Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

Anonymous chaotic cloud storage strategy based on Cp_abe and two-fork tree bias codes

Anonymous chaotic cloud storage strategy based on Cp_abe and two-fork tree partial codes Hebei University Yi Qingqing with the application and development of cloud computing technology, cloud storage and its security, as its basic component, have become the focus of the research. Cloud storage is a new concept that extends and develops in the concept of cloud computing (cloud computing), which means that a large number of different types of storage devices in the network can be assembled together through application software through the functions of cluster application, grid technology or Distributed File system, Together to provide data storage and business access function ...

The enterprise should pay attention to the cloud stack security

Essentially, all cloud computing services consist of a "stack", this may include hardware assets (server memory, CPU, disk), virtualization technologies running on hardware, network formation (including physical and virtual), additional computing and programming software, mass storage and virtual machines (VMS), or application and software instances. While this broad set of technologies opens up a world of opportunity in computing, companies must know that vulnerabilities can occur in the cloud stack because of the way in which these technologies interact and the features that are often shared among cloud computing customers. For example, in multi-user systems, ...

McAfee Enhanced Cloud security platform features build stronger cloud Platform

For enterprises, deploying cloud technologies faces many challenges, not only to protect data residing in the cloud or through the cloud, to avoid sensitive data leaks, but also to protect departments, remote offices and mobile workers from cyber criminals, and more and more cyber criminals are starting to take advantage of emerging technologies such as the cloud, such as      , mobile apps and cloud APIs) to spread malware and launch targeted attacks. Phil Hochmuth of IDC, said: "Body ...

Through cloud security technology fog

User experience as the security gap in cloud computing becomes more apparent, users begin to look for ways to secure data. New York investment Bank Financial Services Cowen company CIO Daniel Flax relies on cloud computing to automate the company's sales campaign. Although he is satisfied with the potential of cloud computing to lower upfront costs, reduce downtime and support additional services, he admits he must work to understand the security weaknesses of this emerging technology. "Security is one of the challenges we have to face directly," he said. "Interactive production in Toronto and Nova Scotia Prov. Halifax ...

Windows Azure AppFabric Cloud Middleware parsing

Running applications on the cloud is an important service in cloud computing, but this is only one aspect. The Windows Azure platform also offers more cloud-based services that can be invoked on traditional proprietary applications or applications on cloud computing platforms. This is the goal of Windows Azure Platform AppFabric Service. When creating distributed applications, Windows Azure platform AppFabric ...

Where does cloud computing hit the next generation firewall "new"?

Firewall products from the 90 's to the present, although through the system architecture and software form of many innovations, but in technology development and users, bandwidth growing today, but increasingly difficult to meet the challenges of many aspects. Especially in the current hottest data center and cloud computing environment, the Ethernet standard starts from million trillion to 40g/100g forward, our country all kinds of data center and engine room total already reached 50余万个. Low latency, high reliability and intelligent security management have put forward new requirements for the performance and function of gateway security products. This year, Rui Jie network, Pike, deeply convinced ...

Hadoop technology in telecom operators Internet log processing application architecture

Hadoop technology in telecom operators online log processing application architecture Fang Jianguo First, the telecom operators Internet log processing status Today, so popular in the mobile Internet, every day will produce a lot of Internet log, these Internet log due to the huge amount of data generated Can only be retained for 3 days, because of storage space and other reasons are discarded. At present, telecom operators may only have a lot of useful information on customer behavior missing from the analysis of customer behavior mainly based on CDRs (call logs). For example, two people with similar phone conversations may be completely different types of customers ...

Set up a CVS server in a Linux environment

CVS is a widely used, open source, transparent network http://www.aliyun.com/zixun/aggregation/9591.html "> Version control System. When users use CVS, they first build a CVS server, import project instances on CVS servers, set up CVS Project access control, and so on. Customers access the CVS server through the client, customers can get the latest code copy of the project, submit their own modified code, and customers ...

Focus on main engine protection wave exerting force server security strengthening system

In the rapid development of the Internet industry today, the continuous updating of network technology has made the traditional way of social production has undergone tremendous changes. But the internet brings convenience to people's production and life at the same time, also brings great security hidden danger. To protect the enterprise's increasingly large information data, the current approach is the firewall, anti-virus software, intrusion detection and other traditional security equipment. Admittedly, these commonly used security devices can defend against some of the conventional attacks, but at the same time we have to accept a brutal reality, many enterprises in the deployment of almost all traditional security ...

"Hollywood pornographic door" questioned Cloud security

"Hollywood photo door" More than 100 injured stars, Apple 3rd issued a statement that the "pornographic door" incident and Apple icloud of the program loopholes or the iphone's specific features have nothing to do. Apple has mobilized all available engineers and technicians to investigate.   Still, the security of cloud computing is once again the focus of public opinion. The "New York Times" 3rd, said the current cloud computing information "Access control Communications card" has many loopholes. For internet companies such as Apple, it is hard to find a good balance between the security and convenience of information. US Bloomberg ...

