2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.195
|View full text |Cite
|
Sign up to set email alerts
|

Towards Building an Automated Security Compliance Tool for the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(28 citation statements)
references
References 3 publications
0
21
0
Order By: Relevance
“…Much research has been done to develop effective approaches to protecting the critical cloud infrastructures [13,14] and power systems [15][16][17][18][19]. In [13], a technique was presented to leverage the elasticity and on-demand provisioning features of the critical cloud infrastructures to provide application resilience to failures and attacks.…”
Section: Current State Of the Artmentioning
confidence: 99%
See 3 more Smart Citations
“…Much research has been done to develop effective approaches to protecting the critical cloud infrastructures [13,14] and power systems [15][16][17][18][19]. In [13], a technique was presented to leverage the elasticity and on-demand provisioning features of the critical cloud infrastructures to provide application resilience to failures and attacks.…”
Section: Current State Of the Artmentioning
confidence: 99%
“…In [13], a technique was presented to leverage the elasticity and on-demand provisioning features of the critical cloud infrastructures to provide application resilience to failures and attacks. In [14], a technique to develop an automated security compliance tool for critical cloud infrastructures was presented. This technique reduces human intervention by verifying the security compliance automatically based on the data collected from API, vulnerability scanning, log analysis and manual input entries.…”
Section: Current State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…While the ID-PKC has progressed substantially overcoming challenges with initial implementation like key-escrow, keyrevocation, it was observed that ID-PKC schemes had not been evaluated in multi-tenant cloud environment like OpenStack with exception [1] provides automated audit facility for clients. This paper presents a mechanism to secure data communication in OpenStack cloud environment by modifying its security architecture and builds upon recent advancements in ID-PKC schemes.…”
Section: Previous Workmentioning
confidence: 99%