Security, Privacy, and Digital Forensics in the Cloud 2019
DOI: 10.1002/9781119053385.ch4
|View full text |Cite
|
Sign up to set email alerts
|

Access Control in Cloud IaaS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…Limited control in cloud services restricts users from monitoring and modifying certain infrastructure components, potentially hindering their ability to implement necessary security measures and leaving them reliant on the provider's security protocols. Misconfigurations, often stemming from users incorrectly setting security parameters, pose significant risks in the Infrastructure as a Service (IaaS) model, potentially resulting in sensitive data leaks, unauthorized access, and other security incidents that compromise the integrity of cloud-based systems (Jones, 2023;Alouffi et al, 2021, Zhang et al, 2019GhasemiGol, 2019).…”
Section: Security Issues Of Iaasmentioning
confidence: 99%
“…Limited control in cloud services restricts users from monitoring and modifying certain infrastructure components, potentially hindering their ability to implement necessary security measures and leaving them reliant on the provider's security protocols. Misconfigurations, often stemming from users incorrectly setting security parameters, pose significant risks in the Infrastructure as a Service (IaaS) model, potentially resulting in sensitive data leaks, unauthorized access, and other security incidents that compromise the integrity of cloud-based systems (Jones, 2023;Alouffi et al, 2021, Zhang et al, 2019GhasemiGol, 2019).…”
Section: Security Issues Of Iaasmentioning
confidence: 99%