Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2459981
|View full text |Cite
|
Sign up to set email alerts
|

An architecture for cross-cloud auditing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…These policies are threatened by a number of security risks including local (pairwise between services) and global (end-to-end of service composition) violations of data integrity, data confidentiality, and service availability which are introduced when services exchange information as part of the execution of a cloud application. These risks stem from trust [6,9] and communication [3,6,9] issues that may exist between services in compositions.…”
Section: Relevant Researchmentioning
confidence: 99%
See 4 more Smart Citations
“…These policies are threatened by a number of security risks including local (pairwise between services) and global (end-to-end of service composition) violations of data integrity, data confidentiality, and service availability which are introduced when services exchange information as part of the execution of a cloud application. These risks stem from trust [6,9] and communication [3,6,9] issues that may exist between services in compositions.…”
Section: Relevant Researchmentioning
confidence: 99%
“…Managing Sessions To reason about service cloud issues our infrastructure includes a Session Manager [6] cloud service. The Session Manager orchestrates service compositions by enabling proxies of advertised services to facilitate communication via channels.…”
Section: Amentioning
confidence: 99%
See 3 more Smart Citations