Nothing Is Clearer Than The Cloud

October 2010
Security: Solutions for Enterprise Security Leaders;Oct2010, Vol. 47 Issue 10, p12
Trade Publication
The article offers the author's insights regarding the application of Security Cloud Computing (SCC) in computer security. The author says that including SCC in strategic planning may brought significant effects on computer security to enable technologies such as access control and video monitoring. Moreover, he mentions that SCC also provides the changes required in establishing the security organization through technology for the achievement of efficiency and effectiveness.


Related Articles

  • Security System for Healthcare Data in Cloud Computing. Maya Louk; Hyotaek Lim; Hoon Jae Lee // International Journal of Security & Its Applications;2014, Vol. 8 Issue 3, p241 

    Cloud computing is a renowned computing method of sharing data resources whether publicly or privately. Cloud computing is an answer for a better computing environment. It will reduce the costs which are used efficiently. Cloud computing can be used not only for business purposes but also for...

  • Find Your RMR in the Access Cloud. Hodgson, Karyn // SDM: Security Distributing & Marketing;Jun2015, Vol. 45 Issue 6, p83 

    The article discusses the advantage for security systems provider and integrators to consider the benefits of offering access control as service through cloud-based computing. Discussion on the need for integrators to determine their recurring monthly revenue (RMR) by offering consumers with...

  • A novel remote user authentication and key agreement scheme for mobile client-server environment. Haiyan Sun; Qiaoyan Wen; Hua Zhang; Zhengping Jin // Applied Mathematics & Information Sciences;Jul2013, Vol. 7 Issue 4, p1365 

    Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users' private keys. Under this problem, these schemes cannot...

  • Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model. Xingdong Xu; Leyuan Niu; Bo Meng // Information Technology Journal;2013, Vol. 12 Issue 12, p2273 

    During the past several years, OAuth 2.0 protocol has been widely implemented and deployed. In order to give a strong confidence in its security to the people, in this study, Blanchet calculus in computational model is used to analyze OAuth 2.0 protocol with mechanized tool CryptoVerif. The...

  • U.K. firms exposed to online risks. Veysey, Sarah // Business Insurance;9/3/2001, Vol. 35 Issue 36, p3 

    Reports the checking of security controls and prioritization of Internet risks of Great Britain. Existence of virus attack and credit card fraud; Evaluation of electronic-business risk; Emphasis on the appropriate training of employees.

  • WHY information security is everybody's business. Jackson, Donovan // NZ Business;Dec2014/Jan2015, Vol. 28 Issue 11, p18 

    The article discusses the need for New Zealand businesses to develop and implement effective information security management strategies. Topics explored include the need for all employees to comply with security procedures of the organisation, the proactive approach to cybersecurity risks, and...

  • UPDATE.  // PCWorld;Dec2012, Vol. 30 Issue 12, p12 

    An update is presented for the article "Control the Keys to Your Cloud Vault," from the October 2012, which discusses two-factor authentication protection in cloud computing.

  • Internet Security: You Don's Get What You Pay For. Millman, Gregory J. // Financial Executive;Dec2003, Vol. 19 Issue 9, p51 

    This article presents a discussion over the importance of companies investing in Internet security programs. The author provides the results of a survey organized by the Computer Security Institute in 2003 that shows that a great deal is still unknown about the actual financial costs associated...

  • Cloud Security Alliance Defends Cloud With Software Defined Perimeter. Kerner, Sean Michael // eWeek;11/14/2013, p4 

    The article discusses the Software Defined Perimeter (SDP) and its potential in boosting security of cloud computing services of the Cloud Security Alliance (CSA). SDP will render security measures like cloud-based authentication and security configuration solutions. Applicology chief executive...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics