2012
DOI: 10.1109/msp.2012.88
|View full text |Cite
|
Sign up to set email alerts
|

Using Cloud Computing to Implement a Security Overlay Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 2 publications
0
25
0
Order By: Relevance
“…The setΛ contains all possible events that may exist in a single composition process. The probability of occurrence is then derived for each event and is calculated according to (9) and (10).…”
Section: Sso Compositionmentioning
confidence: 99%
See 1 more Smart Citation
“…The setΛ contains all possible events that may exist in a single composition process. The probability of occurrence is then derived for each event and is calculated according to (9) and (10).…”
Section: Sso Compositionmentioning
confidence: 99%
“…Information system security has been a hot topic for many decades, e.g. [10]. An information system is considered to be secure if it has well-defined security measures and characteristics such as authenticity, confidentiality and integrity [11].…”
mentioning
confidence: 99%
“…The data in the cloud is more vulnerable to risks in terms of confidentiality, integrity, and availability compared to conventional computing [20].In the cloud shared environment, the cloud security strength equals the security strength of its weakest entity [21]; a successful attack on a single entity can result in data breach. The multi-tenant nature of the cloud can result in integrity violation [4].…”
Section: Data Privacy and Integrity:-mentioning
confidence: 99%
“…Xin Wang used the cloud computing technology to make up for the shortcomings of the traditional virus detection methods, and extended the technology to the military network, and got good results(X in Wang et al 2010) [3]. Salah proposed a reliable model, the model not only could detect malicious virus software, but also could provide effective intercept service for distributed spam DDOS, the performance of the system was improved (Salah et al 2013) [4]. A new type of MD5 lookup method is proposed, which improved the efficiency of virus malware detection (Nen-Fu Huang et al 2011) [5].…”
Section: Research Statusesmentioning
confidence: 99%