5,156 Hits in 4.7 sec

Security SLA Based Monitoring in Clouds

Nesrine Kaaniche, Mohamed Mohamed, Maryline Laurent, Heiko Ludwig
2017 2017 IEEE International Conference on Edge Computing (EDGE)  
Second, it permits to detect data losses, while auditing drive-failure resilience, based on the RAFT protocol introduced in [18] .  ...  Conclusion In this paper, we present an efficient SLA monitoring system for security properties in Clouds based on the rSLA framework.  ... 
doi:10.1109/ieee.edge.2017.20 dblp:conf/edge/KaanicheMLL17 fatcat:iym7tfei3bhfxfltdnlvotpls4

Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing [chapter]

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2012 Lecture Notes in Computer Science  
The paper further reviews the current state of the art of developed IDPSs for cloud computing which uses advanced techniques in overcoming the challenges imposed by cloud computing requirements for more  ...  The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders.  ...  In addition, the central manager is the single point of failure which is not appropriate in cloud computing.  ... 
doi:10.1007/978-3-642-35362-8_33 fatcat:tmq6ndhbojblfdym6g6lsln5ta

An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2013 Journal of Network and Computer Applications  
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders.  ...  and prevent intrusions in cloud computing systems.  ...  Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora-  ... 
doi:10.1016/j.jnca.2012.08.007 fatcat:wwch7wh6wfbw7lt5txnfi7ejiq

Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

Matthew L. Hale, Rose F. Gamble
2017 Requirements Engineering  
The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents.  ...  implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems  ...  Acknowledgements This material is based on research sponsored in part by the Air Force Office of Scientific Research (AFOSR), under Agreement No. FA-9550-09-1-0409.  ... 
doi:10.1007/s00766-017-0287-5 fatcat:2o2ynjgo3reqnkb4o57zxnb3ce

Exploring the association between problem drinking and language use on Facebook in young adults

Davide Marengo, Danny Azucar, Fabrizia Giannotta, Valerio Basile, Michele Settanni
2019 Heliyon  
In the present study, we examined associations between language use on Facebook and problematic alcohol use.  ...  Emerging relationships between text features and offline behaviors may have important implications for alcohol screening purposes in the online environment.  ...  Fig. 1 . 1 Word clouds of LDA topics with top positive correlations with AUDIT-C scores. Fig. 2 . 2 Word clouds of LDA topics with top negative correlations with AUDIT-C scores.  ... 
doi:10.1016/j.heliyon.2019.e02523 pmid:31667380 pmcid:PMC6812202 fatcat:4eec4i546ba6bfzpnzhihmwe4q

An Exploratory Study of Cloud Service Level Agreements - State of the Art Review

2015 KSII Transactions on Internet and Information Systems  
We detailed the life cycle of SLA based on negotiation, different types of SLA, current standards, languages & characteristics, metrics and issues involved in it.  ...  Design of such an agreement must aim for greater profit to providers as well as assured availability of services to consumers.  ...  Auditing ensure the standards compliance in the cloud and prevent regularity issues.  ... 
doi:10.3837/tiis.2015.03.001 fatcat:cerm4thaovaqxohchz572aj6c4

An agent based business aware incident detection system for cloud environments

Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfall, Nathan Clarke
2012 Journal of Cloud Computing: Advances, Systems and Applications  
This makes them unable to address new cloud specific security issues. In this paper we introduce the cloud incident detection system Security Audit as a Service (SAaaS).  ...  A contribution of this paper it to provide a high-level design of the SAaaS architecture, an introduction into the proposed Security Business Flow Language (SBFL), a first prototype of an autonomous agent  ...  Christian Fischer for his support with the performance tests of the SAaaS agents.  ... 
doi:10.1186/2192-113x-1-9 fatcat:bwm5xoqmefg3ri2whlldj2yhqi


Sinju N S .
2014 International Journal of Research in Engineering and Technology  
Good network security protects a network in a manner that is consistent with its purpose and precautions must be taken when choosing a network provider for an organization.  ...  The Intruder Detector and Manager (IDM) algorithm detects and prevents the intruder entering into the network by maintaining tables and reconfigurable virtual network-based countermeasures in order to  ...  RESULT AND ANALYSIS Proposed IDM is better in detecting and preventing DDoS Attacks in cloud IaaS when compared with the existing Attack gragh based alert correlation method.  ... 
doi:10.15623/ijret.2014.0319110 fatcat:2cu2qdfelndtzc5ob6dxpyxx3m

