Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication Cloud computing's multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenants. In order to achieve safe storage, policy based file...
A method and proxy device for securing an access to a cloud-based application are presented. The method includes receiving an authentication token, wherein the authentication token includes an identity of a user of a client device requesting an access to the cloud-based application; receiving, fro...
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses ...
TaskAgentCloudRequest TaskAgentCloudType TaskAgentDowngrade TaskAgentJob TaskAgentJobRequest TaskAgentJobResultFilter TaskAgentJobStep TaskAgentJobStepType TaskAgentJobTask TaskAgentJobVariable TaskAgentManualUpdate TaskAgentMessage TaskAgentMinAgentVersionRequiredUpdate TaskAgentPool TaskAgentPoolActionFilter TaskAgen...
This Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from the mobile devices and into powerful and centralized com...
Privacy preservation is also a crucial requirement in cloud-based data-sharing systems. This work proposes the SP-MAACS scheme, a secure and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing. Both open and closed domain users are considered, and ...
Also, the architecture of a cloud computing system is structured as follows; the hardware layer, infrastructure layer, platform layer and the software layer. The Cloud computing systems faces an additional number of vulnerabilities more than the traditional systems which are described in [3]. ...
Resources in Microsoft Azure can be secured with Microsoft Entra ID. Microsoft Entra ID can be used to secure REST APIs that are hosted in Microsoft Azure and API hosted in other cloud platforms. Microsoft Azure hosted resources are easier to secure as the Azure Management Portal provides a sim...
Whether embarking on application modernization leveraging the cloud, or just trying to squeeze more out of legacy applications on-premise, BeyondTrust delivers frictionless security for your infrastructure that helps you: Lock down and segment accessto applications and systems ...
Connect users anywhere to edge, cloud, and data center apps with VeloCloud's unified SASE solution.