Sehgal et al., 2022 - Google Patents
Cloud computing and information securitySehgal et al., 2022
- Document ID
- 14599007753281046790
- Author
- Sehgal N
- Bhatt P
- Acken J
- Publication year
- Publication venue
- Cloud Computing with Security and Scalability. Concepts and Practices
External Links
Snippet
Computer security issues exacerbate with growth of the Internet as more people and computers join the web, opening new ways to compromise an ever-increasing amount of information and potential for damages. However, an even bigger challenge to information …
- 238000005516 engineering process 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
Sehgal et al. | A cross section of the issues and research activities related to both information security and cloud computing | |
Lampson | Computer security in the real world | |
Aguiar et al. | An overview of issues and recent developments in cloud computing and storage security | |
Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
Ibrahim | A review on the mechanism mitigating and eliminating internet crimes using modern technologies: Mitigating internet crimes using modern technologies | |
Anand et al. | Identity and access management systems | |
Sehgal et al. | Cloud computing and information security | |
Chinedu et al. | Security of cloud virtualized resource on a SaaS encryption solution | |
Abubakar | Improving cloud data security by hybridization of zero-knowledge proof and time-based one-time password | |
Shepherd | Zero trust architecture: Framework and case study | |
Sultana et al. | Survey on centric data protection method for cloud storage application | |
Sagar et al. | Information security: safeguarding resources and building trust | |
Alotaibi et al. | Sensitive data exposure: data forwarding and storage on cloud environment | |
Salehi et al. | Cloud computing security challenges and its potential solution | |
Goyal et al. | Cloud Computing and Security | |
Sehgal et al. | Cloud computing and information security | |
Dib et al. | HSM-Based Architecture to Detect Insider Attacks on Server-Side Data | |
Algamdi | Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems | |
Padma et al. | An efficient strategy to provide secure authentication on using TPM | |
Waizenegger | Data security in multi-tenant environments in the cloud | |
Kaur et al. | Pre-requisite Concepts for Security and Privacy | |
Latoni et al. | Enhancing Cybersecurity in Healthcare 5.0 Through Innovative Frameworks | |
Olsen | Adversary modelling |