Secure Outsourced Computation in a Multi-Tenant Cloud. Seny Kamara - Microsoft Research Mariana Raykova - Columbia
|
|
- Darlene Todd
- 8 years ago
- Views:
Transcription
1 Secure Outsurced Cmputatin in a Multi-Tenant Clud Seny Kamara - Micrsft Research Mariana Raykva - Clumbia
2 Outsurced Cmputatin (x, f ) f (x) IBM WCSC 2
3 The Clud IBM WCSC 3
4 Virtualized Servers App1 App2 App App OS OS Hypervisr Hardware OS IBM WCSC 4
5 Multi-Tenancy Virtualizatin enables multi-tenancy VMs frm different clients run n the same server Multi-tenancy allws clud peratr t Optimize resurces usage This all leads t $ saved fr clients App1 App2 App App OS Hypervisr Hardware OS OS IBM WCSC 5
6 Multi-Tenancy Multi-tenancy is indispensible t clud cmputing This is where part f the ecnmic incentives cme frm but it intrduces security cncerns What if a c-lcated VM attacks my VM? Current slutin is VM islatin VMs cannt see each ther s memry r state Resurces are apprpriately shared App1 App2 App OS OS Hypervisr Hardware IBM WCSC 6
7 Breaking Islatin Expliting the hypervisr Sme attacks knwn against VMware s ESX, XBOX s hypervisr, Bypassing the hypervisr [Ristenpart et al. 09] shw that crss VM side-channels are pssible Cnclusin frm [Ristenpart et al. 09]: If security is a cncern, use a single-tenant server. IBM WCSC 7
8 Hw d we Prtect vs. Multi-Tenancy? App1 App2 App OS OS Hypervisr Hardware VM Islatin vulnerabilities side-channels Cryptgraphy strng security Single-Tenancy Perfectly secure IBM WCSC 8
9 Outline Mtivatin Secure utsurced cmputatin in a multi-tenant clud Delegatin prtcls Security definitin in ideal/real wrld paradigm General-purpse delegatin prtcl Secret sharing & MPC Limitatins f ur apprach IBM WCSC 9
10 A Pssible Apprach (EncK(x), f ) EncK ( f (x) ) Verifiable cmputatin [Gentry-Gennar-Parn, Chung-Kalai-Vadhan] Fully-Hmmrphic Encryptin (xʼ, f ) [Gentry, ] f (x), π IBM WCSC 10
11 FHE + VC Efficiency FHE is nt practical VC is based n FHE Overkill Interactin is OK Clud is nt a single-server envirnment IBM WCSC 11
12 Delegatin Prtcl Prtcl between C: the client wh prvides an input VM 1,,VM w : VM wrkers wh have n input but return an utput X IBM WCSC 12
13 Underlying Assumptin Crss VM attacks always wrk Semi-hnest: if A c-lcates a VM then it recvers client VM s state Malicius: if A c-lcates a VM then it cntrls client VM Wrst-case assumptin Makes ur results strnger Captures cncerns f highly sensitive clients (e.g., gvernments) Nt essential t ur mdel prbability f successful crss VM attack can be taken int accunt IBM WCSC 13
14 Security Definitin Ideal/real wrld paradigm frm MPC [,Canetti01] Real executin: C and VMs run the real prtcl in presence f A that can c-lcate adversarial VMs Ideal executin: C sends input t trusted party wh returns f(x) in presence f A that can c-lcate adversarial VMs Security: every A in the real wrld can be emulated by an A in the ideal wrld Nte: If A is malicius then it is allwed t abrt during the executins Guarantees: As lng as A c-lcates at mst (w - 1) adversarial VMs Privacy: A learns n infrmatin abut C s input r utput Crrectness: C receives crrect utput IBM WCSC 14
15 Multi-Party Cmputatin x f (x,y,z) y 80 s: [Ya, Gldreich-Micali- Wigdersn, ] z Tday: [Mhassel-Franklin, Lindell- Pinkas, Klesnikv-Sadeghi- Schnedier, ] IBM WCSC 15
16 Secret Sharing [Shamir]? IBM WCSC 16
17 A General-Purpse Prtcl The apprach Split input x int w shares (s 1,,s n ) Stre each share in a separate VM Make the VMs evaluate F using MPC F(s 1,,s n ; r 1 r n ): recvers the input x frm the shares Evaluates y = f(x) Use r 1 r n t generate w shares f y Output a share f y t each VM VMs send back their shares t C wh recvers y IBM WCSC 17
18 Intuitin Secret sharing A must crrupt each wrker MPC Enables VMs t securely cmpute n shared input Withut revealing infrmatin abut shares t ther wrkers Prevents A frm learning abut 2+ shares with a single crruptin Cin Tssing Cins will be unifrm as lng as at least ne wrker is uncrrupted Guarantees sharing f utput is secure Delegatin is secure vs. malicius A if MPC is IBM WCSC 18
