Secure Cloud Computing: KEVIN JACKSON
|
|
- Noreen Wells
- 8 years ago
- Views:
Transcription
1 Secure Cloud Computing: An Architecture t Ontology Approach KEVIN JACKSON
2 Forces Driving Cloud Computing The New IT Era rev date 4/15/2009 slide 2
3 Cloud Computing Value rev date 4/15/2009 slide 3
4 Cloud Computing Challenge rev date 4/15/2009 slide 4
5 Unified Ontology of Cloud Computing ( Cloud Application (SaaS) Cloud Software Environment (PaaS) Cloud Software Infrastructure Computational Storage Communications Resources (IaaS) (DaaS) (CaaS) Software Kernal Firmware / Hardware (HaaS) Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center
6 Tactical Employment Issues Internet t connectivity it assumed SOA platform Security management Application service discovery and management Workflow orchestration Access management
7 Ontology Modifications for Tactical Cloud Computing Access Cloud Management Application (SaaS) Cloud Cloud Application Application (SaaS) Workflow Workflow Orchestration (SaaS) Orchestration Policy Engine Cloud Security Software API Environment Security API Services Cloud / Services Software (PaaS) Discovery Services / Services Discovery Environment Service Management (PaaS) Service Management Cloud Software Cloud Infrastructure Software Environment Cloud Software Cloud Infrastructure Software (PaaS) Environment Cloud Software Infrastructure (PaaS) Storage Communications Cloud Network Software Security Infrastructure t Storage (DaaS) Communications (CaaS) Network (DaaS) Connectivity (CaaS) Computational Network Storage Security Computational Storage Communications Resources Computational (IaaS) Resources (IaaS) Communications Computational Resources (IaaS) Storage (DaaS) (CaaS) Software Kernal Communications (CaaS) (IaaS) (DaaS) Software Kernal Software Software Kernal Kernal ) Firmware Hardware (HaaS) Firmware / Hardware (HaaS)
8 Tactical Cloud Computing Ontology Computational Resources (IaaS) Access Management Cloud Application (SaaS) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Network Connectivity Storage (DaaS) Software Kernal Firmware / Hardware (HaaS) Communications (CaaS)
9 Ontology Modification Federated SOA Global l Governance Dynamic Tasking Access Management Cloud Application i (SaaS) S) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Access Management Cloud Application i (SaaS) S) Workflow Orchestration Policy Engine Security API Services / Services Discovery Service Management Cloud Software Environment (PaaS) Cloud Software Infrastructure Cloud Software Infrastructure Network Connectivity Network Connectivity Computational Resources (IaaS) Storage (DaaS) Communications (CaaS) Computational Resources (IaaS) Storage (DaaS) Communications (CaaS) Software Kernal Software Kernal Firmware / Hardware (HaaS) Firmware / Hardware (HaaS)
10 Secure Cloud Computing An Approach Access Management Out of Band authentication Access Management Cloud Application (SaaS) Security API y g Use of services Binding of service Services / Services Discovery COI driven Service Management management No VPN Data aain Motion o security Computational Resources VM management Data-centric security model Storage Data at Rest security COI driven access Computational Resources (IaaS) Workflow Orchestration Policy Engine Security API Cloud dsoftware Environment (PaaS) Cloud Software Infrastructure Network Connectivity Storage (DaaS) Software Kernal Firmware / Hardware (HaaS) Communications (CaaS)
11 SecureParser Document -mail E Database Video Map Imagery Cryptographically splits data Creates physically separate fault tolerant Shares CDIP & COI Framework AES Encryption Random Bit Split M of N Fault Tolerance Share Authentication High-efficiency cryptographic module: Provably-secure Computational Secret Sharing Cryptographic Data Splitting Data Integrity Protection Modules can be change out, e.g. AES could be changed with a TYPE I encryption as requirement called for Physically Separate Shares Written to Storage Data at Rest Written to Networks Data in Motion Created at any IO Point in the system User Definable Number of Shares Fault Tolerance Key Management
