[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Panneerselvam et al., 2012 - Google Patents

An investigation of the effect of cloud computing on network management

Panneerselvam et al., 2012

View PDF
Document ID
3665820219173298566
Author
Panneerselvam J
Liu L
Hill R
Zhan Y
Liu W
Publication year
Publication venue
2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems

External Links

Snippet

Cloud computing is one of the fascinating advancements in the computing technology. With its fashionable features, cloud deployment is well spread in a wide range of applications. Managing the cloud environment is a complex process because of the virtual nature of the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
Bhat et al. Edge computing and its convergence with blockchain in 5G and beyond: Security, challenges, and opportunities
US11438421B2 (en) Accessing resources in a remote access or cloud-based network environment
US10331882B2 (en) Tracking and managing virtual desktops using signed tokens
EP3669514A1 (en) Tenant management method and system in a cloud computing environment
CN111164571A (en) Secure processing based control plane function virtualization in cloud systems
Raza et al. Cloud and fog computing: A survey to the concept and challenges
US10243959B1 (en) Secure cloud computing framework
Singh et al. Overview of security issues in cloud computing
Ullrich et al. Network-based secret communication in clouds: A survey
CN111818081B (en) Virtual encryption machine management method, device, computer equipment and storage medium
Panneerselvam et al. An investigation of the effect of cloud computing on network management
CN113923023A (en) Authority configuration and data processing method, device, electronic equipment and medium
Sharma et al. Cloud computing—security, issues, and solutions
Mohanty et al. CIA Triad for Achieving Accountability in Cloud Computing Environment
Rahman et al. Blockchain-enabled SLA compliance for crowdsourced edge-based network function virtualization
Mladenov et al. Studying the effect of internal DOS attacks over SDN controller during switch registration process
Devi et al. Study of architecture and issues in services of cloud computing
CN113849558B (en) Method and device for deploying data sharing service
Abdellaoui et al. A security scheme for mobile cloud using multi-agents system
Waqas et al. ReSA: Architecture for resources sharing between clouds
Karim et al. Securing the fog using software-defined networking: A study of challenges, approaches, and open problems
Kim et al. Mobile-based dos attack security agent in sensor networking
Singh et al. Security and Privacy Aspects of Authorized and Secure Communications in Dew-Assisted IoT Systems
Kumar et al. Cloud security based on IaaS model prospective
Thakur et al. A Review Paper on Cloud Computing & Security Issue