Abstract | ||
---|---|---|
Although the deployment of TLS has been of great importance to its users in preventing eavesdroppers from reading personal data, it also prevents intrusion detection systems (IDSs) from completing their own tasks, as they are, in essence, eavesdroppers themselves. Cloud providers specifically are at risk because of the pure mass of data they accrue over the many applications they serve, so they ha... |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/MCC.2015.100 | IEEE Cloud Computing |
Keywords | Field | DocType |
Cloud computing,Virtual machining,Ciphers,Operating systems,Forensics,Random access memory | Virtual machine introspection,Software deployment,Virtual machine,Temporal isolation among virtual machines,Computer security,Computer science,Intrusion detection system,Public-key cryptography,Cloud computing,The Internet | Journal |
Volume | Issue | ISSN |
2 | 5 | 2325-6095 |
Citations | PageRank | References |
1 | 0.37 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
John T. Saxon | 1 | 3 | 1.13 |
Behzad Bordbar | 2 | 714 | 52.94 |
Keith Harrison | 3 | 17 | 1.56 |