12 Independent Testing and Evaluation 2005 CWID: AFCA assessment & AF C2 Battle Lab demo as demonstrating the potential to be labeled as an MLS/PL-4 System 2005 DISA: Technical Information Panel (TIP) found to have merit for further evaluation and consideration for use as an information assurance technology potential to fundamentally alter the way storing and securing of data is approached SOCOM: National Center for the Study of Counter-terrorism and Cybercrime IV&V completed successfully for SOCOM MLS Pilot Project 2006 EUCOM Combined Endeavor: Joint Interoperability Test Center (JITC) value of the SecureParser was obvious. This capability not only offers increased security of data, but reduces costs by eliminating the need for redundant resources Selected by DISA as a demonstration solution for CWID 08 - June 08 Selected by NSA for HAP Trade Study as a Crypto Service and for DAR
13 Mission Network Centric Operations Industry Consortium Our mission is to facilitate global realization of the benefit inherent in Network Centric Operations. To that end, we seek to enable continuously increasing levels of interoperability across the spectrum of joint, interagency, intergovernmental, and multinational industrial and commercial operations. We will execute this mission in good faith as a global organization with membership open to all enterprises in quest of applying the vast potential of network centric technology to the operational challenges faced by our nations and their citizens. Past successes Network Centric Analysis Tool (NCAT) NCOIC Interoperability Framework (NIF) Future Develop operational art in support of netcentric operations Support operational art advances through collaboration (Government, Industry, Non-profits, Interest Groups) Provide value to members Use of NCOIC developed process provided differentiator in recent European procurement for a member company NCOIC Patterns addressing interoperability concerns of member government agencies
14 Cloud Computing Operational Art Embrace collaboration OSD tactical Cloud Computing TIGR Government Cloud Computing Cloud Interoperability bl Forum Use Operational and Capability pattern process to develop Cloud Computing Technical Patterns Identify key netcentric operations interoperability requirements and preferences within identified technical patterns Iterate with NCOIC stakeholder companies and government organizations Use Capability and Operational patterns to validate operational impact of reduced cloud interoperability Leverage analysis to drive cloud interoperability recommendations and best practices
15 Thank You! com
Toward a Unified Ontology of Cloud Computing
Toward a Unified Ontology of Cloud Computing Lamia Youseff University of California, Santa Barbara Maria Butrico, Dilma Da Silva IBM T.J. Watson Research Center 1 In the Cloud Several Public Cloud Computing
More informationService based Personalized Learning System in Cloud Computing Environment
Service based Personalized Learning System in Cloud Computing Environment HwaYoung Jeong 1, BongHwa-Hong 2, 1 Humanitas College of Kyunghee University. Hoegi-dong, Seoul, 130-701, Korea. 2 Dept. of Information
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Proposed Improvement BPM as a Knowledge Layer into SaaS
More informationCloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
More informationCloud Computing. Jussi Talaskivi Information Management Centre University of Jyväskylä
Cloud Computing Jussi Talaskivi Information Management Centre University of Jyväskylä About the presenter Information Systems Analyst Scrum master Web Content Management System (Plone) www.jyu.fi Koppa
More informationCLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University
More informationApplication of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment
Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment Mayanka Katyal 1 and Atul Mishra 2 1 Deptt. of Computer Engineering, YMCA University of Science and
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationOwn your own Enterprise Cloud with. FlexCloud
Own your own Enterprise Cloud with FlexCloud What Problem do we solve? Traditional Virtualization Stack Data protection software applications PDU Backup Servers + Virtualization Storage Switch HA shared
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationALSO CHOICE. The Channel Partner s Cloud Marketplace ALSO CHOICE. Marketplace. Sales. Provisioning. Billing. Reporting. Self-Care.
