2017
DOI: 10.1007/s11432-016-0322-7
|View full text |Cite
|
Sign up to set email alerts
|

Saudi cloud infrastructure: a security analysis

Abstract: The growing demand and dependence upon cloud services have garnered an increasing level of threat to user data and security. Some of such critical web and cloud platforms have become constant targets for persistent malicious attacks that attempt to breach security protocol and access user data and information in an unauthorized manner. While some of such security compromises may result from insider data and access leaks, a substantial proportion continues to remain attributed to security flaws that may exist w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…M OST cyber attacks are caused by the exploitation of one or multiple vulnerabilities [1], [2]. It is unfortunate that vulnerabilities are inevitable, for many reasons (e.g., software complexity, steady growth in internet complexity [3]). Given that vulnerabilities cannot be prevented, an alternate defense approach is to detect and patch vulnerabilities sooner rather than later, leading to the field of vulnerability detection.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…M OST cyber attacks are caused by the exploitation of one or multiple vulnerabilities [1], [2]. It is unfortunate that vulnerabilities are inevitable, for many reasons (e.g., software complexity, steady growth in internet complexity [3]). Given that vulnerabilities cannot be prevented, an alternate defense approach is to detect and patch vulnerabilities sooner rather than later, leading to the field of vulnerability detection.…”
Section: Introductionmentioning
confidence: 99%
“…Algorithm 1 elaborates Step I. 3. Consider a library/API function call f vi made in a statement p v , which is represented as a node n in the SDG in question.…”
mentioning
confidence: 99%