[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Security-as-a-service: a literature review
W Wang, S Yongchareon - International Journal of Web Information …, 2020 - emerald.com
Purpose This study aims to identify the level of security from existing work, analyze
categories of security as a service (SECaaS) and classify them into a meaningful set of …
categories of security as a service (SECaaS) and classify them into a meaningful set of …
Secure encryption key management as a SecaaS based on Chinese wall security policy
Cloud computing has become very popular and many mobile IT users are accessing
business data and services without going through corporate networks. In this context the …
business data and services without going through corporate networks. In this context the …
A Survey on Security as a Service
W Wang, S Yongchareon - … Conference, Puschino, Russia, October 7-11 …, 2017 - Springer
Abstract Security as a Service (SECaaS) has been demonstrated to be one of the
increasingly popular ways to address security problems in Cloud Computing but still not very …
increasingly popular ways to address security problems in Cloud Computing but still not very …
[PDF][PDF] Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications.
The emergence of the cloud computing paradigm has influenced business organizations for
migration over two decades. This has enabled a more incredible communication speed …
migration over two decades. This has enabled a more incredible communication speed …
[PDF][PDF] Algorithmic Detection of Cyber Threats: Integrating Machine Learning into Modern Security Innovations
A Ali - 2024 - researchgate.net
The rapid evolution of cyber threats has necessitated the development of sophisticated
detection mechanisms that can respond to increasingly complex attack vectors. Algorithmic …
detection mechanisms that can respond to increasingly complex attack vectors. Algorithmic …
Access management solution to corporate service
J Hyytiäinen - 2024 - aaltodoc.aalto.fi
This master's thesis introduces identity and access management methods as part of IT
security activities, examines how different identity and access management methods are …
security activities, examines how different identity and access management methods are …
[PDF][PDF] Advancements in Algorithmic Detection: A New Frontier in Cybersecurity Innovations
A Elson - 2024 - researchgate.net
The rapid evolution of cyber threats necessitates the adoption of advanced detection
mechanisms that can effectively identify and mitigate security risks." Advancements in …
mechanisms that can effectively identify and mitigate security risks." Advancements in …
[PDF][PDF] Cyber Threat Analysis and the Development of Proactive Security Strategies for Risk Mitigation
F Dine - 2024 - researchgate.net
In the rapidly evolving digital landscape, cyber threats have become increasingly
sophisticated, posing significant risks to organizations and their assets. Cyber threat …
sophisticated, posing significant risks to organizations and their assets. Cyber threat …
Usage-based access control for cloud applications
Abstract The Cloud technology takes Service Oriented Architecture to the next level, where
applications and infrastructure can be outsourced over the internet. It affords flexibility to …
applications and infrastructure can be outsourced over the internet. It affords flexibility to …