Jan. 28, 2013 to Jan. 30, 2013
Jongwon Kim , School of Information and Communications, GIST, Gwangju, Korea
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Honeypot, Security Tactics, Cloud Computing, Multi-stage Anomaly Detection, Attributed Based Access Control
Jongwon Kim, "Security tactics for secured cloud computing resources", ICOIN, 2013, The International Conference on Information Networking 2014 (ICOIN2014), The International Conference on Information Networking 2014 (ICOIN2014) 2013, pp. 473-475, doi:10.1109/ICOIN.2013.6496425