Jan. 28, 2013 to Jan. 30, 2013
ByungRae Cha , SCENT Center, GIST, Gwangju, South Korea
Jongwon Kim , Sch. of Inf. & Commun., GIST, Gwangju, South Korea
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Cloud computing, Access control, Computer crime, Safety, Monitoring,Honeypot, Security Tactics, Cloud Computing, Multi-stage Anomaly Detection, Attributed Based Access Control
ByungRae Cha, Jongwon Kim, "Security tactics for secured cloud computing resources", ICOIN, 2013, The International Conference on Information Networking 2014 (ICOIN2014), The International Conference on Information Networking 2014 (ICOIN2014) 2013, pp. 473-475, doi:10.1109/ICOIN.2013.6496425