2012
DOI: 10.1007/978-3-642-27334-6_45
|View full text |Cite
|
Sign up to set email alerts
|

The Research of the Cloud Security Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Level 5: It is capable of adopting technologies such as artificial intelligence, automation, and proactive defense.It is organically connecting with security equipment, institutional systems, and security teams, automatically identifying security threats, and proactively handling security incidents. [5] The evaluation control points in the security protection system can be defined based on the five levels of safety protection capability. We divide the scope of health measurement evaluation in data centers into (0-0.9) (1-1.9) (2-2.9) (3-3.9) (4-4.9).…”
Section: Health Evaluation Methods For Safety Protection Systemmentioning
confidence: 99%
“…Level 5: It is capable of adopting technologies such as artificial intelligence, automation, and proactive defense.It is organically connecting with security equipment, institutional systems, and security teams, automatically identifying security threats, and proactively handling security incidents. [5] The evaluation control points in the security protection system can be defined based on the five levels of safety protection capability. We divide the scope of health measurement evaluation in data centers into (0-0.9) (1-1.9) (2-2.9) (3-3.9) (4-4.9).…”
Section: Health Evaluation Methods For Safety Protection Systemmentioning
confidence: 99%