ALSO CHOICE The Channel Partner s Cloud ALSO CHOICE alsochoice.cloudmarketplace.d e 1 ALSO CHOICE The Concept ALSO becomes a Cloud Service aggregator offering to our channel partner an ALSO qualified and
More informationConsiderations for Adopting PaaS (Platform as a Service)
Considerations for Adopting PaaS (Platform as a Service) Michael Dolan (mdolan@pivotal.io) Senior Field Engineer April 2015 1 Becoming The Agile Enterprise To effectively achieve its missions, the Department
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationTrust and Dependability in Cloud Computing
Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance
More informationThe standards landscape in cloud
The standards landscape in cloud PRESENTATION computing TITLE GOES HERE Vincent Franceschini CTO Distributed Architectures, Hitachi Data System Chairman Emeritus, SNIA Governing Board Member, SNIA Cloud
More informationVMware for your hosting services
VMware for your hosting services Anindya Kishore Das 2009 VMware Inc. All rights reserved Everybody talks Cloud! You will eat your cloud and you will like it! Everybody talks Cloud - But what is it? VMware
More informationService Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationInside the Cloud The Supporting Architecture of Cloud Computing. Jack Hanison Jack.Hanison@capgemini.com
Inside the Cloud The Supporting Architecture of Cloud Computing Jack Hanison Jack.Hanison@capgemini.com What is Cloud Computing? 2 http://www.flickr.com/photos/galego/3131005845/ Is Cloud Computing these
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
SESSION ID: CSV-W02 Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control David Etue VP, Business Development, Identity and Data Protection Gemalto @djetue Cloud and Virtualization Are
More informationPreparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation
Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.
More informationThe NIST Cloud Computing Program
The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program
More informationNIST Cloud Computing Reference Architecture & Taxonomy Working Group
NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud
More informationProfile. Business solutions with a difference
Profile Business solutions with a difference Overview ITeM Group was founded in 1999 and has a successful history of delivering IT solutions in Australia, New Zealand, Indonesia, China and Canada. We specialise
More informationShared Services Canada (SSC)
Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29, 2013 1 Agenda TIME
More informationGrid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
More informationCloud Perspectives. Steven Woodward CFPS, CSQA steve@cloud-perspectives.com 613-823-7573 www.cloud-perspectives.com
Cloud Perspectives Steven Woodward CFPS, CSQA steve@cloud-perspectives.com 613-823-7573 www.cloud-perspectives.com Introduction Models and Standards Categories and Context Function Point Scenarios Hints
More informationInformation Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
More informationTake Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software
Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor
More informationAre You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec
Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec What is Cloud Computing? Cloud Computing refers to the delivery of software (SaaS), infrastructure (IaaS), and/or platform
More informationNew Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer
New Computing Models, and What They Mean to the Small and Mid-Sized Business Consumer How your business can make practical decisions between The Cloud, Utility Computing and Hosted Services 1 Business
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationService Oriented Cloud Computing Architectures. Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN.
Service Oriented Cloud Computing Architectures Asher Vitek 12/3/2011 UMM CSci Senior Seminar Conference Morris, MN. Overview Cloud Computing What is cloud computing Types of cloud computing Service Oriented
More informationApplying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
More informationPreparation Guide. EXIN Cloud Computing Foundation
Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationCloud Data Security. Sol Cates CSO @solcates scates@vormetric.com
Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric
More informationWeb Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm
Web Application Hosting Cloud Solution Architecture http://www.cloud-council.org/web-app-hosting-wp/index.htm February, 2015 Presenters Heather Kreger CTO International Standards, IBM US kreger@us.ibm.com
More informationBusiness applications:
Consorzio COMETA - Progetto PI2S2 UNIONE EUROPEA Business applications: the COMETA approach Prof. Antonio Puliafito University of Messina Open Grid Forum (OGF25) Catania, 2-6.03.2009 www.consorzio-cometa.it
More informationEnterprise Managed Cloud Computing at NASA. Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014
Enterprise Managed Cloud Computing at NASA Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014 What is Cloud Computing? Cloud Computing in a Nutshell Cloud computing
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationCLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More information2015 LENOVO. ALL RIGHTS RESERVED. Isabel Zarate Lenovo EBG Leader
2015 LENOVO. ALL RIGHTS RESERVED. Isabel Zarate Lenovo EBG Leader Enterprise is Key to Lenovo Triple Plus Strategy SMART CONNECTED DEVICES TOTAL PORTFOLIO ** * 2 2015 Lenovo Internal. All rights reserved.