Research and implementation of cloud computing security technology based on HDFs

Research and implementation of cloud computing security technology based on HDFs the Guo San Changbenwen innovation of Guangdong University of Technology is as follows: (1) based on the principle of Ibe algorithm, the Datanode authentication security mechanism of client access under HDFs is designed, In order to make up the original HDFS architecture under the client Access Datanode has not been certified defects, so that malicious or counterfeit users can not go through the main server Namenode to steal the private data on the Datanode to ensure data security. At the same time, using the principle of class Ibe algorithm,...

IT department loses five signs of cloud application control

Jackie Gilbert, co-founder and vice president of Sailpoint, said it was in trouble when an institution purchased a 6th or 8th SaaS application. We will see auditors pay more attention to this issue and more security issues related to this issue. Sailpoint sells software that enables these applications to comply with corporate policies. Gilbert says the IT department is discovering that if the department that buys these applications processes software settings or does not set them up, they cannot manage or control access to SALESFORC ...

Second generation firewall standard release: Fusion security, depth content detection, Application layer performance

On the afternoon of February 4, 2015, under the guidance of the Ministry of Public Security and the Ministry of Information Technology Informatization, the Third Research Institute of the Ministry of Public Security and other relevant departments, the deep convincing science and technology, NSFocus and the net God Information technology were jointly held by the second generation Firewall standard conference in Beijing National Conference Center. The chief engineer of the Network Security Bureau of the Ministry of Public Safety, Shun Chunming of the Third Institute of the Ministry of Public Security, as well as the senior security experts who are deeply convinced, NSFocus and Guo Qiquan, made an important speech at the meeting. The second generation firewall standard should rise to the national standard Guo Qiquan introduced our country network security development ...

OpenLDAP Access Control

Access to SLAPD entries and properties is controlled by the Access profile directive. The common format for access rights lines is as follows: <access directive>:: = Access to <what>[by <who> <access> <control>]+< What>:: = * | [Dn[.<basic-style>]=<regex ...

Intelligent Home Information processing platform based on Hadoop

Intelligent Home Information processing platform based on Hadoop Xu Yuan Guo Wang Intelligent Home includes access control system, temperature and humidity system, indoor drip irrigation system, lighting system. Each system contains different terminals, each with a different sensor, and the sensor perceives a large amount of data in the surrounding environment. The increasing number of users will result in massive data. This paper aims at the problems of high hardware cost and computational bottleneck in the traditional mass data processing method, based on the theory of cloud computing, the access control system, the temperature and humidity system, the drip irrigation system and the illumination system of intelligent home are built on the basis of Hado ...

[Document] cloud storage ciphertext access control scheme

Cloud storage ciphertext access control scheme * Lu Zhiquan +, Zhang, Feng Deng National Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190 Journal of Frontiers of Com Puter Science and Marvell To: An application field of attribute encryption (Ciphertext-policy attribute-based encryption, Cp-abe) based on ciphertext policy is proposed.

Research on the security model of cloud computing based on trust

Research on the security model of cloud computing based on trust Shandong Normal University Zhang Yandong Cloud Security is always a cloud service provider cannot but face the soft rib, it and cloud computing development foreground is closely related. It can be said that, out of the security, cloud computing applications and promotion is not possible to talk about. Although the traditional security solution solves the security problem in cloud computing to some extent, it is absolutely not available to transplant this package to the cloud platform completely. New features such as the high level of virtualization of cloud computing, the complexity of deployment, and high scalability have prompted us to study the security mechanisms that apply to cloud computing. Where the trust problem is the cloud ...

Research on NoSQL database security based on Hadoop

Research on NoSQL database security based on Hadoop Shanghai Jiao Tong University Chapin This paper first analyzes the key theory and technology of NoSQL database, according to the characteristics of the lack of security of the current NoSQL database products, based on the confidentiality, integrality, usability and consistency of the database, combined with the distributed characteristics, The user security requirements of NoSQL database are analyzed and defined from internal and external. Then, through the source analysis of Hadoop and hbase, this paper studies the security mechanism of Hadoop platform and HBase database.

Security risk analysis in cloud computing environment

1. What is cloud computing security? In the rapid development of the Internet today, the security of the network is an unavoidable problem, especially the various security threats to the business system of potential harm gradually magnified today, any IT system construction is difficult to ignore the existence of security problems. and a variety of private cloud or public cloud of data Center building, safe, efficient business delivery is its success and necessary requirements. Every moment of the construction of the link, including the physical environment of the building process, cloud computing business system construction, server storage resource pool deployment, as well as the operation of the system operations, are security risks of the dive ...

Cloud storage access control measures combat experience

Although ordinary consumers do not need to worry too much when using such services, there are many security issues that need to be addressed when choosing a cloud storage service from encryption to data lifecycle management. The emerging areas of enterprise focus on defining and controlling access methods and defining the implementation of control based on cloud storage. In this article, we will explain why cloud storage access control is an important issue and what enterprises should consider when developing and implementing cloud storage access control and architecture. We will also discuss how to evaluate access control in the cloud provider context. ...

Total Pages: 10 1 .... 6 7 8 9 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.