Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382226
|View full text |Cite
|
Sign up to set email alerts
|

Self-service cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(40 citation statements)
references
References 28 publications
0
40
0
Order By: Relevance
“…Cloud computing involves three parties; cloud customer, cloud service provider and cloud network. These are the security threats which cause damage to the cloud [18]. Some of them are:…”
Section: Major Challenges/issuesmentioning
confidence: 99%
“…Cloud computing involves three parties; cloud customer, cloud service provider and cloud network. These are the security threats which cause damage to the cloud [18]. Some of them are:…”
Section: Major Challenges/issuesmentioning
confidence: 99%
“…We augment these elements with additional ones to consider further threats. In detail, when the virtualized environment is run by an external provider, the trust placed in that provider also needs to be considered [5] [14] [7] [9]. Hence, other components that we introduce are: (i) physical-access: a component that defines whether physical access is possible for the attacker; (ii) actors: the Cloud service provider (CSP), the tenant and a generic external attacker.…”
Section: Ontology Of Components and Relationsmentioning
confidence: 99%
“…A self-service cloud (SSC) computing platform [16] provides users with privileged VMs called service domains (SDs) to monitor their own VMs. SDs can monitor the memory of target VMs, disk blocks accessed by VMs, and system calls issued by them.…”
Section: Privileged Vms For Offloading Idsesmentioning
confidence: 99%