19 Limitatins f Delegatin Prtcls Efficiency Overhead fr recver & share Overhead fr MPC [+ ZKPs/C&C if A is malicius] Cst Requires an extra (n 1) VMs Useful if cst f prtcl < cst f single-tenant server Onging wrk Efficient delegatin prtcls fr specific functinalities (e.g., plynmials) Cmbining ur apprach with ther techniques IBM WCSC 19
20 Questins? IBM WCSC 20
UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationState of Wisconsin DET Agency Managed Virtual Services Service Offering Definition
State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More information1 Google Apps for Education Henrico County, Virginia
1 Ggle Apps fr Educatin Henric Cunty, Virginia PROGRAM CATEGORY: Infrmatin Technlgy 1. Abstract f the Prgram Henric Cunty Public Schls (HCPS) prides itself n its innvative apprach t instructin. We believe
More informationSecurity in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade
Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small
More informationState of Wisconsin DET Dedicated Virtual Host Services Offering Definition
State f Wiscnsin DET Dedicated Virtual Hst Services Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 10/29/2010 1.0 Phil Staley Initial draft 11/3/2010 1.1 Phil Staley Ryan McKee Secnd
More informationCLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
More informationSecurely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
More information2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationProcess Automation With VMware
Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationLevel 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents
Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client
More informationCHECKING ACCOUNTS AND ATM TRANSACTIONS
1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches
More informationInteractive Catchment Plan Project Brief. Background to the organisation. How will we achieve this? What is a rivers trust?
Interactive Catchment Plan Prject Brief Backgrund t the rganisatin The Suth East Rivers Trust is an envirnmental charity dedicated t the cnservatin and restratin f rivers in the suth east f England, including
More informationTowards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach)
Twards Nvel Certificatin Mdels in Clud Infrastructures (the CUMULUS apprach) Prfessr G. Spanudakis Schl f Infrmatics CSP Frum, 18-19 April 2013, Brussels Outline Clud Security Still a prblem? Prvider perspective
More informationThe Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud
SESSION ID: CDS-R02 The Secret Life f Data: Prtecting Sensitive Infrmatin, Mbile t Clud Dan Griffin President JW Secure, Inc. @JWSdan WWNSAD? Intelligence agencies have been public abut: Inevitability
More informationMicrosoft Exchange 2010 on VMware Design and Sizing Examples
Micrsft Exchange 2010 n VMware Micrsft Exchange 2010 n VMware This prduct is prtected by U.S. and internatinal cpyright and intellectual prperty laws. This prduct is cvered by ne r mre patents listed at
More informationElectronic Data Interchange (EDI) Requirements
Electrnic Data Interchange (EDI) Requirements 1.0 Overview 1.1 EDI Definitin 1.2 General Infrmatin 1.3 Third Party Prviders 1.4 EDI Purchase Order (850) 1.5 EDI PO Change Request (860) 1.6 Advance Shipment
More informationCopernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General
Cpernicus & Big Data: A Perspective frm the Eurpean EO Services Industry. Geff Sawyer: EARSC Secretary General What is EARSC? EARSC is a trade assciatin (NPO), funded in 1989, which represents cmpanies:
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationIntel Hybrid Cloud Management Portal Update FAQ. Audience: Public
Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid
More informationEnterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Services @ Minnesota Department of Revenue
Enterprise Cntent Management Slutins R. Gregry Tschida Chief Infrmatin Officer MN.IT Services @ Minnesta Department f Revenue 1 What is Enterprise Cntent Management (ECM)? Enterprise Cntent Management
