2016
DOI: 10.1147/jrd.2016.2572462
|View full text |Cite
|
Sign up to set email alerts
|

Security intelligence for cloud management infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Berger et al have discussed the problem revolving around the protection of cloud infrastructure and workloads with the help of logging, smart auditing and satisfying compliance requirements [2]. Cloud Security Intelligence (CSI) is a systematic approach that they have used for collection, aggregation, correlation and analysis of data on different planes of cloud based infrastructure, by making use of a closed-loop architecture.…”
Section: Literature Surveymentioning
confidence: 99%
“…Berger et al have discussed the problem revolving around the protection of cloud infrastructure and workloads with the help of logging, smart auditing and satisfying compliance requirements [2]. Cloud Security Intelligence (CSI) is a systematic approach that they have used for collection, aggregation, correlation and analysis of data on different planes of cloud based infrastructure, by making use of a closed-loop architecture.…”
Section: Literature Surveymentioning
confidence: 99%
“…The security hazard is huge when we also c o n s i d e r t o u c h y s p a c e s l i k e t h e Telecommunications, Military, Health, Defence and other legislative or private substances. [11][12][13][14][15] In view of the foretold understanding, different authentication structures, conventions are first proposed then created to give start for the finish protection, security and checks all substances and areas. In any case, there remains bounty to cover and investigate regarding protection and security in Smart-phones, Cloud Computing authentication systems.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, Terraform uses a declarative language that allows users to specify the desired end-state of the infrastructure without detailing the steps to achieve it. This simplifies the configuration process and reduces the potential for errors, ultimately ensuring that the infrastructure remains consistent and maintainable [90,91]. The simplicity of the language accelerates the deployment of resources in response to a large-scale DDoS attack on the web server, enabling the system to recover faster and maintain its performance, scalability, and resilience.…”
Section: Proposed Smart City Iot Deploymentmentioning
confidence: 99%