[PDF][PDF] Toward quantified risk-adaptive access control for multi-tenant cloud computing

D Fall, G Blanc, T Okuda, Y Kadobayashi… - The 6th Joint …, 2011 - researchgate.net
Cloud computing is the new trend in information science that is capable to change
drastically the way we were using Internet. Despite all its advantages, users are always …

Mitigating cloud computing security risks using a self-monitoring defensive scheme

S Mazur, E Blasch, Y Chen… - Proceedings of the 2011 …, 2011 - ieeexplore.ieee.org
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and
data through the network. These services are made discoverable to the user in the form of …

[PDF][PDF] 3-5 cybersecurity information exchange techniques: Cybersecurity information ontology and cybex

T Takahashi, Y Kadobayashi - Journal of the National Institute of …, 2011 - researchgate.net
As Internet access has become more widespread globally, cyber society has been
developing rapidly in recent years. However, security in cyber society, ie, cybersecurity, is …

Toward global cybersecurity collaboration: Cybersecurity operation activity model

T Takahashi, Y Kadobayashi… - Proceedings of ITU …, 2011 - ieeexplore.ieee.org
The importance of communication and collaboration beyond organizational borders is
increasingly recognized with regard to maintaining cybersecurity. Yet organizations still face …

[PDF][PDF] Entwicklung und implementierung einer ontologie für das IT-sicherheitsmanagement im cloud computing.

M Gräuler, B Martens, F Teuteberg - GI-Jahrestagung, 2011 - user.tu-berlin.de
Cloud Computing hat sich in den letzten Jahren zu einem Hype-Thema in Unternehmen
entwickelt. Besondere Aufmerksamkeit wird in diesem Zusammenhang der IT-Sicherheit im …

Метамоделирование оптимизации таксономии и безопасности в облачных вычислениях

СВ Афанасьев - Информационно-измерительные и управляющие …, 2011 - elibrary.ru
Исследованы релевантная таксономия данных и сервисов в облачных вычислениях и
безопасность в части SaaS, на основе онтологического описания таксономии доступа к …

NG Augmented Ontology on shared cloud attack dimension Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, Michigan August …

DC Ng - 2011 - aisel.aisnet.org
There are several small countries adjacent to Russia. One is Estonia on the west and
Georgia on the south east. The nationalcomputer network incident in Estonia dated 2007 …

3-5 サイバーセキュリティ情報交換技術: 情報オントロジの構築とCYBEX

高橋健志, 門林雄基 - 情報通信研究機構研究報告, 2011 - jstage.jst.go.jp
要旨グローバル規模でのサイバー社会が構築されつつある現在, サイバーセキュリティの重要性が
強く認識されてきている. しかしながら, サイバーセキュリティの脅威は国境を越えてくるものの …

[引用][C] CYBEX--次世代サイバーセキュリティ環境を実現する情報交換技法

門林雄基 - 電子情報通信学会誌= The journal of the Institute of …, 2011 - cir.nii.ac.jp
CYBEX--次世代サイバーセキュリティ環境を実現する情報交換技法 | CiNii Research CiNii 国立
情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データをさがす …