Abstract | ||
---|---|---|
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by the lack of transparency and accountability, which has traditionally been ensured through security auditing techniques. Auditing in cloud poses many unique challe... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2017.2779444 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Cloud computing,Runtime,Access control,Authentication,Standards,Time factors | Computer vision,Audit,Computer security,Computer science,Software security assurance,Service provider,Security properties,Artificial intelligence,Certification,Vulnerability,Cloud computing | Journal |
Volume | Issue | ISSN |
13 | 5 | 1556-6013 |
Citations | PageRank | References |
2 | 0.36 | 0 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Suryadipta Majumdar | 1 | 26 | 5.26 |
Taous Madi | 2 | 93 | 5.51 |
Yu-shun Wang | 3 | 140 | 31.90 |
Yosr Jarraya | 4 | 173 | 14.52 |
Makan Pourzandi | 5 | 216 | 28.31 |
Lingyu Wang | 6 | 1440 | 121.43 |
Mourad Debbabi | 7 | 1467 | 144.47 |