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationIndia vs. China The Outsourcing War
Flexsin Technlgies (P) Limited India vs. China The Outsurcing War The glbal utsurcing market has evlved ver the years and has redefined the apprach f ding business. The utsurcing vendrs are prviding strategic
More informationHow to Reduce Project Lead Times Through Improved Scheduling
Hw t Reduce Prject Lead Times Thrugh Imprved Scheduling PROBABILISTIC SCHEDULING & BUFFER MANAGEMENT Cnventinal Prject Scheduling ften results in plans that cannt be executed and t many surprises. In many
More informationConfiguring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
More informationTable of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...
More informationFermilab Time & Labor Desktop Computer Requirements
Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing
More informationFlash Hypervisor: The Savior to Storage I/O Bottlenecks? Bala Narasimhan
Flash Hypervisr: The Savir t Strage I/O Bttlenecks? Bala Narasimhan Agenda Case fr server flash in SDDC Technlgy implicatins f marrying hypervisrs with server flash Empirical data Cnclusin and pen issues
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationHEAL-Link Federation Higher Education & Research. Exhibit 2. Technical Specifications & Attribute Specifications
HEAL-Link Federatin Higher Educatin & Research Exhibit 2 Technical Specificatins & Attribute Specificatins Trust Relatinship Trust relatinship amng the federatin, federatin members and federatin partners
More informationOften people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.
Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationFirewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)
Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an
More informationDesign for securability Applying engineering principles to the design of security architectures
Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationUsing Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors
Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationA Walk on the Human Performance Side Part I
A Walk n the Human Perfrmance Side Part I Perfrmance Architects have a license t snp. We are in the business f supprting ur client rganizatins in their quest fr results that meet r exceed gals. We accmplish
More informationNAVIPLAN PREMIUM LEARNING GUIDE. Existing insurance coverage
NAVIPLAN PREMIUM LEARNING GUIDE Existing insurance cverage Cntents Existing insurance cverage 1 Learning bjectives 1 NaviPlan planning stages 1 Client case 2 Enter yur clients existing life, disability,
More informationXenApp and XenDesktop: Application Virtualization and Desktop Virtualization are Better Together
XenApp and XenDesktp July 2008 XenApp and XenDesktp: Applicatin Virtualizatin and Desktp Virtualizatin are Better Tgether This dcument is designed t help Citrix XenApp custmers understand hw and when Citrix
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationMarket Research Report - Q4 2015
Market Research fr the IT & Netwrking Industry Wrldwide Clud Market Analysis & Vendr Tracking Reprt fr HPE Q4 2015 Synergy Research Grup 31, Market Research fr the Netwrking & Telecm Industry Cntents Clud
More informationTOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE
TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE A N D R E I A F E R R E I R A, A N T Ó N I O C A S T R O, D E L F I N A S Á S O A R E
More information990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.
990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General
More informationNextGenJustice Florida attorneys have prepared the following Frequently Asked Questions to help you with your uncontested divorce.
NextGenJustice Flrida attrneys have prepared the fllwing Frequently Asked Questins t help yu with yur uncntested divrce. Frequently asked questins abut yur uncntested Flrida divrce: Q. Hw lng will my divrce
More informationADVOCACY ALERT Action Needed SUPPORT FUNDING FOR THE ARTS EMAIL CAMPAIGN TODAY!
