[go: up one dir, main page]

Doelitzscher et al., 2013 - Google Patents

Sun behind clouds-on automatic cloud security audits and a cloud audit policy language

Doelitzscher et al., 2013

View PDF
Document ID
9098917936433997224
Author
Doelitzscher F
Ruebsamen T
Karbe T
Knahl M
Reich C
Clarke N
Publication year
Publication venue
International Journal on Advances in Networks and Services

External Links

Snippet

Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology …
Continue reading at personales.upv.es (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Doelitzscher et al. Sun behind clouds-on automatic cloud security audits and a cloud audit policy language
Fernandes et al. Security issues in cloud environments: a survey
US8850588B2 (en) Systems and methods for providing mobile security based on dynamic attestation
Doelitzscher et al. An agent based business aware incident detection system for cloud environments
Doelitzscher et al. An autonomous agent based incident detection system for cloud environments
US20220311805A1 (en) System and Method for Providing and Managing Security Rules and Policies
US20240289264A1 (en) Component testing framework
Vemula Recent Advancements in Cloud Security Using Performance Technologies and Techniques
Doelitzscher et al. Incident detection for cloud environments
US11683350B2 (en) System and method for providing and managing security rules and policies
Doelitzscher et al. Understanding cloud audits
Cappello A comprehensive analysis of EDR (Endpoint Detection & Response), EPP (Endpoint Protection Platform), and antivirus security technologies
Dhanush et al. A Comprehensive Study on Misconfiguration-SAAS Security Threat
Deshpande et al. Optimization of security as an enabler for cloud services and applications
Udayakumar Design and Deploy a Secure Azure Environment
Covaci et al. Towards autonomous security assurance in 5G infrastructures
Niu et al. Security analysis model, system architecture and relational model of enterprise cloud services
Ghazizadeh et al. Automated Tools for Cloud Security Testing
Udayakumar Design and deploy security for infrastructure, data, and applications
Copeland et al. Azure Security Center and Azure Sentinel
Sandbu Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender
Rangta Tools for Security Auditing and Hardening in Microservices Architecture
Pidlubnyi Increasing Security and Reducing Risks Running Services in a Potential Containerized Environment While Meeting Regulatory Standards
Udayakumar Get Started with Azure Security
Devarasetty Zscaler Cloud Security Essentials