Patient barriers to implantable cardioverter defi brillator implantation for the primary prevention of sudden cardiac death in patients with heart failure and reduced ejection fraction

LL Chan, CP Lim, ST Aung, P Quetua, KL Ho, D Chong, WS Teo, D Sim, CK Ching
2016 Singapore medical journal  
Not surprisingly, knowledge that heart failure with reduced ejection fraction is a risk for SCD and that ICDs help prevent SCD was a predictor for patients who intimated that they might have an ICD implant  ...  In the United States, a recent study at a tertiary hospital showed a 28% ICD implantation rate for the primary prevention of SCD.  ... 
doi:10.11622/smedj.2016072 pmid:27075476 pmcid:PMC4853484 fatcat:djrgdbnjm5dqhhfm2xg546nwhq

Intrusion Detection System – A Study

Vijayarani S, Maria Sylviaa S
2015 International Journal of Security Privacy and Trust Management  
Tremendous growth and usage of internet raises concerns about how to protect and communicate the digital information in a safe manner.  ...  Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms help to detect these attacks.  ...  An Intrusion Prevention System (IPS) is a network security/threat prevention technology that audits network traffic flows to detect and prevent vulnerability exploits.  ... 
doi:10.5121/ijsptm.2015.4104 fatcat:fdabcimrarbmpfwsifmhdxi2ni

QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security

Prasad Saripalli, Ben Walters
2010 2010 IEEE 3rd International Conference on Cloud Computing  
in a defensible manner.  ...  Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories.  ...  ACKNOWLEDGMENT We are thankful to the security engineering teams at SAN, FIPS, ENISA and UC Berkeley, whose findings were helpful to our work, and Runaware Inc (R&D) for its sponsorship.  ... 
doi:10.1109/cloud.2010.22 dblp:conf/IEEEcloud/SaripalliW10 fatcat:fsngen5xkzctdcmwg4hzgxfsoa

A survey on security issues and solutions at different layers of Cloud computing

Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan
2012 Journal of Supercomputing  
Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existent in these protocols as well as threats introduced by newer architectures  ...  In this paper, we survey factors affecting Cloud computing adoption, vulnerabilities,and attacks, and identify relevant solution directives to strengthen security and privacyin Cloud environment.  ...  [56] presented an ontology-based Semantic Access Control Policy Language (SACPL) for describing access control policies (ACPs) in cloud computing environment.  ... 
doi:10.1007/s11227-012-0831-5 fatcat:mj7kwrsbqnedhjbw72wbtjwfve

A Survey of the State of Cloud Security

Sanjay P. Ahuja, Deepa Komathukattil
2012 Network and Communication Technologies  
Cloud computing has emerged as an important paradigm in computing today with the potential to offer scalable, fault tolerant services and reduce costs significantly.  ...  The multitenant nature of the cloud and the fact that data is stored in multiple locations compound these security concerns.  ...  Acknowledgement This research has been supported by the Fidelity National Financial Distinguished Professorship in Computer and Information Sciences.  ... 
doi:10.5539/nct.v1n2p66 fatcat:k7zrcg3ukza6bin6p6tgoxwixq

Validating Cloud Infrastructure Changes by Cloud Audits

Frank Doelitzscher, Christian Fischer, Denis Moskal, Christoph Reich, Martin Knahl, Nathan Clarke
2012 2012 IEEE Eighth World Congress on Services  
an audit report.  ...  In this paper we present a prototype demonstration of the Security Audit as a Service (SAaaS) architecture, a cloud audit system which aims to increase trust in cloud infrastructures by introducing more  ...  ACKNOWLEDGMENT This research is supported by the German Federal Ministry of Education and Research (BMBF) through the research grant number 01BY1116.  ... 
doi:10.1109/services.2012.12 dblp:conf/services/DolitzscherFMRKC12 fatcat:t6ascy4iivgbznbyqgy5vo7fj4

Accountability as a Service for the Cloud

Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic
2010 2010 IEEE International Conference on Services Computing  
Therefore the Cloud's enormous capacity with comparable low cost makes it an ideal platform for SOA deployment.  ...  Computing resource provisioning through the use of the Cloud computing paradigm has triggered revolutions in modern day computing. It is a new paradigm for deploying services on rented machines.  ...  It can be seen even in this simple example that a mechanism is required to prevent this "buck passing" or denial of failure.  ... 
doi:10.1109/scc.2010.83 dblp:conf/IEEEscc/YaoCWLZ10 fatcat:ctdgtsc5yfgu7aypm54w3rd35y
« Previous Showing results 1 — 15 out of 5,156 results