ADVOCACY ALERT Actin Needed SUPPORT FUNDING FOR THE ARTS EMAIL CAMPAIGN TODAY! Nvember 15, 2004 PACT is urging everyne in the culture cmmunity, including thse members f ur audience and lcal cmmunity wh
More informationTraining Efficiency: Optimizing Learning Technology
Ideas & Insights frm 2008 Training Efficiency Masters Series Survey Results Training Efficiency: Optimizing Learning Technlgy trainingefficiency.cm Survey Results: Training Efficiency: Optimizing Learning
More informationThe AccuSpeechMobile solution is a fully mobile voice-enabling software solution, that noninvasively. existing mobile enterprise wide applications.
1. Questin: Yu say that yu have an innvative mbile apprach t deplying vice prductivity t enterprise applicatins. Hw is AccuSpeechMbile different frm existing vice architectures? Answer: When ne lks at
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationWHITEPAPER Reference Architectures for Portal-based Rich Internet Applications
Authr: Sven Rieger Created n: 2015-04-10 Versin: 1.0 Rich Internet (RIAs) are HTML5-based applicatins with a desktp-like lk&feel which run inside a web brwser. The Micrsft Office applicatins Wrd, Excel,
More information366 Degrees Gaining Extra Degrees of Success
366 Degrees Gaining Extra Degrees f Success In the rush t gain new custmers, cmpanies ften verlk their best custmers the nes they already have. While finding and attracting new custmers is certainly fundamental
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationAgenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season
Agenda Purpse f IT Assessment Scpe f IT Assessment Delitte Recmmendatins IBM Discussins Research Data Center Open Seasn Purpse f IT Assessment Determine if IT resurces are being utilized efficiently and
More informationTowards Dynamic Adaptation within an ESB-based Service Infrastructure Layer
Twards Dynamic Adaptatin within an ESB-based Service Infrastructure Layer Laura Gnzález and Raúl Ruggia MONA+, 1st December, 2010 Uruguay Institut de Cmputación Facultad de Ingeniería Universidad de la
More informationRECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
More informationSecurity Support in Mobile Platforms (part I) Vincent Naessens - MSEC
Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device
More informationOnline Network Administration Degree Programs
Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Netwrk Administratin Degree Prgrams A Netwrk Administratr is smene respnsible fr the maintenance and perfrmance f cmputer hardware and sftware
More informationINTEGRATION OVERVIEW. Introduction... 1. Authentication methods... 2. Learning management system (LMS) integration methods... 2. AICC standard...
INTEGRATION OVERVIEW Cntents Intrductin... 1 Authenticatin methds... 2 Learning management system (LMS) integratin methds... 2 AICC standard... 2 LTI standard... 3 Applicatin prgramming interface (API)
More informationHow To Use Citrix Xendesktp 4 With Flexcast
Citrix XenDesktp 4: The clear chice fr desktp virtualizatin Citrix pineered desktp and applicatin delivery ver 20 years ag, and in recent years, we have been rapidly innvating with ur industry leading
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationTrends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationPROCESSING THROUGH MPS and AVIMARK
Befre using McAllister Payment Slutins (MPS) as yur pint-f-sale and/r integrated credit card prcess slutin, the McAllister Payment Slutins PA- DSS Implementatin Guide must be reviewed in its entirety.
More informationDVS Enterprise Test Results for Microsoft Lync 2013 and Citrix XenDesktop 7. Dell Client Cloud Computing Engineering Revision: 1.
DVS Enterprise Test Results fr Micrsft Lync 2013 and Citrix XenDesktp 7 Dell Client Clud Cmputing Engineering Revisin: 1.0 11/6/13 THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationManaging Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite
Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationFlash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory
Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are
More informationThe 3Dnet Cloud - are you connected yet?
