language:
Find link is a tool written by Edward Betts.searching for Cloud computing security 20 found (69 total)
alternate case: cloud computing security
Andreessen Horowitz
(3,460 words)
[view diff]
no match in snippet
view article
find links to article
cryptocurrency, gaming, fintech, education, and enterprise IT (including cloud computing, security, and software as a service) industries. Between 2006 and 2010Roxana Geambasu (481 words) [view diff] no match in snippet view article find links to article
Science at Columbia University. The topics of her research include cloud computing, security and privacy, and operating systems. Geambașu is originally fromJay Chaudhry (1,606 words) [view diff] exact match in snippet view article find links to article
(2011-09-09). "Mercury News interview: Jay Chaudhry, CEO of Zscaler, a cloud computing security firm". The Mercury News. Retrieved 2024-02-26. {{cite web}}: |last1=Lifeboat Distribution (685 words) [view diff] no match in snippet view article find links to article
Their customers are vendors who specialize in virtualization/cloud computing, security, application and network infrastructure, business continuity/disasterEquihash (737 words) [view diff] case mismatch in snippet view article find links to article
on the Security of Equihash". CCSW '17. Proceedings of the 2017 Cloud Computing Security Workshop. 2017 ACM SIGSAC Conference on Computer and CommunicationsRice University Electrical and Computer Engineering (440 words) [view diff] no match in snippet view article find links to article
storage and computing infrastructure (GPU/CPU computing, FPGAs, cloud computing, security and privacy) in order to enable meaningful extraction of actionableCrypto-shredding (987 words) [view diff] exact match in snippet view article find links to article
and store encryption keys. Bring your own encryption refers to a cloud computing security model to help cloud service customers to use their own encryptionImplicit authentication (913 words) [view diff] exact match in snippet view article find links to article
"Authentication in the clouds". Proceedings of the 2010 ACM workshop on Cloud computing security workshop. CCSW '10. New York: ACM. pp. 1–6. doi:10.1145/1866835European Cloud Partnership (524 words) [view diff] case mismatch in snippet view article find links to article
Estonia Uncovered | July 15, 2013 John R. Vacca (19 September 2016). Cloud Computing Security: Foundations and Challenges. CRC Press. pp. 386–. ISBN 978-1-315-35492-7List of acquisitions by Oracle (768 words) [view diff] exact match in snippet view article find links to article
2016 Dyn Network management, DNS $600 September 18, 2016 Palerra Cloud computing security, Cloud access security broker September 6, 2016 LogFire Cloud basedRoy H. Campbell (462 words) [view diff] exact match in snippet view article find links to article
a foundation field, as well as work in parallel computing and cloud computing security. In 2004, Campbell was named the Sohaib and Sara Abbasi ProfessorNetwork intelligence (1,260 words) [view diff] no match in snippet view article find links to article
Retrieved 2009-07-28. Jon Brodkin (2008-07-02). "Gartner: Seven cloud-computing security risks". Info World. Archived from the original on 2009-03-18. RetrievedF5, Inc. (2,156 words) [view diff] exact match in snippet view article find links to article
2022. In October 2021, F5 acquired Threat Stack, Inc., a Boston cloud computing security startup company for a reported $68 million. As of December 15,Key management (3,512 words) [view diff] no match in snippet view article find links to article
encryption (BYOE)—also called bring your own key (BYOK)—refers to a cloud-computing security model to allow public-cloud customers to use their own encryptionPrivate information retrieval (2,184 words) [view diff] exact match in snippet view article find links to article
Herzberg, and T. Schneider, RAID-PIR: Practical multi-server PIR, In Cloud computing security workshop (CCSW), 2014. [ABFK 2014] C. Aguilar-Melchor, J. BarrierApplications of artificial intelligence (19,806 words) [view diff] exact match in snippet view article find links to article
recognize intrusions and adapt to perform better. In order to improve cloud computing security, Sahil (2015) created a user profile system for the cloud environmentOpen Source Day (2,776 words) [view diff] no match in snippet view article find links to article
subjects such as: containerization, automation, virtualization, cloud computing, security and monitoring of IT infrastructure, and the development of OpenElectronics and semiconductor manufacturing industry in India (9,425 words) [view diff] no match in snippet view article find links to article
venture fund arm Dell ventures, in Indian start-ups working in cloud computing, security and analytics as well as in the manufacturing of microprocessorsOblivious RAM (3,993 words) [view diff] case mismatch in snippet view article find links to article
Christian; Ristenpart, Thomas (eds.), Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011, AssociationList of fellows of IEEE Computer Society (104 words) [view diff] exact match in snippet view article find links to article
signal processing systems 2021 Willy Susilo For contributions to cloud computing security 2017 Sabine Susstrunk For contributions to computational imaging