Welcome![Sign In][Sign Up]
Location:
Search - Cloud security

Search list

[Sniffer Package capturesafe_net

Description: 北京大学网络信息安全课件,段云所教授写.在这里和大家分享.-Beijing University of network information security courseware, of the cloud was taught. Here we share.
Platform: | Size: 12859392 | Author: 李文 | Hits:

[Crack Hackkill360

Description: 破坏S360安全卫士的云查杀 点一下就可以实现 这个代码感觉很简单 但是很实用-S360 destruction killing the security guards of the cloud can be achieved by clicking on the feeling of this code is very simple but very practical
Platform: | Size: 5120 | Author: 豪杰 | Hits:

[Windows DevelopZhuoRanHIPS

Description: 病毒在计算机运行之后将根据自身的目的呈现出一系列的动作,包括写注册表项,生成文件,远程线程注入等等。本系统通过拦截系统调用对程序行为进行监控,将监控的行为信息交给监控中心和网络服务器分析处理,根据程序行为分析判断病毒,云安全概念的加入,本地特征库极小,占用系统资源很少。本系统设想根据这一系列的动作所组成的行为进行智能的逻辑判断该程序是不是病毒。-Will be followed by the virus in the computer is running according to their own purposes Chengxian a series of actions, Baokuo write registry Xiang, Shengchengwenjian, Yuan Cheng thread into the Deng Deng. This system by intercepting system calls to monitor the program behavior, the behavior of the control information to the monitoring center and network server analysis and processing, according to analysis of program behavior to judge the virus, adding the concept of cloud security, local feature library is very small system resources are less. The system envisaged under the action of this series of acts consisting of intelligent logic determines that the program is not a virus.
Platform: | Size: 2699264 | Author: hm_c | Hits:

[matlabCloud_Security-and-privacy

Description: 云安全的概念和建构,介绍了云安全的思想和思路-Cloud security concept and construction, introduced the ideas and thoughts cloud security
Platform: | Size: 2899968 | Author: 肖鹏 | Hits:

[OtherSecurity_Guidance_for_Cloud_Computing.tar

Description: 该指导手册详尽探讨了当前最热门技术云计算安全中的安全问题。-The guide discusses in detail the most popular cloud computing security technology security issues.
Platform: | Size: 2658304 | Author: 徐辞源 | Hits:

[OS program201012114204669

Description: 卓然主动防御源码(可执行文件+完整源码+完整作品报告,卓然驱动级云安全主动防御系统 目录 开发目的 2 系统特性 4 一. 使用RootiKit技术,精确拦截木马,曝光恶意行为 4 二. 提供详细行为描述信息,帮助用户判断 4 三. 云安全概念融入,精确判断文件安全级别 4 四. 支持白名单、黑名单,引入云规则,减少提醒 4 五. 多模块相互配合,将木马及其衍生物一网打尽 4 -Zoran active defense source (executable+ source+ complete works full report, Zoran driver-level cloud security system directory was developed to active defense system features 4 a 2. Use RootiKit technology, precision intercept Trojans, 4 second exposure of malicious behavior. Provide detailed behavior description to help users determine the 4 III. the concept of security into the cloud, file security level to determine exactly 4 IV. supports whitelists, blacklists, rules for the introduction of the cloud, reducing to remind 4 five. multi-module complement each other, the Trojan and its derivatives Clean Sweep 4
Platform: | Size: 2699264 | Author: 李学兵 | Hits:

[OS program1

Description: 云中的安全:云计算安全优势、安全防护、安全联盟-Cloud security
Platform: | Size: 409600 | Author: maidini | Hits:

[Industry research123

Description: 电子科技大学教授关于安全办公云系统介绍,前景规划说明等-University of Electronic Science and Technology Office Cloud security system introduced
Platform: | Size: 6127616 | Author: guojun | Hits:

[Internet-Network5.Ensuring-Data-Storage-Security-in-Cloud-Computi

Description: Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors.-Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors.
Platform: | Size: 3380224 | Author: santhu | Hits:

[Industry researchcloud-computing

Description: Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment.
Platform: | Size: 12664832 | Author: Madhusmita | Hits:

[Software EngineeringEnsuring-Data-Storage-Security-in-Cloud-Computing

Description: Describes Cloud computing and its needs.
Platform: | Size: 54272 | Author: Rajesh Sarkar | Hits:

[Software EngineeringCloud-security

Description: Research papers useful to learn how to secure a cloud environnement
Platform: | Size: 4251648 | Author: Sumakatra | Hits:

[OS programCloud

Description: Cloud security - virtualization - Cloud computing drivers
Platform: | Size: 1070080 | Author: Sumakatra | Hits:

[File FormatCloud-Security-with-Virtualized-Defense

Description: Cloud Security with Virtualized Defense
Platform: | Size: 362496 | Author: Kirti Bhushan Kapil | Hits:

[File FormatCloud-Security-Issues

Description: Cloud Security Issues
Platform: | Size: 98304 | Author: Kirti Bhushan Kapil | Hits:

[Software EngineeringStudy-on-Cloud-Computing-Security

Description: 分析了云计算对信息安全领域中技术、标准、监管等各方面带来的挑战 提出云计算安全参考框架及该框架下的主要研究内容。-Analyzes the challenges of cloud computing in all aspects of information security technologies, standards, regulatory brought proposed cloud security reference framework and main contents under the framework.
Platform: | Size: 843776 | Author: abc | Hits:

[Software EngineeringAnalysis-of-Cloud-Security

Description: Define cloud and its characteristics firstly , and then give cloud computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against these security issues.-Define cloud and its characteristics firstly , and then give cloud computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against these security issues.
Platform: | Size: 173056 | Author: abc | Hits:

[OtherCloud-Security-and-Privacy.pdf

Description: 云计算数据安全与隐私 Cloud Security and Privacy-Cloud Security and Privacy
Platform: | Size: 4185088 | Author: Weixiang | Hits:

[OtherAnother-Cloud

Description: In this work another scenario for cloud security in cloudsoim is developed
Platform: | Size: 5120 | Author: mohammad | Hits:

[Otherensuring-data-security-in-cloud-computing

Description: Cloud Computing Approach
Platform: | Size: 3089408 | Author: Maruf | Hits:
« 12 3 4 5 6 »

CodeBus www.codebus.net