Proceedings of the 2020 4th International Conference on Compute and Data Analysis 2020
DOI: 10.1145/3388142.3388168
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 32 publications
1
18
0
Order By: Relevance
“…Thi s can happen wither from inside or outside of the organization of the security in cloud [20]. This is the most serious attack once this is happened, then the data breach will happen by using the old equipment and reusing the drivers [2].…”
Section: Unauthorized Accessmentioning
confidence: 99%
See 4 more Smart Citations
“…Thi s can happen wither from inside or outside of the organization of the security in cloud [20]. This is the most serious attack once this is happened, then the data breach will happen by using the old equipment and reusing the drivers [2].…”
Section: Unauthorized Accessmentioning
confidence: 99%
“…Cloud computing provides cost-effective and flexible delivery of IT services and resources including database, bandwidth, software, servers, storage, networking, etc. over the internet [1] [2].…”
Section: Introduction (Cloud Computing Data Integrity)mentioning
confidence: 99%
See 3 more Smart Citations