[go: up one dir, main page]

Sehgal et al., 2022 - Google Patents

Cloud computing and information security

Sehgal et al., 2022

Document ID
14599007753281046790
Author
Sehgal N
Bhatt P
Acken J
Publication year
Publication venue
Cloud Computing with Security and Scalability. Concepts and Practices

External Links

Snippet

Computer security issues exacerbate with growth of the Internet as more people and computers join the web, opening new ways to compromise an ever-increasing amount of information and potential for damages. However, an even bigger challenge to information …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
Sehgal et al. A cross section of the issues and research activities related to both information security and cloud computing
Lampson Computer security in the real world
Aguiar et al. An overview of issues and recent developments in cloud computing and storage security
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Kumar et al. A survey on secure cloud: security and privacy in cloud computing
Ibrahim A review on the mechanism mitigating and eliminating internet crimes using modern technologies: Mitigating internet crimes using modern technologies
Anand et al. Identity and access management systems
Sehgal et al. Cloud computing and information security
Chinedu et al. Security of cloud virtualized resource on a SaaS encryption solution
Abubakar Improving cloud data security by hybridization of zero-knowledge proof and time-based one-time password
Shepherd Zero trust architecture: Framework and case study
Sultana et al. Survey on centric data protection method for cloud storage application
Sagar et al. Information security: safeguarding resources and building trust
Alotaibi et al. Sensitive data exposure: data forwarding and storage on cloud environment
Salehi et al. Cloud computing security challenges and its potential solution
Goyal et al. Cloud Computing and Security
Sehgal et al. Cloud computing and information security
Dib et al. HSM-Based Architecture to Detect Insider Attacks on Server-Side Data
Algamdi Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems
Padma et al. An efficient strategy to provide secure authentication on using TPM
Waizenegger Data security in multi-tenant environments in the cloud
Kaur et al. Pre-requisite Concepts for Security and Privacy
Latoni et al. Enhancing Cybersecurity in Healthcare 5.0 Through Innovative Frameworks
Olsen Adversary modelling