2016
DOI: 10.1007/978-3-319-28091-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Monitoring and Vulnerability Management

Abstract: Abstract-Cloud infrastructure becomes the primary business environment for all types of enterprises during recent years. In cloud computing security is a fundamental concern, loss of control and potential lack of trust prevent large set of potential customers to immerse in the cloud world. One of the major key problem is how one can test, monitor or measure the underlying Cloud infrastructure from user/customer space. We have developed a solution which is able to examine the infrastructure, from security point… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…These architectures are briefly defined in section 2.2.1. The Cloud security monitoring system [22] has adopted centralized data collection architecture to monitor the security aspects of cloud computing.…”
Section: Comparative Study Of Data Collection Methodsmentioning
confidence: 99%
“…These architectures are briefly defined in section 2.2.1. The Cloud security monitoring system [22] has adopted centralized data collection architecture to monitor the security aspects of cloud computing.…”
Section: Comparative Study Of Data Collection Methodsmentioning
confidence: 99%
“…Plugging α = d = k in (17), the size of the secure message symbols achieved with MBR codes, when β = 1 is…”
Section: Information-theoretic Secrecy In Twin Mds Code Framework Andmentioning
confidence: 99%
“…Hence DSS should be secure apart from satisfying the reconstruction and repair requirements. Some researches that covers the topic of security are formulated in [13][14][15][16][17][18][19][20]. This paper, besides the reliability of the stored data addresses the issue of its security.…”
Section: Introductionmentioning
confidence: 99%
“…Hence DSS should be secure apart from satisfying the reconstruction and repair requirements. Some researches that covers the topic of security are formulated in [13][14][15][16][17][18][19][20]. This paper, besides the reliability of the stored data addresses the issue of its security.…”
Section: Introductionmentioning
confidence: 99%