A taxonomy and survey of cloud resource orchestration techniques

D Weerasiri, MC Barukh, B Benatallah… - ACM Computing …, 2017 - dl.acm.org
Cloud services and applications prove indispensable amid today's modern utility-based
computing. The cloud has displayed a disruptive and growing impact on everyday …

Cloud computing security taxonomy: From an atomistic to a holistic view

SN Mthunzi, E Benkhelifa, T Bosakowski… - Future Generation …, 2020 - Elsevier
Countless discussions around security challenges affecting cloud computing are often large
textual accounts, which can be cumbersome to read and prone to misinterpretation. The …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …

[图书][B] Effective cybersecurity: a guide to using best practices and standards

W Stallings - 2018 - books.google.com
In Effective Cybersecurity, William Stallings introduces the technology, operational
procedures, and management practices needed for successful cybersecurity. Stallings …

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …

Review of human decision-making during computer security incident analysis

JM Spring, P Illari - Digital Threats: Research and Practice, 2021 - dl.acm.org
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …

Network-based secret communication in clouds: A survey

J Ullrich, T Zseby, J Fabini… - … communications surveys & …, 2017 - ieeexplore.ieee.org
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …

Comparative analysis of cloud security classifications, taxonomies, and ontologies

S Maroc, J Zhang - Proceedings of the 2019 International Conference on …, 2019 - dl.acm.org
Various classifications have been proposed to describe and organize the cloud security
landscape. While some are inherited from general security concepts like security attributes …

Cloud Computing.: Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor Innentäter-Angriffen de lege lata und de lege ferenda.

D Müller - 2020 - torrossa.com
Cloud Computing. Strafrechtlicher Schutz privater und geschäftlicher Nutzerdaten vor
Innentäter-Angriffen de lege lata und de Page 1 Internetrecht und Digitale Gesellschaft Band 22 …

[PDF][PDF] Strategies for Securing Cloud Services

OB Olushola - IOSR Journal of Computer Engineering (IOSR-JCE), 2020 - academia.edu
The security of cloud services has become very necessary due to the huge demand for
cloud services because of its versatile applications. The security factor in cloud computing …