Doelitzscher et al., 2013 - Google Patents
Sun behind clouds-on automatic cloud security audits and a cloud audit policy languageDoelitzscher et al., 2013
View PDF- Document ID
- 9098917936433997224
- Author
- Doelitzscher F
- Ruebsamen T
- Karbe T
- Knahl M
- Reich C
- Clarke N
- Publication year
- Publication venue
- International Journal on Advances in Networks and Services
External Links
Snippet
Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology …
- 238000011160 research 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Doelitzscher et al. | Sun behind clouds-on automatic cloud security audits and a cloud audit policy language | |
| Fernandes et al. | Security issues in cloud environments: a survey | |
| US8850588B2 (en) | Systems and methods for providing mobile security based on dynamic attestation | |
| Doelitzscher et al. | An agent based business aware incident detection system for cloud environments | |
| Doelitzscher et al. | An autonomous agent based incident detection system for cloud environments | |
| US20220311805A1 (en) | System and Method for Providing and Managing Security Rules and Policies | |
| US20240289264A1 (en) | Component testing framework | |
| Vemula | Recent Advancements in Cloud Security Using Performance Technologies and Techniques | |
| Doelitzscher et al. | Incident detection for cloud environments | |
| US11683350B2 (en) | System and method for providing and managing security rules and policies | |
| Doelitzscher et al. | Understanding cloud audits | |
| Cappello | A comprehensive analysis of EDR (Endpoint Detection & Response), EPP (Endpoint Protection Platform), and antivirus security technologies | |
| Dhanush et al. | A Comprehensive Study on Misconfiguration-SAAS Security Threat | |
| Deshpande et al. | Optimization of security as an enabler for cloud services and applications | |
| Udayakumar | Design and Deploy a Secure Azure Environment | |
| Covaci et al. | Towards autonomous security assurance in 5G infrastructures | |
| Niu et al. | Security analysis model, system architecture and relational model of enterprise cloud services | |
| Ghazizadeh et al. | Automated Tools for Cloud Security Testing | |
| Udayakumar | Design and deploy security for infrastructure, data, and applications | |
| Copeland et al. | Azure Security Center and Azure Sentinel | |
| Sandbu | Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender | |
| Rangta | Tools for Security Auditing and Hardening in Microservices Architecture | |
| Pidlubnyi | Increasing Security and Reducing Risks Running Services in a Potential Containerized Environment While Meeting Regulatory Standards | |
| Udayakumar | Get Started with Azure Security | |
| Devarasetty | Zscaler Cloud Security Essentials |