Cloud Deployments: Is this the End of N-Tier Architectures? (English)
- New search for: Frith, David
- New search for: Frith, David
In:
ISSE 2015
;
74-86
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Cloud Deployments: Is this the End of N-Tier Architectures?
-
Contributors:Frith, David ( author )
-
Published in:ISSE 2015 ; 74-86
-
Publisher:
- New search for: Springer Fachmedien Wiesbaden
-
Place of publication:Wiesbaden
-
Publication date:2015-01-01
-
Size:13 pages
-
ISBN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The EDPS Strategy – Leading by ExampleButtarelli, Giovanni / Wiewiórowski, Wojciech / Docksey, Christopher et al. | 2015
- 12
-
Future Ecosystems for Secure Authentication and IdentificationKahrs, Malte / Dr. Nguyen, Kim et al. | 2015
- 25
-
The Public Key Muddle – How to Manage Transparent End-to-end Encryption in OrganizationsJacobson, Gunnar et al. | 2015
- 36
-
Overcoming Obstacles: Encryption for Everyone!Stöwer, Mechthild / Rubinstein, Tatjana et al. | 2015
- 46
-
Securing Enterprise Email Communication on both Sides of the FirewallDr. Wiegel, Burkhard et al. | 2015
- 61
-
On Location-determined Cloud Management for Legally Compliant OutsourcingDoll, Bernhard / Emmerich, Dirk / Herkenhöner, Ralph / Kühn, Ramona / de Meer, Hermann et al. | 2015
- 74
-
Cloud Deployments: Is this the End of N-Tier Architectures?Frith, David et al. | 2015
- 87
-
Secure Partitioning of Application Logic In a Trustworthy CloudAlkassar, Ammar / Gröne, Michael / Schirmer, Norbert et al. | 2015
- 98
-
Doubtless Identification and Privacy Preserving of User in Cloud SystemsGonzález Robles, Antonio / Pohlmann, Norbert / Engling, Christoph / Jäger, Hubert / Ernst, Edmund et al. | 2015
- 111
-
Industry 4.0 – Challenges in Anti-CounterfeitingThiel, Christian / Thiel, Christoph et al. | 2015
- 121
-
Trust Evidence for IoT: Trust Establishment from Servers to SensorsOtt, David / Vishik, Claire / Grawrock, David / Rajan, Anand et al. | 2015
- 135
-
Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain AnalysisVishik, Claire / Balduccini, Marcello et al. | 2015
- 146
-
How the God Particle will Help You Securing Your AssetsBollhalder, Roger / Thiel, Christian / Punz, Thomas et al. | 2015
- 157
-
Proximity-Based Access Control (PBAC) using Model-Driven SecurityLang, Ulrich / Schreiner, Rudolf et al. | 2015
- 173
-
A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal MarketDelos, Olivier / Debusschere, Tine / De Soete, Marijke / Dumortier, Jos / Genghini, Riccardo / Graux, Hans / Lacroix, Sylvie / Ramunno, Gianluca / Sel, Marc / Van Eecke, Patrick et al. | 2015
- 196
-
Signature Validation – a Dark Art?Lipp, Peter et al. | 2015
- 206
-
A Comparison of Trust ModelsSel, Marc et al. | 2015
- 216
-
A Reference Model for a Trusted Service Guaranteeing Web-contentTogan, Mihai / Florea, Ionut et al. | 2015
- 227
-
Architectural Elements of a Multidimensional AuthenticationNeumann, Libor et al. | 2015
- 240
-
Bring Your Own Device For Authentication (BYOD4A) – The Xign–SystemPohlmann, Norbert / Hertlein, Markus / Manaras, Pascal et al. | 2015
- 251
-
Addressing Threats to Real-World Identity Management SystemsLi, Wanpeng / Mitchell, Chris J et al. | 2015
- 263
-
Information Security Standards in Critical Infrastructure ProtectionGuarino, Alessandro et al. | 2015
- 270
-
Data Protection Tensions in Recent Software Development TrendsTruyens, Maarten et al. | 2015
- 286
-
Changing the Security Mode of Operation in a Global IT Organization with 20000+ Technical Staffvon Faber, Eberhard et al. | 2015