Tsai et al., 2010 - Google Patents
Information security issue of enterprises adopting the application of cloud computingTsai et al., 2010
- Document ID
- 6402054901495330039
- Author
- Tsai C
- Lin U
- Chang A
- Chen C
- Publication year
- Publication venue
- The 6th International Conference on Networked Computing and Advanced Information Management
External Links
Snippet
Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless …
- 238000000034 method 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amara et al. | Cloud computing security threats and attacks with their mitigation techniques | |
Gou et al. | Analysis of various security issues and challenges in cloud computing environment: a survey | |
Tsai et al. | Information security issue of enterprises adopting the application of cloud computing | |
Chou | Security threats on cloud computing vulnerabilities | |
Kulkarni et al. | A security aspects in cloud computing | |
US9942270B2 (en) | Database deception in directory services | |
Agarwal et al. | The security risks associated with cloud computing | |
Gupta et al. | A profile based network intrusion detection and prevention system for securing cloud environment | |
Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
Mozumder et al. | Cloud computing security breaches and threats analysis | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Gupta et al. | Taxonomy of cloud security | |
Shah et al. | Security issues on cloud computing | |
Dees et al. | Enhancing Infrastructure Security in Real Estate | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
Kumar et al. | A survey on cloud computing security threats and vulnerabilities | |
Ennajjar et al. | Security in cloud computing approaches and solutions | |
Kaushik et al. | a novel approach for an automated advanced MITM attack on IoT networks | |
Hatwar et al. | Cloud computing security aspects, vulnerabilities and countermeasures | |
Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
Borazjani | Security issues in cloud computing | |
Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
Ouahman | Security and privacy issues in cloud computing | |
Perez et al. | A quick survey on cloud computing and associated security, mobility and IoT issues | |
Al Ladan | A review and a classifications of mobile cloud computing security issues |