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationCerticom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
More informationNovel Network Computing Paradigms (I)
Lecture 4 Novel Network Computing Paradigms (I) Part B Cloud Computing Graduate Course, Hosei U., J. Ma 1 Computing Paradigm Evolution Personal PC Client Server Cloud Computing Hardware Centric Software
More informationEucalyptus-Based. GSAW 2010 Working Group Session 11D. Nehal Desai
GSAW 2010 Working Group Session 11D Eucalyptus-Based Event Correlation Nehal Desai Member of the Tech. Staff, CSD/CSTS/CSRD, The Aerospace Corporation Dr. Craig A. Lee, lee@aero.org Senior Scientist, CSD/CSTS/CSRD,
More informationWindows Azure Platform
Windows Azure Platform Giordano Tamburrelli, PhD giotam@microsoft.com Academic Developer Evangelist Slides by David Chou You manage You manage You manage Types of Clouds Private (On-Premise) Infrastructure
More informationAn Ontology-enhanced Cloud Service Discovery System
An Ontology-enhanced Cloud Service Discovery System Taekgyeong Han and Kwang Mong Sim* Abstract This paper presents a Cloud service discovery system (CSDS) that aims to support the Cloud users in finding
More informationBigData Management and Analytics in the Cloud** In the Contenxt of the Materials Genome Initiative
BigData Management and Analytics in the Cloud** In the Contenxt of the Materials Genome Initiative Mladen A. Vouk* North Carolina State University, Raleigh, NC (*) Professor and Head of Computer Science
More informationCloud Computing Essentials Course Outline
Cloud Computing Essentials Course Outline Find out everything you need to know about cloud computing on this 4-day interactive course. About CYBERMODO: CYBERMODO is a professional Education Center that
More informationSession 3. the Cloud Stack, SaaS, PaaS, IaaS
Session 3. the Cloud Stack, SaaS, PaaS, IaaS The service models resemble a cascading architecture where services on a higher level, as identified by Weinhardt et.al. (2009); encapsulate functionality from
More informationA Cloud Computing Framework for Ethiopian Higher Education Institutions
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 6 (Nov. - Dec. 2012), PP 01-09 A Cloud Computing Framework for Ethiopian Higher Education Institutions Shaik
More informationfor Oil & Gas Industry
Wipro s Upstream Storage Solution for Oil & Gas Industry 1 www.wipro.com/industryresearch TABLE OF CONTENTS Executive summary 3 Business Appreciation of Upstream Storage Challenges...4 Wipro s Upstream
More informationOffice of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationCustomer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile
Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationSecure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
More informationRapid Development of Smart and Self-Adaptive Cloud, Mobile & IoT Applications - Accelerating the Last Mile of Cloud Computing
Rapid Development of Smart and Self-Adaptive Cloud, Mobile & IoT Applications - Accelerating the Last Mile of Cloud Computing Jesse Shiah CEO and Co-founder Jesse.shiah@agilepoint.com 2013 AgilePoint,
More informationAmit Sheth & Ajith Ranabahu, 2010. Presented by Mohammad Hossein Danesh
Amit Sheth & Ajith Ranabahu, 2010 Presented by Mohammad Hossein Danesh 1 Agenda Introduction to Cloud Computing Research Motivation Semantic Modeling Can Help Use of DSLs Solution Conclusion 2 3 Motivation
More informationTECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationEnhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationA Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric
A Security Practitioner s Guide to the Cloud Maintain Trust and Control in Virtualized Environments with SafeNet s Trusted Cloud Fabric TRUSTED CLOUD FABRIC A Security Practitioner s Guide to the Cloud
More informationSpace and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationCloud Security and Data Protection
Cloud Security and Data Protection Cloud Strategy Partners, LLC Sponsored by: IEEE Educational Activities and IEEE Cloud Computing Course Presenter s Biography This IEEE Cloud Computing tutorial has been
More informationKey Management Challenges in a Cloud Ecosystem
Key Management Challenges in a Cloud Ecosystem A Discussion Starter Based on the Cloud Security WG s Research - Dr. Michaela Iorga, NIST (presenting) Anil Karmel, C2 Lab, Inc. (presenting) Juanita Koilpilai,
More informationWhat You Need to Know About CLOUD INFORMATION PROTECTION SOLUTIONS
What You Need to Know About CLOUD INFORMATION PROTECTION SOLUTIONS Table of Contents Cloud Adoption Drivers Key Capabilities and Technologies Usability and User Experience Security Technology Architecture
More informationOpen Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0
sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...
