This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 International Conference on Information Networking (ICOIN)
Security tactics for secured cloud computing resources
Bangkok Thailand
January 28-January 30
ISBN: 978-1-4673-5740-1
ByungRae Cha, SCENT Center, GIST, Gwangju, Korea
Jongwon Kim, School of Information and Communications, GIST, Gwangju, Korea
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Index Terms:
Honeypot,Security Tactics,Cloud Computing,Multi-stage Anomaly Detection,Attributed Based Access Control
Citation:
ByungRae Cha, Jongwon Kim, "Security tactics for secured cloud computing resources," icoin, pp.473-475, 2013 International Conference on Information Networking (ICOIN), 2013
Usage of this product signifies your acceptance of the Terms of Use.