Title
Security tactics for secured cloud computing resources
Abstract
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Year
DOI
Venue
2013
10.1109/ICOIN.2013.6496425
ICOIN
Keywords
Field
DocType
security tactics,attributed based access control,honeypot,secured cloud computing resource,cloud computing resource security,multistage anomaly detection scheme,resource allocation,multi-stage anomaly detection,authorisation,safety future service,cloud computing,attribute-based access control,security tactic
Anomaly detection,Honeypot,Computer science,Computer security,Computer network,Cloud computing security,Resource allocation,Utility computing,Access control,Cloud testing,Cloud computing
Conference
ISSN
ISBN
Citations 
1976-7684 E-ISBN : 978-1-4673-5741-8
978-1-4673-5741-8
0
PageRank 
References 
Authors
0.34
4
2
Name
Order
Citations
PageRank
ByungRae Cha15114.59
Jongwon Kim21042153.38