Mitigating cloud computing security risks using a self-monitoring defensive scheme

S Mazur, E Blasch, Y Chen… - Proceedings of the 2011 …, 2011 - ieeexplore.ieee.org
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and
data through the network. These services are made discoverable to the user in the form of …

[PDF][PDF] 3-5 cybersecurity information exchange techniques: Cybersecurity information ontology and cybex

T Takahashi, Y Kadobayashi - Journal of the National Institute of …, 2011 - researchgate.net
As Internet access has become more widespread globally, cyber society has been
developing rapidly in recent years. However, security in cyber society, ie, cybersecurity, is …

Toward global cybersecurity collaboration: Cybersecurity operation activity model

T Takahashi, Y Kadobayashi… - Proceedings of ITU …, 2011 - ieeexplore.ieee.org
The importance of communication and collaboration beyond organizational borders is
increasingly recognized with regard to maintaining cybersecurity. Yet organizations still face …

[PDF][PDF] 독립적인보안관리도메인간효과적인사이버보안정보교환방법의설계및구현

안개일, 서대희, 임선희, 김종현, 서동일… - 한국통신학회 …, 2011 - journal.kics.or.kr
요 약현재 사이버보안 위협을 방어하기 위한 하나의 방편으로서 보안 관리 도메인간
사이버보안 정보 공유를 통하여 전체 네트워크에 대한 보안 성능을 높이려는 연구가 활발히 …

Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains

GI An, DH Seo, SH Lim, JH Kim, DI Seo… - The Journal of Korean …, 2011 - koreascience.kr
As a way for defending against cyber security threats, there has been a research on
cybersecurity information exchange between security management domains in order to …

3-5 サイバーセキュリティ情報交換技術: 情報オントロジの構築とCYBEX

高橋健志, 門林雄基 - 情報通信研究機構研究報告, 2011 - jstage.jst.go.jp
要旨グローバル規模でのサイバー社会が構築されつつある現在, サイバーセキュリティの重要性が
強く認識されてきている. しかしながら, サイバーセキュリティの脅威は国境を越えてくるものの …