Sandhu et al., 2010 - Google Patents
Towards a discipline of mission-aware cloud computingSandhu et al., 2010
View PDF- Document ID
- 5123945908021775328
- Author
- Sandhu R
- Boppana R
- Krishnan R
- Reich J
- Wolff T
- Zachry J
- Publication year
- Publication venue
- Proceedings of the 2010 ACM workshop on Cloud computing security workshop
External Links
Snippet
Even as cloud computing gains rapid traction in the commercial marketplace the twin concerns of availability and security remain paramount to potential customers, especially in the enterprise. Concurrently the vision of what cyber security means is itself changing. The …
- 238000003327 Mission assurance 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
El Kafhali et al. | Security threats, defense mechanisms, challenges, and future directions in cloud computing | |
Pan et al. | Cybersecurity challenges and opportunities in the new" edge computing+ iot" world | |
Singh et al. | Cloud security issues and challenges: A survey | |
Bhathal et al. | Big Data: Hadoop framework vulnerabilities, security issues and attacks | |
AlJahdali et al. | Multi-tenancy in cloud computing | |
Lombardi et al. | Secure virtualization for cloud computing | |
You et al. | Security issues and solutions in cloud computing | |
Sandhu et al. | Towards a discipline of mission-aware cloud computing | |
RU2584506C1 (en) | System and method of protecting operations with electronic money | |
WO2017210005A1 (en) | Systems and methods for detecting attacks in big data systems | |
Alani | Elements of cloud computing security: A survey of key practicalities | |
Bokhari et al. | Security and privacy issues in cloud computing | |
Man et al. | A collaborative intrusion detection system framework for cloud computing | |
Gupta et al. | A light weight centralized file monitoring approach for securing files in cloud environment | |
Zhang et al. | Protecting private cloud located within public cloud | |
Alani et al. | Security threats in cloud computing | |
Mehresh et al. | Surviving advanced persistent threats in a distributed environment–Architecture and analysis | |
Salvakkam et al. | MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage | |
Balasubramanian et al. | Security problems and possible security approaches in cloud computing | |
Konoplev et al. | Tasks of providing information security in distributed computing networks | |
AlMutair et al. | A new virtualization-based security architecture in a cloud computing environment | |
Patidar et al. | An efficient approach for cloud computing based on hierarchical secure paravirtualization system resource model | |
Zhang | Detection and mitigation of security threats in cloud computing | |
Blanc et al. | Mandatory access control with a multi-level reference monitor: PIGA-cluster | |
Sukhija et al. | Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges |