A taxonomy and survey of cloud resource orchestration techniques
Cloud services and applications prove indispensable amid today's modern utility-based
computing. The cloud has displayed a disruptive and growing impact on everyday …
computing. The cloud has displayed a disruptive and growing impact on everyday …
Cloud computing security taxonomy: From an atomistic to a holistic view
SN Mthunzi, E Benkhelifa, T Bosakowski… - Future Generation …, 2020 - Elsevier
Countless discussions around security challenges affecting cloud computing are often large
textual accounts, which can be cumbersome to read and prone to misinterpretation. The …
textual accounts, which can be cumbersome to read and prone to misinterpretation. The …
Systematic identification of threats in the cloud: A survey
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …
[图书][B] Effective cybersecurity: a guide to using best practices and standards
W Stallings - 2018 - books.google.com
In Effective Cybersecurity, William Stallings introduces the technology, operational
procedures, and management practices needed for successful cybersecurity. Stallings …
procedures, and management practices needed for successful cybersecurity. Stallings …
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …
as a service over the Internet. The major motivation behind the cloud setup is economic …
Review of human decision-making during computer security incident analysis
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …
Network-based secret communication in clouds: A survey
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …
cloud environments. But this transition comes at a cost: security and privacy solutions have …
Comparative analysis of cloud security classifications, taxonomies, and ontologies
S Maroc, J Zhang - Proceedings of the 2019 International Conference on …, 2019 - dl.acm.org
Various classifications have been proposed to describe and organize the cloud security
landscape. While some are inherited from general security concepts like security attributes …
landscape. While some are inherited from general security concepts like security attributes …
Cloud Computing.: Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor Innentäter-Angriffen de lege lata und de lege ferenda.
D Müller - 2020 - torrossa.com
Cloud Computing. Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …
[PDF][PDF] Strategies for Securing Cloud Services
OB Olushola - IOSR Journal of Computer Engineering (IOSR-JCE), 2020 - academia.edu
The security of cloud services has become very necessary due to the huge demand for
cloud services because of its versatile applications. The security factor in cloud computing …
cloud services because of its versatile applications. The security factor in cloud computing …