Tag

KMS

1 views collected around this technical thread.

OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 25, 2022 · Fundamentals

An Overview of Linux Direct Rendering Manager (DRM): History, Architecture, and Simple Example

Linux’s Direct Rendering Manager (DRM) replaces the legacy framebuffer by providing a kernel subsystem that unifies GPU and display control through libdrm, KMS, and GEM, tracing its evolution from 1999 DRI origins to atomic APIs, and illustrating usage via a step‑by‑step modeset example.

DRMDirect Rendering ManagerGEM
0 likes · 11 min read
An Overview of Linux Direct Rendering Manager (DRM): History, Architecture, and Simple Example
GrowingIO Tech Team
GrowingIO Tech Team
Oct 22, 2021 · Information Security

Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption

This article explains the definition and importance of data security, describes GrowingIO’s implementation of software runtime protection and static storage encryption using KMS, details data logic isolation, PII management with AES‑256 encryption, and provides code examples for configuring and using these security measures in cloud environments.

Cloud SecurityData SecurityJava
0 likes · 10 min read
Securing Enterprise Data: GrowingIO’s KMS‑Driven Runtime and PII Encryption
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMSKey Management
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
Ops Development Stories
Ops Development Stories
Jan 26, 2021 · Information Security

How to Secure Kubernetes Secrets: Static Encryption and KMS Plugin Guide

This article explains why Kubernetes Secrets need encryption, demonstrates static encryption via the kube‑apiserver, shows how to configure an external KMS plugin (using Alibaba Cloud as an example), and lists third‑party tools for protecting secret data in a cluster.

Cloud NativeInformation SecurityKMS
0 likes · 13 min read
How to Secure Kubernetes Secrets: Static Encryption and KMS Plugin Guide
AntTech
AntTech
Aug 11, 2020 · Information Security

Security Challenges of Kubernetes Secrets and Ant Group’s TEE‑Based End‑to‑End Protection

An interview with Ant Group senior engineer Qin Kailun reveals the inherent security flaws of Kubernetes Secrets—including plaintext storage, memory exposure, and vulnerable KMS plugins—and explains Ant Group’s TEE‑based end‑to‑end protection solution that encrypts secrets throughout their lifecycle.

Ant GroupInformation SecurityKMS
0 likes · 7 min read
Security Challenges of Kubernetes Secrets and Ant Group’s TEE‑Based End‑to‑End Protection
JD Tech
JD Tech
Jul 10, 2018 · Big Data

Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide

This article details a complete, hands‑on deployment of Hadoop KMS on a CentOS‑based Hadoop 2.6.1 cluster, covering environment setup, configuration file changes, key generation, service startup, encryption‑zone creation, user permission tuning, verification procedures, and common troubleshooting tips.

Big DataHDFSHadoop
0 likes · 19 min read
Deploying Hadoop KMS for Transparent HDFS Encryption: A Step‑by‑Step Guide