On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Automation for network security configuration: state of the art and research trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023 - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

RETRACTED ARTICLE: Analysis of security issues of cloud-based web applications

S Mishra, SK Sharma, MA Alowaidi - Journal of Ambient Intelligence and …, 2021 - Springer
The Cloud computing is a powerful tool to optimize the cost in terms of hardware,
controllable, utility to sharing the data, due to abovementioned features most of the …

A kubernetes ci/cd pipeline with asylo as a trusted execution environment abstraction framework

J Mahboob, J Coffman - 2021 IEEE 11th Annual Computing …, 2021 - ieeexplore.ieee.org
Modern commercial software development organizations frequently prescribe to a
development and deployment pattern for releases known as continuous …

Toward automated security analysis and enforcement for cloud computing using graphical models for security

S An, A Leung, JB Hong, T Eom, JS Park - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud …

[HTML][HTML] Evaluation of time-based virtual machine migration as moving target defense against host-based attacks

M Torquato, P Maciel, M Vieira - Journal of Systems and Software, 2025 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying dynamic reconfiguration in the
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …

Short paper: Automatic configuration for an optimal channel protection in virtualized networks

D Bringhenti, G Marchetto, R Sisto… - Proceedings of the 2nd …, 2020 - dl.acm.org
Data confidentiality, integrity and authentication are security properties which are often
enforced with the generation of secure channels, such as Virtual Private Networks, over …

A literature survey of security issues in Cloud, Fog, and Edge IT infrastructure

P Akello, NL Beebe, KKR Choo - Electronic Commerce Research, 2022 - Springer
Increasing complexity in and interconnectivity between technologies and systems (eg, cloud
computing, Internet of Things (IoT), fog and edge computing) can complicate data …

Intrusion Injection for Virtualized Systems: Concepts and Approach

CF Gonçalves, N Antunes… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
Virtualization is drawing attention due to countless benefits, leaving Hypervisors with the
paramount responsibility for performance, dependability, and security. However, while there …

Detecting anomalies through sequential performance analysis in virtualized environments

CF Gonçalves, DS Menasché, A Avritzer… - IEEE …, 2023 - ieeexplore.ieee.org
Virtualization enables cloud computing, allowing for server consolidation with cost reduction.
It also introduces new challenges in terms of security and isolation, which are deterrents for …