Essays about: "Cloud security"
Showing result 36 - 40 of 265 essays containing the words Cloud security.
-
36. Kubernetes Automatic Geographical Failover Techniques
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. READ MORE
-
37. Automating Deployments of Trusted Execution Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE
-
38. Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. READ MORE
-
39. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE
-
40. Increasing Efficiency and Scalability in AWS IAM by Leveraging an Entity-centric Attribute- & Role-based Access Control (EARBAC) Model
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Cloud computing is becoming increasingly popular among all types of companies due to its inherent benefits. However, because of its infrastructure, it might be difficult to manage access rights between users and resources. READ MORE