Remote data deletion

Results: 15



#Item
1Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
2Computing / Cyberwarfare / Computer network security / Data breach / Secure communication / Information security / Data loss / Malware / Remote data deletion / Data security / Security / Computer security

2013 Cost of Data Breach Study: United States Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-06-04 16:37:57
3Cyberwarfare / National security / Data breach / Information security / Credit card / Malware / Internet privacy / Database / Remote data deletion / Data security / Security / Computer security

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: essextec.com

Language: English - Date: 2014-07-14 16:28:48
4Applied mathematics / Qubit / Quantum computer / Quantum entanglement / Quantum no-deleting theorem / Entanglement distillation / Quantum information science / Theoretical computer science / Physics

Towards Provable Remote Data Deletion Through Quantum Entanglement Jon Crowcroft University of Cambridge Gerard Briscoe

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2013-04-02 18:41:25
5Remote data deletion / Remote backup service / Backup / Security / Laptop / Cloud backup / SOS Online Backup / Mozy / Data security / Computing / Backup software

VaultLogix Offers Exclusive Preview of New End Point Protection Solution Danvers, Mass. – VaultLogix, a business-class cloud backup service provider, today announced the release MobilePlus, their latest data protection

Add to Reading List

Source URL: www.dataprotection.com

Language: English - Date: 2013-02-04 13:16:28
6Computing / Data security / Smartphones / Internet privacy / Mobile device / Privacy / Remote data deletion / Mobile business intelligence / Technology / Information appliances / Ethics

Seven Tips for Securing Mobile Workers Sponsored by Sophos Published by Ponemon Institute LLC

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:37
7Cyberwarfare / National security / Data breach / Information security / Credit card / Malware / Internet privacy / Remote data deletion / Data security / Security / Computer security

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-11-21 12:41:46
8Data synchronization / Backup software / Data security / Online backup services / File hosting / Remote backup service / Backup / Data deduplication / Extensible Storage Engine / Computing / Software / System software

A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong {arahumed,chchen,ta

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2011-06-22 23:20:17
9Dispute resolution / Computer network security / Data breach / Secure communication / Mediation / Security breach notification laws / Database / Remote data deletion / Security / Computer security / Data security

2011 Cost of Data Breach Study: Global Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-07-16 19:01:39
10Computer network security / Cyberwarfare / Data breach / Information security / Malware / Internet privacy / Threat / Remote data deletion / Computer security / Security / Data security

2011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-12-06 09:58:51
UPDATE