[引用][C] The evolution of cloud computing security: addressing emerging threats

P Muralidhara - International journal of computer science and …, 2017

Evaluation and establishment of trust in cloud federation

A Kanwal, R Masood, MA Shibli - … of the 8th International Conference on …, 2014 - dl.acm.org
Cloud federation is a future evolution of Cloud computing, where Cloud Service Providers
(CSP) collaborate dynamically to share their virtual infrastructure for load balancing and …

Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more
complex to date. To enhance the detection performance, collaborative intrusion detection …

Blockchain-aided Decentralized Trust Management of Edge Computing: Towards Reliable Off-chain and On-chain Trust

L Shi, T Wang, Z Xiong, Z Wang, Y Liu, J Li - IEEE Network, 2024 - ieeexplore.ieee.org
As a shared and distributed database, blockchain empowers distributed edge computing
(EC) networks with decentralization, integrity, and auditability of trust management …

Sharing machine learning models as indicators of compromise for cyber threat intelligence

D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about
cyber attacks to help organizations gain a better understanding of threats and proactively …

Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives

C Sauerwein, C Sillaber, A Mussmann, R Breu - 2017 - aisel.aisnet.org
In the last couple of years, organizations have demonstrated an increased willingness to
exchange information and knowledge regarding vulnerabilities, threats, incidents and …

[PDF][PDF] TZ4Fabric: Executing Smart Contracts with ARM TrustZone:(Practical Experience Report)

C Muller, M Brandenburger, C Cachin… - 2020 International …, 2020 - drive.google.com
Blockchain technology promises to revolutionize manufacturing industries. For example,
several supply chain use cases may benefit from transparent asset tracking and automated …

Security in Blockchain‐Based Smart Cyber‐Physical Applications Relying on Wireless Sensor and Actuators Networks

MA de Jesus, AA Laghari, AA Khan… - … Analytics and Cyber …, 2024 - Wiley Online Library
Mentoring and stakeholders' assessment are easier with business sector monitoring and
remediation solutions. They also risk computer hacking for stakeholders. The “general …

Distributed attack prevention using Dempster-Shafer theory of evidence

Á MacDermott, Q Shi, K Kifayat - … , ICIC 2017, Liverpool, UK, August 7-10 …, 2017 - Springer
This paper details a robust collaborative intrusion detection methodology for detecting
attacks within a Cloud federation. It is a proactive model and the responsibility for managing …

Security Defense For Smart Contracts: A Comprehensive Survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - arXiv preprint arXiv …, 2023 - arxiv.org
The blockchain technology has been used for recording state transitions of smart contracts-
decentralized applications that can be invoked through external transactions. Smart …