Tsai et al., 2010 - Google Patents

Information security issue of enterprises adopting the application of cloud computing

Tsai et al., 2010

Document ID
6402054901495330039
Author
Tsai C
Lin U
Chang A
Chen C
Publication year
Publication venue
The 6th International Conference on Networked Computing and Advanced Information Management

External Links

Snippet

Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired/wireless …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Amara et al. Cloud computing security threats and attacks with their mitigation techniques
Gou et al. Analysis of various security issues and challenges in cloud computing environment: a survey
Tsai et al. Information security issue of enterprises adopting the application of cloud computing
Chou Security threats on cloud computing vulnerabilities
Kulkarni et al. A security aspects in cloud computing
US9942270B2 (en) Database deception in directory services
Agarwal et al. The security risks associated with cloud computing
Gupta et al. A profile based network intrusion detection and prevention system for securing cloud environment
Sumitra et al. A survey of cloud authentication attacks and solution approaches
Mozumder et al. Cloud computing security breaches and threats analysis
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Gupta et al. Taxonomy of cloud security
Shah et al. Security issues on cloud computing
Dees et al. Enhancing Infrastructure Security in Real Estate
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
Kumar et al. A survey on cloud computing security threats and vulnerabilities
Ennajjar et al. Security in cloud computing approaches and solutions
Kaushik et al. a novel approach for an automated advanced MITM attack on IoT networks
Hatwar et al. Cloud computing security aspects, vulnerabilities and countermeasures
Rai et al. Study of security risk and vulnerabilities of cloud computing
Borazjani Security issues in cloud computing
Nazir et al. Security threats with associated mitigation techniques in cloud computing
Ouahman Security and privacy issues in cloud computing
Perez et al. A quick survey on cloud computing and associated security, mobility and IoT issues
Al Ladan A review and a classifications of mobile cloud computing security issues