[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sandhu et al., 2010 - Google Patents

Towards a discipline of mission-aware cloud computing

Sandhu et al., 2010

View PDF
Document ID
5123945908021775328
Author
Sandhu R
Boppana R
Krishnan R
Reich J
Wolff T
Zachry J
Publication year
Publication venue
Proceedings of the 2010 ACM workshop on Cloud computing security workshop

External Links

Snippet

Even as cloud computing gains rapid traction in the commercial marketplace the twin concerns of availability and security remain paramount to potential customers, especially in the enterprise. Concurrently the vision of what cyber security means is itself changing. The …
Continue reading at profsandhu.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
El Kafhali et al. Security threats, defense mechanisms, challenges, and future directions in cloud computing
Pan et al. Cybersecurity challenges and opportunities in the new" edge computing+ iot" world
Singh et al. Cloud security issues and challenges: A survey
Bhathal et al. Big Data: Hadoop framework vulnerabilities, security issues and attacks
AlJahdali et al. Multi-tenancy in cloud computing
Lombardi et al. Secure virtualization for cloud computing
You et al. Security issues and solutions in cloud computing
Sandhu et al. Towards a discipline of mission-aware cloud computing
RU2584506C1 (en) System and method of protecting operations with electronic money
WO2017210005A1 (en) Systems and methods for detecting attacks in big data systems
Alani Elements of cloud computing security: A survey of key practicalities
Bokhari et al. Security and privacy issues in cloud computing
Man et al. A collaborative intrusion detection system framework for cloud computing
Gupta et al. A light weight centralized file monitoring approach for securing files in cloud environment
Zhang et al. Protecting private cloud located within public cloud
Alani et al. Security threats in cloud computing
Mehresh et al. Surviving advanced persistent threats in a distributed environment–Architecture and analysis
Salvakkam et al. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage
Balasubramanian et al. Security problems and possible security approaches in cloud computing
Konoplev et al. Tasks of providing information security in distributed computing networks
AlMutair et al. A new virtualization-based security architecture in a cloud computing environment
Patidar et al. An efficient approach for cloud computing based on hierarchical secure paravirtualization system resource model
Zhang Detection and mitigation of security threats in cloud computing
Blanc et al. Mandatory access control with a multi-level reference monitor: PIGA-cluster
Sukhija et al. Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges