Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Muhammad I.H. Sukmana"'
Publikováno v:
IEEE Access, Vol 8, Pp 123044-123060 (2020)
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely una
Autor:
Kennedy A. Torkura, Christoph Meinel, Justus Cöster, Feng Cheng, Muhammad I.H. Sukmana, Wenzel Puenter
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030750749
AINA (2)
AINA (2)
With more cloud customers are storing their data in multiple Cloud Service Providers (CSPs), they are responsible for managing the data in the multi-cloud storage environment, including monitoring the events on the cloud. They could monitor various c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c62b6b1dac7b769e04f0cb75cd25027
https://doi.org/10.1007/978-3-030-75075-6_37
https://doi.org/10.1007/978-3-030-75075-6_37
Publikováno v:
SECRYPT
Publikováno v:
ANT/EDI40
Data breaches, privacy violations and cyber-attacks are growing problems for companies and governmental organizations. Threat modelling serves as a heuristic procedure of methodological validation of organizations, system designs, software architectu
Autor:
Christoph Meinel, Muhammad I.H. Sukmana, Kennedy A. Torkura, Sezi Dwi Sagarianti Prasetyo, Feng Cheng
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030630942
SecureComm (2)
SecureComm (2)
Nowadays, more cloud customers are utilizing multiple cloud service providers (CSPs) to store their data in the cloud as it provides better data availability and service reliance than storing in the single CSP. However, there are several challenges f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a18e4c860245e24dbdee9c1b77d097b7
https://doi.org/10.1007/978-3-030-63095-9_6
https://doi.org/10.1007/978-3-030-63095-9_6
Autor:
Hendrik Graupner, Muhammad I.H. Sukmana, Kennedy A. Torkura, Marvin Petzolt, Christoph Meinel, Feng Cheng
Publikováno v:
ISPA/BDCloud/SocialCom/SustainCom
CloudRAID for Business (CfB) is a proof-of-concept enterprise cloud storage broker (ECSB) system that provides data security in the cloud. It applies a single-authority ciphertext-based policy attribute-based encryption (CP-ABE) scheme into its key m
Publikováno v:
NCA
Cyber-attacks against cloud storage infrastructure e.g. Amazon S3 and Google Cloud Storage, have increased in recent years. One reason for this development is the rising adoption of cloud storage for various purposes. Robust counter-measures are ther
Publikováno v:
NCA
The majority of security breaches in cloud infrastructure in recent years are caused by human errors and misconfigured resources. Novel security models are imperative to overcome these issues. Such models must be customer-centric, continuous, not foc
Autor:
Muhammad I.H. Sukmana, Hendrik Graupner, Kennedy A. Torkura, Feng Cheng, Christoph Meinel, Ankit Chauhan
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030150310
AINA
AINA
The emergence of the Internet allows the enterprise to implement telework policy in order for the employee to work and access company file anytime, anywhere. But it raises the challenge for the enterprise to enforce physical access control on enterpr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74f49d9da90b4bcc1fe1daaf9f064f2c
https://doi.org/10.1007/978-3-030-15032-7_104
https://doi.org/10.1007/978-3-030-15032-7_104
Publikováno v:
Computers & Security. 102:102124
Efficient change control and configuration management is imperative for addressing the emerging security threats in cloud infrastructure. These threats majorly exploit misconfiguration vulnerabilities e.g. excessive permissions, disabled logging feat