A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security SLA Based Monitoring in Clouds
2017
2017 IEEE International Conference on Edge Computing (EDGE)
Second, it permits to detect data losses, while auditing drive-failure resilience, based on the RAFT protocol introduced in [18] . ...
Conclusion In this paper, we present an efficient SLA monitoring system for security properties in Clouds based on the rSLA framework. ...
doi:10.1109/ieee.edge.2017.20
dblp:conf/edge/KaanicheMLL17
fatcat:iym7tfei3bhfxfltdnlvotpls4
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing
[chapter]
2012
Lecture Notes in Computer Science
The paper further reviews the current state of the art of developed IDPSs for cloud computing which uses advanced techniques in overcoming the challenges imposed by cloud computing requirements for more ...
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. ...
In addition, the central manager is the single point of failure which is not appropriate in cloud computing. ...
doi:10.1007/978-3-642-35362-8_33
fatcat:tmq6ndhbojblfdym6g6lsln5ta
An intrusion detection and prevention system in cloud computing: A systematic review
2013
Journal of Network and Computer Applications
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. ...
and prevent intrusions in cloud computing systems. ...
Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora- ...
doi:10.1016/j.jnca.2012.08.007
fatcat:wwch7wh6wfbw7lt5txnfi7ejiq
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
2017
Requirements Engineering
The approach is demonstrated following a case study of all audit-related controls in the SP-800-53, ISO 15408-2, and related documents. ...
implications for their systems, (b) formally represent their systems and demonstrate that they meet the extracted requirements following an accreditation process, and (c) ensure that all third-party systems ...
Acknowledgements This material is based on research sponsored in part by the Air Force Office of Scientific Research (AFOSR), under Agreement No. FA-9550-09-1-0409. ...
doi:10.1007/s00766-017-0287-5
fatcat:2o2ynjgo3reqnkb4o57zxnb3ce
Exploring the association between problem drinking and language use on Facebook in young adults
2019
Heliyon
In the present study, we examined associations between language use on Facebook and problematic alcohol use. ...
Emerging relationships between text features and offline behaviors may have important implications for alcohol screening purposes in the online environment. ...
Fig. 1 . 1 Word clouds of LDA topics with top positive correlations with AUDIT-C scores.
Fig. 2 . 2 Word clouds of LDA topics with top negative correlations with AUDIT-C scores. ...
doi:10.1016/j.heliyon.2019.e02523
pmid:31667380
pmcid:PMC6812202
fatcat:4eec4i546ba6bfzpnzhihmwe4q
An Exploratory Study of Cloud Service Level Agreements - State of the Art Review
2015
KSII Transactions on Internet and Information Systems
We detailed the life cycle of SLA based on negotiation, different types of SLA, current standards, languages & characteristics, metrics and issues involved in it. ...
Design of such an agreement must aim for greater profit to providers as well as assured availability of services to consumers. ...
Auditing ensure the standards compliance in the cloud and prevent regularity issues. ...
doi:10.3837/tiis.2015.03.001
fatcat:cerm4thaovaqxohchz572aj6c4
An agent based business aware incident detection system for cloud environments
2012
Journal of Cloud Computing: Advances, Systems and Applications
This makes them unable to address new cloud specific security issues. In this paper we introduce the cloud incident detection system Security Audit as a Service (SAaaS). ...
A contribution of this paper it to provide a high-level design of the SAaaS architecture, an introduction into the proposed Security Business Flow Language (SBFL), a first prototype of an autonomous agent ...
Christian Fischer for his support with the performance tests of the SAaaS agents. ...
doi:10.1186/2192-113x-1-9
fatcat:bwm5xoqmefg3ri2whlldj2yhqi
SECURE INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL SYSTEM USING IDM
2014
International Journal of Research in Engineering and Technology
Good network security protects a network in a manner that is consistent with its purpose and precautions must be taken when choosing a network provider for an organization. ...
The Intruder Detector and Manager (IDM) algorithm detects and prevents the intruder entering into the network by maintaining tables and reconfigurable virtual network-based countermeasures in order to ...
