On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Automation for network security configuration: state of the art and research trends
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …
consequence of novel architectural paradigms such as the Internet of Things and network …
RETRACTED ARTICLE: Analysis of security issues of cloud-based web applications
S Mishra, SK Sharma, MA Alowaidi - Journal of Ambient Intelligence and …, 2021 - Springer
The Cloud computing is a powerful tool to optimize the cost in terms of hardware,
controllable, utility to sharing the data, due to abovementioned features most of the …
controllable, utility to sharing the data, due to abovementioned features most of the …
A kubernetes ci/cd pipeline with asylo as a trusted execution environment abstraction framework
Modern commercial software development organizations frequently prescribe to a
development and deployment pattern for releases known as continuous …
development and deployment pattern for releases known as continuous …
Toward automated security analysis and enforcement for cloud computing using graphical models for security
S An, A Leung, JB Hong, T Eom, JS Park - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud …
improved performance at a fraction of the operational costs and complexity. The rise of cloud …
[HTML][HTML] Evaluation of time-based virtual machine migration as moving target defense against host-based attacks
Abstract Moving Target Defense (MTD) consists of applying dynamic reconfiguration in the
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …
Short paper: Automatic configuration for an optimal channel protection in virtualized networks
Data confidentiality, integrity and authentication are security properties which are often
enforced with the generation of secure channels, such as Virtual Private Networks, over …
enforced with the generation of secure channels, such as Virtual Private Networks, over …
A literature survey of security issues in Cloud, Fog, and Edge IT infrastructure
Increasing complexity in and interconnectivity between technologies and systems (eg, cloud
computing, Internet of Things (IoT), fog and edge computing) can complicate data …
computing, Internet of Things (IoT), fog and edge computing) can complicate data …
Intrusion Injection for Virtualized Systems: Concepts and Approach
CF Gonçalves, N Antunes… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
Virtualization is drawing attention due to countless benefits, leaving Hypervisors with the
paramount responsibility for performance, dependability, and security. However, while there …
paramount responsibility for performance, dependability, and security. However, while there …
Detecting anomalies through sequential performance analysis in virtualized environments
Virtualization enables cloud computing, allowing for server consolidation with cost reduction.
It also introduces new challenges in terms of security and isolation, which are deterrents for …
It also introduces new challenges in terms of security and isolation, which are deterrents for …