Location:
Search - Cloud security
Search list
Description: 北京大学网络信息安全课件,段云所教授写.在这里和大家分享.-Beijing University of network information security courseware, of the cloud was taught. Here we share.
Platform: |
Size: 12859392 |
Author: 李文 |
Hits:
Description: 破坏S360安全卫士的云查杀 点一下就可以实现 这个代码感觉很简单 但是很实用-S360 destruction killing the security guards of the cloud can be achieved by clicking on the feeling of this code is very simple but very practical
Platform: |
Size: 5120 |
Author: 豪杰 |
Hits:
Description: 病毒在计算机运行之后将根据自身的目的呈现出一系列的动作,包括写注册表项,生成文件,远程线程注入等等。本系统通过拦截系统调用对程序行为进行监控,将监控的行为信息交给监控中心和网络服务器分析处理,根据程序行为分析判断病毒,云安全概念的加入,本地特征库极小,占用系统资源很少。本系统设想根据这一系列的动作所组成的行为进行智能的逻辑判断该程序是不是病毒。-Will be followed by the virus in the computer is running according to their own purposes Chengxian a series of actions, Baokuo write registry Xiang, Shengchengwenjian, Yuan Cheng thread into the Deng Deng. This system by intercepting system calls to monitor the program behavior, the behavior of the control information to the monitoring center and network server analysis and processing, according to analysis of program behavior to judge the virus, adding the concept of cloud security, local feature library is very small system resources are less. The system envisaged under the action of this series of acts consisting of intelligent logic determines that the program is not a virus.
Platform: |
Size: 2699264 |
Author: hm_c |
Hits:
Description: 云安全的概念和建构,介绍了云安全的思想和思路-Cloud security concept and construction, introduced the ideas and thoughts cloud security
Platform: |
Size: 2899968 |
Author: 肖鹏 |
Hits:
Description: 该指导手册详尽探讨了当前最热门技术云计算安全中的安全问题。-The guide discusses in detail the most popular cloud computing security technology security issues.
Platform: |
Size: 2658304 |
Author: 徐辞源 |
Hits:
Description: 卓然主动防御源码(可执行文件+完整源码+完整作品报告,卓然驱动级云安全主动防御系统
目录
开发目的 2
系统特性 4
一. 使用RootiKit技术,精确拦截木马,曝光恶意行为 4
二. 提供详细行为描述信息,帮助用户判断 4
三. 云安全概念融入,精确判断文件安全级别 4
四. 支持白名单、黑名单,引入云规则,减少提醒 4
五. 多模块相互配合,将木马及其衍生物一网打尽 4
-Zoran active defense source (executable+ source+ complete works full report, Zoran driver-level cloud security system directory was developed to active defense system features 4 a 2. Use RootiKit technology, precision intercept Trojans, 4 second exposure of malicious behavior. Provide detailed behavior description to help users determine the 4 III. the concept of security into the cloud, file security level to determine exactly 4 IV. supports whitelists, blacklists, rules for the introduction of the cloud, reducing to remind 4 five. multi-module complement each other, the Trojan and its derivatives Clean Sweep 4
Platform: |
Size: 2699264 |
Author: 李学兵 |
Hits:
Description: 云中的安全:云计算安全优势、安全防护、安全联盟-Cloud security
Platform: |
Size: 409600 |
Author: maidini |
Hits:
Description: 电子科技大学教授关于安全办公云系统介绍,前景规划说明等-University of Electronic Science and Technology Office Cloud security system introduced
Platform: |
Size: 6127616 |
Author: guojun |
Hits:
Description: Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors.-Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors.
Platform: |
Size: 3380224 |
Author: santhu |
Hits:
Description: Cloud computing is an evolving paradigm with
tremendous momentum, but its unique aspects
exacerbate security and privacy challenges. This article
explores the roadblocks and solutions to providing a
trustworthy cloud computing environment.
Platform: |
Size: 12664832 |
Author: Madhusmita |
Hits:
Description: Describes Cloud computing and its needs.
Platform: |
Size: 54272 |
Author: Rajesh Sarkar |
Hits:
Description: Research papers useful to learn how to secure a cloud environnement
Platform: |
Size: 4251648 |
Author: Sumakatra |
Hits:
Description: Cloud security - virtualization - Cloud computing drivers
Platform: |
Size: 1070080 |
Author: Sumakatra |
Hits:
Description: Cloud Security with Virtualized Defense
Platform: |
Size: 362496 |
Author: Kirti Bhushan Kapil |
Hits:
Description: Cloud Security Issues
Platform: |
Size: 98304 |
Author: Kirti Bhushan Kapil |
Hits:
Description: 分析了云计算对信息安全领域中技术、标准、监管等各方面带来的挑战 提出云计算安全参考框架及该框架下的主要研究内容。-Analyzes the challenges of cloud computing in all aspects of information security technologies, standards, regulatory brought proposed cloud security reference framework and main contents under the framework.
Platform: |
Size: 843776 |
Author: abc |
Hits:
Description: Define cloud and its characteristics firstly , and then give cloud
computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against
these security issues.-Define cloud and its characteristics firstly , and then give cloud
computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against these security issues.
Platform: |
Size: 173056 |
Author: abc |
Hits:
Description: 云计算数据安全与隐私
Cloud Security and Privacy-Cloud Security and Privacy
Platform: |
Size: 4185088 |
Author: Weixiang |
Hits:
Description: In this work another scenario for cloud security in cloudsoim is developed
Platform: |
Size: 5120 |
Author: mohammad |
Hits:
Description: Cloud Computing Approach
Platform: |
Size: 3089408 |
Author: Maruf
|
Hits: