Abstract | ||
---|---|---|
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/ICOIN.2013.6496425 | ICOIN |
Keywords | Field | DocType |
security tactics,attributed based access control,honeypot,secured cloud computing resource,cloud computing resource security,multistage anomaly detection scheme,resource allocation,multi-stage anomaly detection,authorisation,safety future service,cloud computing,attribute-based access control,security tactic | Anomaly detection,Honeypot,Computer science,Computer security,Computer network,Cloud computing security,Resource allocation,Utility computing,Access control,Cloud testing,Cloud computing | Conference |
ISSN | ISBN | Citations |
1976-7684 E-ISBN : 978-1-4673-5741-8 | 978-1-4673-5741-8 | 0 |
PageRank | References | Authors |
0.34 | 4 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
ByungRae Cha | 1 | 51 | 14.59 |
Jongwon Kim | 2 | 1042 | 153.38 |