2023
DOI: 10.21203/rs.3.rs-3070326/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Consortium-Based Algorithm for Access Control and Pattern Analysis Models

Abstract: Inappropriate ownership transfers, weak access control, and incorrect authentication are just some of the most common external risks to public cloud installations. Cloud application developers may intentionally or unintentionally introduce these design-level issues. The difficulty that modern large-scale cloud deployments have in identifying and patching these vulnerabilities is a contributing factor to the decline in cloud QoS (quality of service) and the rise in overall system cost. Many different models of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 36 publications
(72 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?