[go: up one dir, main page]

Modi et al., 2013 - Google Patents

A survey on security issues and solutions at different layers of Cloud computing

Modi et al., 2013

View PDF
Document ID
3832246104124030962
Author
Modi C
Patel D
Borisaniya B
Patel A
Rajarajan M
Publication year
Publication venue
The journal of supercomputing

External Links

Snippet

Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existing in these …
Continue reading at openaccess.city.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Yu et al. A survey on security issues in services communication of Microservices‐enabled fog applications
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Cheng et al. Radiatus: a shared-nothing server-side web architecture
Islam et al. A classification and characterization of security threats in cloud computing
Kazim et al. A survey on top security threats in cloud computing
Sengupta et al. Cloud computing security--trends and research directions
You et al. Security issues and solutions in cloud computing
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Gupta et al. Taxonomy of cloud security
Shajan et al. Survey of security threats and countermeasures in cloud computing
Marshall et al. Security best practices for developing windows azure applications
Pattnaik et al. Security paradigms in cloud computing
Lemoudden et al. A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms.
Ennajjar et al. Security in cloud computing approaches and solutions
Kazim et al. Threat modeling for services in cloud
Sharma et al. Cloud computing risks and recommendations for security
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
Nazir et al. Security threats with associated mitigation techniques in cloud computing
Faizi et al. Secured Cloud for Enterprise Computing.
Ait Ouahman Security and privacy issues in cloud computing
Akinbi et al. Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure
Borazjani Security issues in cloud computing
Pandey Security attacks in cloud computing