National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Corporate Identity and Access Management Suggestion for Improvement
Valtr, Jiří ; Šťastný Vratislav, Ing., MBA (referee) ; Ondrák, Viktor (advisor)
This bachelor thesis deals with the issue of control and management of identities and access in company. Its goal is to propose possible solutions that will contribute to the improvement of the overall identity management of the company or its parts and thus to the overal corporate IT security.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Corporate Identity and Access Management Suggestion for Improvement
Valtr, Jiří ; Šťastný Vratislav, Ing., MBA (referee) ; Ondrák, Viktor (advisor)
This bachelor thesis deals with the issue of control and management of identities and access in company. Its goal is to propose possible solutions that will contribute to the improvement of the overall identity management of the company or its parts and thus to the overal corporate IT security.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.