CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
Because of the rapid increasing of malware attacks on the Internet of Things in recent years,
it is critical for resource‐constrained devices to guard against potential risks. The traditional …
it is critical for resource‐constrained devices to guard against potential risks. The traditional …
Fine-grained access control in the era of cloud computing: An analytical review
Access control is one of the imperative defense frontlines for digital computing environments
especially for pervasive computing environments such as cloud computing and the internet …
especially for pervasive computing environments such as cloud computing and the internet …
Efficient provisioning of security service function chaining using network security defense patterns
A Shameli-Sendi, Y Jarraya… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Network functions virtualization intertwined with software-defined networking opens up great
opportunities for flexible provisioning and composition of network functions, known as …
opportunities for flexible provisioning and composition of network functions, known as …
A survey on self-adaptive security for large-scale open environments
Contemporary software systems operate in heterogeneous, dynamic, and distributed
environments, where security needs change at runtime. The security solutions for such …
environments, where security needs change at runtime. The security solutions for such …
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities
grows at the same pace; the distributed nature of the cloud makes it an attractive target for …
grows at the same pace; the distributed nature of the cloud makes it an attractive target for …
Taxonomy and classification of access control models for cloud environments
A Majumder, S Namasudra, S Nath - … Rise of the Cloud: Advances and …, 2014 - Springer
Cloud computing is an emerging and highly attractive technology due to its inherent
efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But …
efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But …
Malware analysis in cloud computing: Network and system characteristics
AK Marnerides, MR Watson, N Shirazi… - 2013 IEEE globecom …, 2013 - ieeexplore.ieee.org
The deployment of cloud computing environments is increasingly common, and we are
implicitly reliant on them for many services. However, their dependence on virtualised …
implicitly reliant on them for many services. However, their dependence on virtualised …
A cloud-based platform to ensure interoperability in aerospace industry
M Khalfallah, N Figay, C Ferreira Da Silva… - Journal of Intelligent …, 2016 - Springer
A new approach is proposed to address several key issues relating to interoperability for
collaborative product development within networked organizations. The work innovatively …
collaborative product development within networked organizations. The work innovatively …
Enhanced cloud security by combining virtualization and policy monitoring techniques
B Loganayagi, S Sujatha - Procedia Engineering, 2012 - Elsevier
Cloud Computing is accessing Services through Internet based on pay per usage model.
Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service …
Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service …
[PDF][PDF] A gateway-based access control scheme for collaborative clouds
A collaborative cloud, formed by private enterprise clouds, is usually task-oriented and
tightly correlated. It brings new ways to build and manage computing systems in terms of …
tightly correlated. It brings new ways to build and manage computing systems in terms of …