Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Sivadon Chaisiri"'
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:565-579
As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers to outsource security to the cloud, through the payment of a subscription fe
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, t
Publikováno v:
Data Security in Cloud Computing ISBN: 9781785612206
One of the barriers of cloud adoption is the security of data stored in the cloud. In this chapter, we introduce data provenance and briefly show how it is applicable for data security in the cloud. Building on this, we discuss the underlying questio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6dad4f0a7cdbab05126cd860d24ca05
https://doi.org/10.1049/pbse007e_ch12
https://doi.org/10.1049/pbse007e_ch12
Publikováno v:
Data Security in Cloud Computing ISBN: 9781785612206
In network security, a perimeter of a network of computers and other equipment is formed as a secure barrier protecting digital assets in the network from being accessed and compromised by unauthorized users. In cloud computing, building such a perim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecc37637333a468f459b200f64eb4f77
https://doi.org/10.1049/pbse007e_ch7
https://doi.org/10.1049/pbse007e_ch7
Publikováno v:
Data Security in Cloud Computing ISBN: 9781785612206
Cloud computing offers a massive pool of resources and services that cloud users can utilize for storing and processing their data. The users can flexibly control and reduce their operational expenditures, whereas resources provisioned from the cloud
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db984b8d9bbe2213b8770911d5e0bfca
https://doi.org/10.1049/pbse007e_ch1
https://doi.org/10.1049/pbse007e_ch1
Publikováno v:
Data Security in Cloud Computing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::029b9d58c600c175ddf21979b0fc20cf
https://doi.org/10.1049/pbse007e
https://doi.org/10.1049/pbse007e
Publikováno v:
TrustCom/BigDataSE/ICESS
In cases where an unknown intruder is using a computer we are often left attempting to attribute who they are. By using behavioural biometrics we can attempt to derive traits based on keystroke dynamics. Using hold times of keys, which we average and
Publikováno v:
IEEE Transactions on Services Computing. 7:545-560
We focus on the problems of cooperative virtual machine management of cloud users in a smart grid environment. In such an environment, the cloud users can cooperate to share the available computing resources in private cloud and public cloud to reduc
Publikováno v:
Trustcom/BigDataSE/ISPA
The need to understand and track files (and inherently, data) in cloud computing systems is in high demand. Over the past years, the use of logs and data representation using graphs have become the main method for tracking and relating information to
Publikováno v:
Trustcom/BigDataSE/ISPA
With the increase in Man-in-the-Middle (MITM) attacks capable of breaking Hypertext Transfer Protocol Secure (HTTPS) over the past five years, researchers tasked with the improvement of HTTPS must understand each attacks characteristics. However with