Главная
Study mode:
on
1
Introduction
2
Cisco Spark
3
Goals
4
Transport Level Security
5
Security by Default
6
Key Management
7
Key Management Flow
8
Authentication
9
Search
10
Off the Record
11
Hybrid Deployment
12
OfftheRecord
13
The pieces of the puzzle
14
IETF draft
15
How are keys secure
16
Key management system
17
Indexing
18
Question
Description:
Explore end-to-end encryption in cloud services through this 47-minute conference talk from GOTO Chicago 2015. Dive into the advantages and weaknesses of cloud-hosted services, focusing on data management and security. Learn about transport level security, key management, authentication, and hybrid deployment strategies. Discover how Cisco Spark implements these concepts and understand the challenges of securing data in the cloud. Gain insights into the IETF draft for end-to-end encryption and explore solutions for key security and indexing. Enhance your knowledge of cloud security practices and their implications for both service providers and users.

End-to-end Encryption in Cloud Services

GOTO Conferences
Add to list
0:00 / 0:00