The International Conference on Information Networking 2014 (ICOIN2014) (2013)
Jan. 28, 2013 to Jan. 30, 2013
ByungRae Cha , SCENT Center, GIST, Gwangju, South Korea
Jongwon Kim , Sch. of Inf. & Commun., GIST, Gwangju, South Korea
In this paper, we propose the security tactics for secured cloud computing resources. It is composed by multistage anomaly detection scheme and honeypot in outside of cloud computing, and attribute-based access control in inside of cloud computing for secured cloud computing resource in order to support safety future services.
Cloud computing, Access control, Computer crime, Safety, Monitoring
ByungRae Cha and Jongwon Kim, "Security tactics for secured cloud computing resources," 2013 International Conference on Information Networking (ICOIN), Bangkok, 2013, pp. 473-475.