Now showing items 1-5 of 5
The Design and Applications of a Privacy-Preserving Identity and Trust-Management System
Identities are present in the interactions between individuals and organizations. Online shopping requires credit card information, while e-government services require social security or passport numbers. The involvement ...
IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS
In a public cloud computing environment, consumers cannot always just depend on the cloud provider’s security infrastructure. They may need to monitor and protect their virtual existence by implementing their own intrusion ...
IaaS Cloud Service Selection using Case-Based Reasoning
Cloud computing provides on-demand resources and removes the boundaries of resources' physical locations. It allows vendors to save upfront infrastructure costs and focus on features that discriminate their businesses. ...
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via ...
SLA Monitoring For Federated Cloud Services
The widespread adoption of cloud computing makes cloud services a core component of modern IT systems. Cloud service monitoring brings benefits to both service providers and consumers. It enables customers to track the ...