2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks 2009
DOI: 10.1109/i-span.2009.157
|View full text |Cite
|
Sign up to set email alerts
|

A Layered Security Approach for Cloud Computing Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(14 citation statements)
references
References 15 publications
0
13
0
1
Order By: Relevance
“…Because research in combustion affects the economy of many countries that produce and export fuel oil, security of findings and data is important. This requires reliable cloud security systems for collaboration [11]. In spite of the numerous projects to build computational kinetics and combustion infrastructures, not all of them were successful.…”
Section: Related Researchmentioning
confidence: 99%
“…Because research in combustion affects the economy of many countries that produce and export fuel oil, security of findings and data is important. This requires reliable cloud security systems for collaboration [11]. In spite of the numerous projects to build computational kinetics and combustion infrastructures, not all of them were successful.…”
Section: Related Researchmentioning
confidence: 99%
“…In their paper, they suggest a few strategies to overcome these security risks of cloud computing. Yildiz et al (2009) proposed a practical security model on the basis of key security considerations after looking at various infrastructure aspects of cloud computing. Yu et al (2010) propose a data access control scheme for cloud computing for simultaneously achieving fine-graininess, scalability and data confidentiality.…”
Section: Cloud Securitymentioning
confidence: 99%
“…In [17] Ertaul et al survey security challenges in cloud computing environment, while Chen et al identified two new facets to cloud computing security [18], namely "the complexities of multi-party trust considerations" and "the ensuring need for mutual auditability". [19] first identifies security concerns on multiple layers arising in cloud computing, and subsequently outlines a policybased security approach for cloud computing through defining security polices at various layers including networking, storage, systems management and applications.…”
Section: Related Workmentioning
confidence: 99%