Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

Cloud computing focuses on virtualization security

Cloud computing Globalization in the wave of development, cloud computing from the original concept of the various applications to the landing, its advantages gradually revealed. The world's leading companies are also starting to chase the pace of cloud computing. In this situation, the domestic "cloud" footprint is not to be outdone, all over the cloud data center has been planning and construction.   And the important challenge that restricts the popularization of "cloud computing" is still the security issue.  Virtualization security is the focus of cloud security technology is mostly focused on virtualization security, the security technology for cloud applications is not much involved. ...

mysql database you need to pay special attention to the 23 items

Use MySQL, security issues can not fail to pay attention. Here are 23 things to note about MySQL prompts: 1. If the client-server connection needs to cross and pass an untrusted network, then you need to use an SSH tunnel to encrypt the connection's traffic. 2. Set password statement to modify the user's password, three steps, first "mysql-u root" landing database system, and then "mysql> update mysql.user set password = pas ...

Is Cloud Computing Safe under the Financial Crisis?

As a synonym for the new generation of computing models, cloud computing has given us the same kind of change in tactics and processes as the ever-changing clouds in the sky. When using the cloud, the data security is guaranteed? Where is the physical location for data storage? How data is protected? Who can access the data? How to Retrieve Data ... Rewriting the Startup Manual Creating a new software company is not difficult, but the hardest part of the company's success is the determination to rebuild the old rules to meet the real-time needs of the Internet age. Of course, access to venture capital or angel investment funds is the company started the first ...

Who are the companies facing cloud security challenges with?

Cloud computing as a new IT service model has changed it consumption patterns. For small businesses, when entrepreneurs want to start a new business, they often want to manage it in a flexible and scalable way. It is not as important to set up an IT department as it is to market, invest in research and development, and protect the flow of money. Because small micro-enterprises have no IT infrastructure in-house, most of them choose the public cloud service providers to supply IT services, thus becoming the pioneer of public cloud service application. For small micro Enterprise IT managers, the security of public cloud services looks ...

Secrets of cloud Security Seven deadly Sins

HP and Cloud Security Alliance recently enumerated Izumo Security Seven sins, if you want to move your application into the cloud, it is better to know the "guilt" in advance.   See if you or your cloud service have committed these crimes? Data loss/disclosure so far, there is no widely recognized security level to control data security in the cloud. Some applications leak data because of weak API access control and key generation, storage, and mismanagement.   And good data destruction strategies do not exist. Sharing technology vulnerabilities in the cloud, a ...

Security technology analysis of cloud storage

Analysis of the security technology of cloud storage forest Qingyun Zhao Shanbin Information Age Technology rapid development, human needs more powerful processing power, cloud computing technology emerged at the same time rapidly popular, and its auxiliary Sangwei cloud storage has been widely concerned and support. However, the data security problem of cloud storage has hindered its popularization and application, which has become the primary problem of restricting the development of cloud storage. The security of cloud storage is not only the traditional security can be completely solved, which involves some new key technologies and management technology. This article describes ...

Expert interpretation: Four Safety selection criteria for small-scale cloud

Many players are now rooted in the cloud.   How do small and medium businesses or home offices choose cloud computing Partners? What are the security issues for small-scale clouds that are crucial to the choice of cloud-computing partners? Consider the following security standards: Data encryption, redundant infrastructure, fine-grained access control, and Web application validation. First, Home Office and Small and medium business users need critical applications such as word processing, spreadsheet analysis, and demo tools. They also need e-mail and numbers for photos, videos, personal data, and small business data ...

Software management for cloud computing and large data

In the field of telecommunications and it, a complete system consists of various kinds of basic physical resources and software resources, the basic physical resources provide computing, storage, network and other hardware capabilities, and all kinds of software constitute a variety of colorful applications.   These applications are developed by different manufacturers, based on different operating system platforms, using different software architectures, with different deployment patterns, the application of diversification will inevitably bring the complexity of software management. The software management described in this paper mainly refers to the lifecycle management of the software in the field, including the release of software, configuration management, distribution and deployment, patch management 、...

Cloud security Architecture from the perspective of cloud consumers

Introduction Cloud application developers and DevOps have successfully developed tens of thousands of applications for IaaS (Amazon AWS, Rackspace, etc.) and PAAs (Azure, Google App Engine, Cloud Foundry, etc.) platforms. These platforms provide basic security mechanisms such as authentication, Dos attack defense, firewall policy Management, logging, basic user and account management, but security concerns remain the primary obstacle to enterprise cloud implementations. Security concerns for the cloud, deploying from a secure configuration ...

23 considerations for using MySQL database

Use MySQL, security issues can not fail to pay attention. The following are 23 tips for MySQL tips: 1. If the client-server connection needs to cross and pass an untrusted network, then you need to use an SSH tunnel to encrypt the connection's traffic. 2. Set password statement to modify the user's password, three steps, first "mysql-u root" landing database system, and then "mysql> update mysql.user set password = passwor ...

