these features may cause a programmer to unintentionally sneak a security vulnerability into a web application. There are a number of proven vulnerabilities in popular security mailing lists in PHP applications, but once you understand the basic types of vulnerabilities that are common in PHP applications, you'll find it equally as secure as any other language. In this article, I will detail in detail what will lead to security vulnerabilities ...

Five Key Challenges for Virtualization Security

Today's hottest IT field of non-cloud computing, none other than its rapid development momentum can be used to describe the crazy. Even the giants of the traditional IT industry have also been transferred to them, however, emerging technologies always have some unsatisfactory shortcomings. Xiaobian next to simply sum up the five key challenges facing cloud computing technology. 1. Data Governance Before introduced many kinds of data governance methods, principles and processes. Basically, businesses have a lot of sensitive data that needs to be monitored and protected. This type of data and the key information it generates is the organism of the business ...

389 Directory server 1.2.10.3 publishes Linux directory servers

389 directory server is a full-featured, compliant, LDAPV3 Linux directory servers that evolve from Fedora directory server. In addition to standard LDAPV3 operations, it also supports multiple master replications, fully online configuration and management, links, virtual properties, http://www.aliyun.com/zixun/aggregation/38609.html in Data "> Access control directives, Virtual list view, ...

Research on cloud storage security technology in IoT environment

The Internet of things is a kind of network which uses computer technology, Internet technique, communication technology, sensing technology and so on to connect the goods with the net to realize the function of information transmission, intelligent recognition and object management. With the wide attention to cloud computing technology, cloud storage technology has been widely paid attention to. Cloud storage can integrate a variety of storage devices under the support of a series of software, which forms the use of empty users of mass storage space.   Using cloud storage Service, IoT suppliers can achieve the goal of avoiding the data storage center, saving operation cost and improving service quality. One...

Research on access control technology based on negation rule in cloud computing

Research on access control technology based on negation rule in cloud computing the security and privacy protection of Wu Zhengxue data poses great challenges to the cloud computing field, and a access control technique based on negative rules is proposed to realize the sharing of some data among cooperative enterprises in a cloud environment without involving confidential information. The main idea is to prevent illegal access by judging whether the access query is authorized and whether there is conflict between the authorization and the negative rule. Theoretical analysis and experimental results show that this mechanism can effectively guarantee the security of cloud data. Research on access control technology based on negation rule in cloud computing

Security technology of enterprise private cloud Platform

Cloud computing is a new internet based computer technology, it integrates the distributed computing, utility computing, parallel Computing, grid computing, networked storage, virtualization and other traditional computer and network technology, forming a set of new standards and models, "cloud computing" concept is rapidly applied to the production environment, all kinds of "cloud computing" The scope of service is growing and its influence is incalculable. In layman's terms, cloud computing is a way for you to give all data processing tasks to the network, and the Enterprise Data Center is responsible for processing the data tasks on the client's computer so that you can pass a data ...

On the security of Digital archives information in cloud environment

The advent of cloud computing has proclaimed the advent of Low-cost supercomputing, which has pushed human society into an era of hyper-sharing with its superior computing power, low cost and high efficiency, and the construction of digital archives has entered a qualitative change. In the past two years, all the archives have considered relying on the existing hardware network equipment to build a national and regional cloud computing platform to achieve the unified management of huge amount of archival information. Using cloud computing Architecture system platform, can make a large number of file servers work together to facilitate the deployment and opening of archival operations, rapid detection and recovery of system failures, to the daily ...

Trend technology to build information security platform

In the process of rapid development of enterprise informatization, the problem of network security has been affecting the efficiency of it usage, especially the problem of theft caused by web threat to the enterprise.   In this respect, the security manufacturers have also begun to make an impact, to build information security platform.   Recently, the trend of science and technology to assist the Jiangsu Taizhou Port Ship Co., Ltd., the use of trend technology to provide a Web security access Control Gateway (IWSA) for the company intranet users with "disinfection" of the network access to exports. It is understood that the Taizhou port ship now has nearly 500 terminals and dozens of servers, including the mail ...

Intelligent Home Information processing platform based on Hadoop cloud computing

In recent years, it has become a trend to master cloud computing technology from the point of view of scientific research or application development, when the application of mass data demand is becoming more and more common. As one of the main fields of the Internet of things, smart home is naturally inseparable from cloud computing.   With the development of cloud computing, users need not pay attention to the complex internal working mechanism, need not have rich distributed system knowledge and development experience, can realize large-scale distributed system stipulation deployment, and the massive data parallel processing. Hadoop is now a more mature and widely used cloud computing architecture ...

Total Pages: 10 1 .... 5 6 7 8 9 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.