2014
DOI: 10.1007/978-3-319-11698-3_1
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Second, TenantGuard is more scalable (e.g., verifying 100k VMs within 17mins). Finally, TenantGuard employs custom algorithms instead of relying on existing verification tools (e.g., [11], [27], [29], [28]), which enables TenantGuard to more efficiently deal with complexity factors specific to the cloud network infrastructure such as a large number of VMs, longer routing paths (number of hops), and increased number of security rules.…”
Section: Related Workmentioning
confidence: 99%
“…Second, TenantGuard is more scalable (e.g., verifying 100k VMs within 17mins). Finally, TenantGuard employs custom algorithms instead of relying on existing verification tools (e.g., [11], [27], [29], [28]), which enables TenantGuard to more efficiently deal with complexity factors specific to the cloud network infrastructure such as a large number of VMs, longer routing paths (number of hops), and increased number of security rules.…”
Section: Related Workmentioning
confidence: 99%
“…Cloud providers are responsible for manually writing available and secure network policies that are thus error-prone. Existing works such as NoD [3], Plotkin et al [4], Cloud Radar [5], Probst et al, [6] and Tenant-Guard [7] proposed several methods for verifying policies formatted routing rules.…”
Section: Introductionmentioning
confidence: 99%