Remote data deletion

Results: 15



#Item
11  Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
22013 Cost of Data Breach Study: United States Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

2013 Cost of Data Breach Study: United States Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-06-04 16:37:57
3The following diagram illustrates the activity-based costing schema used in the current benchmark study

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: essextec.com

Language: English - Date: 2014-07-14 16:28:48
4Towards Provable Remote Data Deletion Through Quantum Entanglement Jon Crowcroft University of Cambridge  Gerard Briscoe

Towards Provable Remote Data Deletion Through Quantum Entanglement Jon Crowcroft University of Cambridge Gerard Briscoe

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2013-04-02 18:41:25
5VaultLogix Offers Exclusive Preview of New End Point Protection Solution Danvers, Mass. – VaultLogix, a business-class cloud backup service provider, today announced the release MobilePlus, their latest data protection

VaultLogix Offers Exclusive Preview of New End Point Protection Solution Danvers, Mass. – VaultLogix, a business-class cloud backup service provider, today announced the release MobilePlus, their latest data protection

Add to Reading List

Source URL: www.dataprotection.com

Language: English - Date: 2013-02-04 13:16:28
6Seven Tips for Securing Mobile Workers Sponsored by Sophos Published by Ponemon Institute LLC

Seven Tips for Securing Mobile Workers Sponsored by Sophos Published by Ponemon Institute LLC

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-04-16 08:43:37
7The following diagram illustrates the activity-based costing schema used in the current benchmark study

The following diagram illustrates the activity-based costing schema used in the current benchmark study

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-11-21 12:41:46
8A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong {arahumed,chchen,ta

A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong {arahumed,chchen,ta

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2011-06-22 23:20:17
92011 Cost of Data Breach Study: Global Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

2011 Cost of Data Breach Study: Global Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-07-16 19:01:39
102011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

2011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-12-06 09:58:51