CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS

CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS

Sasko Ristov, Marjan Gusev and Magdalena Kostoska

In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges.

KEYWORDS—Business Information Security, Cloud Computing, Security Assessment, Security Standards

temp_12071311131990.pdf

时间: 2024-09-19 08:46:03

CLOUD COMPUTING SECURITY IN BUSINESS INFORMATION SYSTEMS的相关文章

Cloud computing security with Nymble Technology

Cloud computing security with Nymble Technology Mr.Pradip U.Wawge  Ku.Ashvini R.Rathod  Amit R.Manakshe Keywords: misbehave blacklisting, privacy, security, revocation, error detection, cloud computing temp_12070408109302.pdf

[文档]Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations Soeung-Kon, Jung-Hoon Lee, Sung Woo Kim This paper discusses the different security issues that arise about how safe the mobile cloud computing environment is. Keywords : cloud computing, security issues

Taxonomy of the Security Aspects of Cloud Computing Systems

Taxonomy of the Security Aspects of Cloud Computing Systems-A Survey Seyyed Mohsen Hashemi  Mohammad Reza Mollahoseini Ardakani In this paper,to facilitate identifying the security threats of cloud computing, we Taxonomy the security aspects of cloud

Analyzing the Security of Windows 7 and Linux for Cloud Computing

Analyzing the Security of Windows 7 and Linux for Cloud Computing We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We i

A Novel Open Security Framework for Cloud Computing

A Novel Open Security Framework for Cloud Computing temp_12071619368311.pdf

Researches on Grid Security Authentication Algorithm in Cloud Computing

Researches on Grid Security Authentication Algorithm in Cloud Computing Keshou Wu  Lizhao Liu  Jian Liu  Weifeng Li, Gang Xie, Xiaona Tong and Yun Lin Index Terms-distributed computing; trusted computing; cloud computing; grid behavior; grid authenti

An approach Initiating Security Protocol towards Cloud Computing

An approach Initiating Security Protocol towards Cloud Computing Amit Joshi   Bhavesh Joshi  Manuj Joshi The paper proposes a security Model and also standards according to Monitor based security protocol for the security of the clouds vendors to eff

Interview with PowerMew - How Cloud Computing, Big Data and VR is Transforming the Real Estate Industry

"Heroes create the trend, and the trend transforms others into heroes too," remarked Eddie Chan, CTO & Co-founder of PowerMew. In comparison with other companies in the real estate sector, PowerMew differentiates itself from the competition

What are HANA's models of cloud computing, and which should I choose?

What are HANA's models of cloud computing, and which should I choose? http://searchsap.techtarget.com/answer/What-are-HANAs-models-of-cloud-computing-and-which-should-I-choose?utm_content=control&utm_medium=EM&asrc=EM_ERU_68780131&utm_campaign