More informationDesigning and Implementing Cloud Governance: Cloud, and Cloud Governance, are Emerging Capabilities
Designing and Implementing Governance:, and Governance, are Emerging Capabilities Eric Marks President & CEO AgilePath Corporation emarks@agile-path.com Designing and Implementing Governance Governance
More informationComputing Platforms Web applications Business applications Social applications
2 Just as there are different segments of cloud computing, there are also 4 different types of PaaS. There may actually be more in the future. There are new developments in cloud computing every day. But
More informationOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended
More informationService Desk as a Service
Service Desk on Command A Steria Cloud Services Offering Service Name Service Desk on Command Service Desk as a Service Type of Service: IaaS PaaS SaaS Specialist Services Deployment Model: Public Private
More information4/6/2009 CLOUD COMPUTING : PART I WHY IS CLOUD COMPUTING DISTINCT? INTRODUCTION: CONTINUE A PERSPECTIVE STUDY
CLOUD COMPUTING : A PERSPECTIVE STUDY PART I BACKGROUND AND CONCEPTS Guannang Wang YingFeng Wang Qi Li INTRODUCTION: Coined in late of 2007 Currently emerges as a hot topic due to its abilities to offer
More informationTrends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum
Trends and Research Opportunities in Spatial Big Data Analytics and Cloud Computing NCSU GeoSpatial Forum Siva Ravada Senior Director of Development Oracle Spatial and MapViewer 2 Evolving Technology Platforms
More informationCARTES 2012 Demo presentation. Secure Cloud Storage
CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service
More informationCredit Unions and The Cloud. By: Chris Sachse
Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!
More informationCloud Data Security and the Insider Threat
Cloud Data Security and the Insider Threat Sol Cates CSO @solcates scates@vormetric.com Copyright 2014 Vormetric, Inc. All rights reserved. A bit about me InfoSec for ~ 18 years Currently have 4 jobs Infrastructure
More informationVirtual Infrastructure Creates Communications Agility
Virtual Infrastructure Creates Communications Agility June 2013 Prepared by: Zeus Kerravala Virtual Infrastructure Creates Communications Agility by Zeus Kerravala June 2013 º º º º º º º º º º º º º º
More informationSpace Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationCloud Computing Essentials Course Outline
Cloud Computing Essentials Course Outline Taught by real professionals/ teachers who guide you through every topic step by step. You can now avoid all the frustration and disappointment that comes when
More informationDoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
More informationCloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
More informationExtending your datacenter to the cloud
Extending your datacenter to the cloud Steve Beaumont @StevybSC http://www.poweronplatforms.com Chiyo Odika @MrChiyo http://www.mrchiyo.com Steve Beaumont Grimsby, United Kingdom @StevybSC Product Development
More informationAFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
More informationThe Scottish Wide Area Network Programme
The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location
More informationThreat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
More informationFujitsu Global Cloud Strategy
Fujitsu Global Cloud Strategy Hemminki Sääksjärvi Director, Cloud Office & Marketing, Fujitsu Nordic April 2012 0 Realizing Human Centric Intelligent Society Close relationship between real world and virtual
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationPaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong
PaaS Cloud Migration Migration Process, Architecture Problems and Solutions Claus Pahl and Huanhuan Xiong Cloud Migration Motivation HOW TO MIGRATE TO CLOUD IaaS PaaS SaaS Cloud Migration Definition A
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationFreedom Stairway to the Cloud Offering
Freedom OSS is the Top Enterprise Cloud Computing System Integrator on the Market today The 451 Group We look at Freedom PST as a full-fledged, strategic partner that can help us deliver quality cloud
More informationOffer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone
Offer Highly Available SAAS Solutions with Huawei Huang Li Executive Vice President of isoftstone Contents Contents 1 2 3 4 5 6 7 Significance of SMEs in Urban Development SME Status Quo IT Capabilities
More informationHow To Get Cloud Services To Work For You
Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies
More information