Reasonably cut the budget, to avoid wasting several major points of funds

In the golden age of IT, it was not too serious for IT departments to waste more or less because IT companies were mostly funded. As a result, CIOs of many IT departments were really missing out. Today, however, businesses often suffer from tight budgets and less back-up capital, which also indicates that IT departments should do their homework well before your superiors are ready to start your work, and carefully study the flow of funds And where you can cut the budget. The main point of this article is to analyze several main ways in which your money may flow out. Of course some of you have heard ...

Connecting to the Cloud, part 3rd: Cloud Governance and security-securing Hybridcloud applications

This article is the 3rd and final part of a series of articles on building mixed cloud applications, examining governance and security for cloud computing. This article expands the Hybridcloud application for part 2nd by examining how to add access control policies to the Amazon simple Queue Service (SQS). Learn more about how Hybridcloud applications authenticate themselves to cloud services ...

Research and implementation of cloud storage access control technology based on ontology

Research and implementation of cloud storage access control technology based on ontology Ecust Hong based on the characteristics of cloud storage access control and cloud storage standard (CDMI), this paper improves the access control domain, storage object and role inheritance of RBAC model, and increases the time constraint on roles and permissions. At the same time, using ontology technology and owl language, the ontology of access control model is established, and the semantic technology describes the entity and strategy of DONTO_RBAC, which realizes the security strategy of access control in the multi domain environment through ontology, which is based on the ...

Cloud security Architecture design and Practice Tour

In the coming months, Aliyun will also work with the technology media community such as Infoq to open a cloud technology course in 12 cities across the country, communicating face-to-face with lecturers to make developers truly understand cloud computing and better use cloud computing.   Although Aliyun the pace of the classroom a little later, but we will carefully walk every step, welcome to pay attention to Aliyun Open class, I hope we do not miss! This issue of the public class we invite to Aliyun flying Systems Two senior security experts Li (nickname) and Yang Mengzhe (nickname Mengjie), two lecturers on the "cloud computing security system in the sandbox ..."

IBM "combination boxing" guard against new security threats

Recently, IBM announced the introduction of new services, hardware and software designed to improve the security of the cloud computing environment, ensure data confidentiality, and protect against application attacks. The latest research by IBM's X-force Security research team shows that global crime organizations are developing new attack technologies at an alarming rate. At the same time, companies are increasingly deploying more collaborative business models and using new IT infrastructures, including cloud computing, virtualization, and Web 2.0, all of which bring new complexities to the security team. IBM's brand New ...

Smart community: Hold the moment and see the future

The construction of Intelligent city, the improvement of living standard, for people living environment, community construction is related to everyone's immediate interests. As a microcosm of the city of Wisdom, the smart community is using the Internet of things, cloud computing, mobile Internet, information intelligent terminals, such as new generation of information technology, to achieve community residents eat, live, travel, shopping, entertainment, health, such as the digitization of life, networking, intelligence, interactive and collaborative management, the community construction into a more efficient, convenient service,   Management wisdom, life intelligence, environment livable community life new business. Because of this, in recent years, our country began to have a systematic construction ...

Unique security measures needed for cloud computing

If employees use mobile devices to access the database of background management programs, their security problems will become increasingly serious. Because mobile cloud computing allows IT administrators to centrally control security, this technology helps address these security issues. Companies migrating from physical environments to virtual environments such as cloud computing need to update their security concepts and practices. You cannot install a traditional firewall or antivirus software in a cloud-based virtual environment; The physical firewall is not designed to check and filter traffic from the hypervisor running several virtual servers. No matter what protection measures ...

How to solve the cloud storage access control measures?

Nowadays, cloud storage is becoming a popular product in any area, business or home. Just as services like Amazon S3, Box, Copiun, and Thru have feature-rich products that make it easy for users to back up, sync, and store documents and files. Although for ordinary consumers there is not much to worry about when using such services, there are many security issues that need to be addressed, from encryption to data lifecycle management, to organizations, when choosing cloud storage services. Emerging areas of the business focus on defining and controlling access methods and their definitions based on ...

How do enterprises choose the right large data security program? Reference

There are several technologies that can address the security of unstructured data, but once the data is out of the network, these security technologies lose their impact because they cannot control the environment after the data is migrated. These technologies have one thing in common, and security controls are bound to the data itself, such as networks or computer peripherals. No matter where the data is transferred, there is only one technology that can completely protect the access to it. It establishes the classification of metadata, access control, and information about the permissions that individual users are allowed to access data, which is called Information Rights Management (IRM). IRM is essentially a combination of encryption and access control built into ...

Application access security control based on cloud data

One of the cloud computing infrastructures is to provide a reliable and secure data storage center, so storage security is one of the security topics in the Cloud computing field. Storage security in cloud storage applications includes data encryption storage, security policy management, security logging, and auditing. Security logs and audits provide the necessary audit information for both the monitoring system and the active user.   Especially the security control of data access is especially important, and the access control mechanism of data is a subject to be studied in the tradeoff of providing security and convenience for users to share. Amazon S3 S3, EMC Atmos on ...

Total Pages: 10 1 .... 6 7 8 9 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.