[go: up one dir, main page]

Centonze, 2019 - Google Patents

Cloud auditing and compliance

Centonze, 2019

Document ID
12750582063888616904
Author
Centonze P
Publication year
Publication venue
Security, Privacy, and Digital Forensics in the Cloud

External Links

Snippet

Information Technology (IT) services and infrastructures significantly depend on auditing in order to reduce security, privacy, trust and forensics issues. Auditing is even more vital and complex in cloud computing environments due to non‐transparent architectures, multi …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Similar Documents

Publication Publication Date Title
Gonzalez et al. A quantitative analysis of current security concerns and solutions for cloud computing
Jouini et al. A security framework for secure cloud computing environments
Jansen et al. Guidelines on security and privacy in public cloud computing
Pearson Privacy, security and trust in cloud computing
Pearson et al. Privacy, security and trust issues arising from cloud computing
Khan et al. Security risks and their management in cloud computing
Jansen et al. Sp 800-144. guidelines on security and privacy in public cloud computing
Shakir et al. Literature review of security issues in saas for public cloud computing: a meta-analysis
Soares et al. Cloud security: state of the art
Jouini et al. Surveying and analyzing security problems in cloud computing environments
Lou et al. Cybersecurity threats, vulnerability and analysis in safety critical industrial control system (ICS)
Weil Taking compliance to the cloud—Using ISO standards (tools and techniques)
Malomo et al. A survey on recent advances in cloud computing security
Alouane et al. Security, privacy and trust in cloud computing: A comparative study
Alani Security threats in cloud computing
Shibli et al. Access control as a service in cloud: challenges, impact and strategies
Hayat et al. Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities
Centonze Cloud auditing and compliance
Binu et al. A survey of traditional and cloud specific security issues
Chaturvedi et al. Zero Trust Security Architecture for Digital Privacy in Healthcare
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Yadav et al. A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security
Kavakli et al. Privacy as an integral part of the implementation of cloud solutions
Salehi et al. Cloud computing security challenges and its potential solution
Rübsamen et al. Security and privacy preservation of evidence in cloud accountability audits