The 3Dnet Clud - are yu cnnected yet? 3DnetMedical is a clud-based service that prvides easy, timely access t studies nline. Fllwing IHE standards, any imaging setup can easily be cupled t the clud. Image
More informationSome Statistical Procedures and Functions with Excel
Sme Statistical Prcedures and Functins with Excel Intrductry Nte: Micrsft s Excel spreadsheet prvides bth statistical prcedures and statistical functins. The prcedures are accessed by clicking n Tls in
More informationNetwork Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
More informationSoftware as a Service. Haojie Hang Ogheneovo Dibie
Sftware as a Service Hajie Hang Oghenev Dibie Executive Summary In this presentatin, we g thrugh the Sftware as a Service Methdlgy, examine its benefits and drawbacks and talk abut tw state-f-art SaaS
More informationMicrosoft has released Windows 8.1, a free upgrade to Windows 8. Follow the steps below to upgrade to Windows 8.1.
Fr VAIO PC users running Windws 8 Micrsft has released Windws 8.1, a free upgrade t Windws 8. Fllw the steps belw t upgrade t Windws 8.1. Prepare t Upgrade Befre yu upgrade: Windws 8 users If yu re already
More informationCopyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and
ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we
More informationThis report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
More informationGateway Agent - First Amendment to the High Level Design Document
Gateway Agent - First Amendment t the High Level Design Dcument Scpe The Gateway Agent HLD thrugh update 1 assumes that nly the Cntrl App, while cnnected t the prximal netwrk, can initiate new clud services.
More informationMigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200
MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm
More informationMicrosoft SQL Server Administration
Micrsft SQL Server Administratin Disk & memry David Hksza http://siret.cz/hksza Lecture Outline Query lifecycle Data strage SQL Server Memry SELECT Query Lifecycle 1. SNI client-server cnnectin using TCP/IP
More informationHow To Write A Byod
Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.
More informationAHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
More informationSERVICES BEST PRACTICES
SERVICES SERVICES SERVICES BEST PRACTICES WHEN TO ENGAGE US Nt every study requires advanced prgramming and executin. Nt every team needs skills that are called upn nly infrequently. That s why CfMC partners
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationTo transform information into knowledge- a firm must expend additional resources to discover, patterns, rules, and context where the knowledge works
Chapter 15- Managing Knwledge Knwledge Management Landscape Knwledge management systems- supprt the creatin, capture, strage, and disseminatin f firm expertise and knwledge, have becme ne f the fastest-grwing
More informationE-Commerce-SWOT Analysis
Internatinal Jurnal f Management and Cmmerce Innvatins ISSN 2348-7585 (Online) Vl. 2, Issue 1, pp: (226-231), Mnth: April 2014 - September 2014, Available at: www.researchpublish.cm E-Cmmerce-SWOT Analysis
More informationDefining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing
Defining Sales Campaign Autmatin Hw e-mail, the Killer App, is best applied t marketing Summary: Cmpanies tday are steadily adpting strategies and technlgies t reach prspects, custmers, and partners thrugh
More informationPersonal Selling. Lesson 22. 22.1 Objectives. 22.2 Meaning of Personal Selling
Persnal Selling Lessn 22 Persnal Selling When yu want t buy smething yu usually g t a cncerned shp and purchase it frm there. But, smetimes yu find peple bring certain gds r prducts and make them available
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationRemote Monitoring Service
Remte Mnitring Service Service Definitin Fr G-Clud 7 September 2015 G-Clud 7 Service Definitin Remte Mnitring Service Mnitred parameters The fllwing sectins prvide a detailed view f what parameters Daisy
More informationPosition Paper on In-Network Object Cloud Architecture and Design Goals. Interconnecting Smart Objects with Internet Workshop 25 th March 2011
Architecture and Design Gals Intercnnecting Smart Objects with Internet Wrkshp 25 th March 2011 Alex Galis Stuart Clayman University Cllege Lndn Department
More information1)What hardware is available for installing/configuring MOSS 2010?
1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin
More information