The Community for Technology Leaders
RSS Icon
Subscribe
Bangkok
Jan. 28, 2013 to Jan. 30, 2013
ISBN: 978-1-4673-5740-1
pp: 473-475
Jongwon Kim , School of Information and Communications, GIST, Gwangju, Korea
ABSTRACT
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
INDEX TERMS
Honeypot, Security Tactics, Cloud Computing, Multi-stage Anomaly Detection, Attributed Based Access Control
CITATION
Jongwon Kim, "Security tactics for secured cloud computing resources", ICOIN, 2013, 2013 International Conference on Information Networking (ICOIN), 2013 International Conference on Information Networking (ICOIN) 2013, pp. 473-475, doi:10.1109/ICOIN.2013.6496425
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool