Customized Network Security for Cloud Service
نویسندگان
چکیده
منابع مشابه
Effective Service Security Schemes In Cloud Computing
The cloud computing is the fastest growing concept in IT industry. The IT companies have realized that the cloud computing is going to be the hottest topic in the field of IT. Cloud Computing reduces cost by sharing computing and storage resources, merged with an on demand provisioning mechanism relying on a pay-per use business model. Due to varied degree of security features and management sc...
متن کاملMonitoring-Based Certification of Cloud Service Security
In this paper, we present a novel approach to cloud service security certification. This approach could be used to: (a) define and execute automatically certification models, which can continuously and incrementally acquire and analyse evidence regarding the provision of services on cloud infrastructures through continuous monitoring; (b) use this evidence to assess whether the provision is com...
متن کاملIntegrating Security Services in Cloud Service Stores
Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business, and a fundamental element of both national and corporate cyber-security and Cloud strategies. Yet, Cloud IaaS and PaaS providers typically hold Cloud consumers accountable for protecting thei...
متن کاملCloud-Aware Web Service Security: Information Hiding in Cloud Computing
This study concerns the security challenges that the people face in the usage and implementation of cloud computing. Despite its growth in the past few decades, this platform has experienced different challenges. They all arise from the concern of data safety that the nature of sharing in the cloud presents. This paper looks to identify the benefits of using a cloud computing platform and the i...
متن کاملA Cloud - based Resource and Service Sharing Platform for Computer and Network Security Education
1. Automated Reasoning about Web Access Control Policies via Answer Set Programming Gail-Joon Ahn*, Joohyung Lee*, Hongxin Hu and Yunsong Meng Summary: We introduce a logic-based policy management approach for XACML (eXtensible Access Control Markup Language), which has become the defacto standard for specifying and enforcing access control policies for various applications and services in curr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Services Computing
سال: 2020
ISSN: 1939-1374,2372-0204
DOI: 10.1109/tsc.2017.2725828