RESULT AND ANALYSIS Proposed IDM is better in detecting and preventing DDoS Attacks in cloud IaaS when compared with the existing Attack gragh based alert correlation method. ...
doi:10.15623/ijret.2014.0319110
fatcat:2cu2qdfelndtzc5ob6dxpyxx3m
Patient barriers to implantable cardioverter defi brillator implantation for the primary prevention of sudden cardiac death in patients with heart failure and reduced ejection fraction
2016
Singapore medical journal
Not surprisingly, knowledge that heart failure with reduced ejection fraction is a risk for SCD and that ICDs help prevent SCD was a predictor for patients who intimated that they might have an ICD implant ...
In the United States, a recent study at a tertiary hospital showed a 28% ICD implantation rate for the primary prevention of SCD. ...
doi:10.11622/smedj.2016072
pmid:27075476
pmcid:PMC4853484
fatcat:djrgdbnjm5dqhhfm2xg546nwhq
Intrusion Detection System – A Study
2015
International Journal of Security Privacy and Trust Management
Tremendous growth and usage of internet raises concerns about how to protect and communicate the digital information in a safe manner. ...
Nowadays, hackers use different types of attacks for getting the valuable information. Many intrusion detection techniques, methods and algorithms help to detect these attacks. ...
An Intrusion Prevention System (IPS) is a network security/threat prevention technology that audits network traffic flows to detect and prevent vulnerability exploits. ...
doi:10.5121/ijsptm.2015.4104
fatcat:fdabcimrarbmpfwsifmhdxi2ni
QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security
2010
2010 IEEE 3rd International Conference on Cloud Computing
in a defensible manner. ...
Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories. ...
ACKNOWLEDGMENT We are thankful to the security engineering teams at SAN, FIPS, ENISA and UC Berkeley, whose findings were helpful to our work, and Runaware Inc (R&D) for its sponsorship. ...
doi:10.1109/cloud.2010.22
dblp:conf/IEEEcloud/SaripalliW10
fatcat:fsngen5xkzctdcmwg4hzgxfsoa
A survey on security issues and solutions at different layers of Cloud computing
2012
Journal of Supercomputing
Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existent in these protocols as well as threats introduced by newer architectures ...
In this paper, we survey factors affecting Cloud computing adoption, vulnerabilities,and attacks, and identify relevant solution directives to strengthen security and privacyin Cloud environment. ...
[56] presented an ontology-based Semantic Access Control Policy Language (SACPL) for describing access control policies (ACPs) in cloud computing environment. ...
doi:10.1007/s11227-012-0831-5
fatcat:mj7kwrsbqnedhjbw72wbtjwfve
A Survey of the State of Cloud Security
2012
Network and Communication Technologies
Cloud computing has emerged as an important paradigm in computing today with the potential to offer scalable, fault tolerant services and reduce costs significantly. ...
The multitenant nature of the cloud and the fact that data is stored in multiple locations compound these security concerns. ...
Acknowledgement This research has been supported by the Fidelity National Financial Distinguished Professorship in Computer and Information Sciences. ...
doi:10.5539/nct.v1n2p66
fatcat:k7zrcg3ukza6bin6p6tgoxwixq
Validating Cloud Infrastructure Changes by Cloud Audits
2012
2012 IEEE Eighth World Congress on Services
an audit report. ...
In this paper we present a prototype demonstration of the Security Audit as a Service (SAaaS) architecture, a cloud audit system which aims to increase trust in cloud infrastructures by introducing more ...
ACKNOWLEDGMENT This research is supported by the German Federal Ministry of Education and Research (BMBF) through the research grant number 01BY1116. ...
doi:10.1109/services.2012.12
dblp:conf/services/DolitzscherFMRKC12
fatcat:t6ascy4iivgbznbyqgy5vo7fj4
Accountability as a Service for the Cloud
2010
2010 IEEE International Conference on Services Computing
Therefore the Cloud's enormous capacity with comparable low cost makes it an ideal platform for SOA deployment. ...
Computing resource provisioning through the use of the Cloud computing paradigm has triggered revolutions in modern day computing. It is a new paradigm for deploying services on rented machines. ...
It can be seen even in this simple example that a mechanism is required to prevent this "buck passing" or denial of failure. ...
doi:10.1109/scc.2010.83
dblp:conf/IEEEscc/YaoCWLZ10
fatcat:ctdgtsc5yfgu7aypm54w3rd35y
« Previous
Showing results 1 — 15 out of 5,156 results