Modi et al., 2013 - Google Patents
A survey on security issues and solutions at different layers of Cloud computingModi et al., 2013
View PDF- Document ID
- 3832246104124030962
- Author
- Modi C
- Patel D
- Borisaniya B
- Patel A
- Rajarajan M
- Publication year
- Publication venue
- The journal of supercomputing
External Links
Snippet
Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existing in these …
- 238000000034 method 0 description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
Yu et al. | A survey on security issues in services communication of Microservices‐enabled fog applications | |
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
Cheng et al. | Radiatus: a shared-nothing server-side web architecture | |
Islam et al. | A classification and characterization of security threats in cloud computing | |
Kazim et al. | A survey on top security threats in cloud computing | |
Sengupta et al. | Cloud computing security--trends and research directions | |
You et al. | Security issues and solutions in cloud computing | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Gupta et al. | Taxonomy of cloud security | |
Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
Marshall et al. | Security best practices for developing windows azure applications | |
Pattnaik et al. | Security paradigms in cloud computing | |
Lemoudden et al. | A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Kazim et al. | Threat modeling for services in cloud | |
Sharma et al. | Cloud computing risks and recommendations for security | |
Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
Faizi et al. | Secured Cloud for Enterprise Computing. | |
Ait Ouahman | Security and privacy issues in cloud computing | |
Akinbi et al. | Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure | |
Borazjani | Security issues in cloud computing | |
Pandey | Security attacks in cloud computing |