[HTML][HTML] Multilevel classification of security concerns in cloud computing

SA Hussain, M Fatima, A Saeed, I Raza… - Applied Computing and …, 2017 - Elsevier
Threats jeopardize some basic security requirements in a cloud. These threats generally
constitute privacy breach, data leakage and unauthorized data access at different cloud …

Modeling and simulation as a cloud service: a survey

E Cayirci - 2013 Winter Simulations Conference (WSC), 2013 - ieeexplore.ieee.org
Modelling and simulation as a service (MSaaS) is defined, and the differences between
MSaaS and Software as a Service are clarified. MSaaS architectures and deployment …

A methodological approach to evaluate security requirements engineering methodologies: Application to the IREHDO2 project context

R Laborde, ST Bulusu, AS Wazan, A Oglaza… - … of Cybersecurity and …, 2021 - mdpi.com
An effective network security requirement engineering is needed to help organizations in
capturing cost-effective security solutions that protect networks against malicious attacks …

A situation-driven framework for dynamic security management

R Laborde, A Oglaza, AS Wazan, F Barrère… - Annals of …, 2019 - Springer
We present a dynamic security management framework where security policies are
specified according to situations. Situation-based policies easily express complex dynamic …

Secure cloud framework based on machine learning approach

P kumar Das, N Sinha - Journal Of Algebraic Statistics, 2022 - publishoa.com
In the present business scenario, Cloud Computing has taken a centerstageduetoitscost-
effectiveness, efficiency, andscalability. Therehasbeenbroaduseof cloud-based systems and …

Configuration schemes for modeling and simulation as a service federation

E Cayirci - Simulation, 2013 - journals.sagepub.com
Two types of modeling and simulation as service configuration problems are formally
defined and their complexities are analyzed. Optimization and heuristic solutions for these …

Logic-based methodology to help security architects in eliciting high-level network security requirements

R Laborde, ST Bulusu, AS Wazan, F Barrère… - Proceedings of the 34th …, 2019 - dl.acm.org
In this paper1, we propose a security methodology that automates the process of security
zone specification and high-level network security requirements elicitation. We define a set …

dynSMAUG: A dynamic security management framework driven by situations

R Laborde, A Oglaza, F Barrère… - 2017 1st Cyber Security …, 2017 - ieeexplore.ieee.org
We present a dynamic security management framework where security policies are
specified according to situations. A situation allows to logically group dynamic constraints …

Access control as a service for information protection in semantic web based smart environment

IF Siddiqui, SUJ Lee - Journal of Internet Computing and Services, 2016 - koreascience.kr
Pervasive computing and Internet of Things (IoT) have recently received considerable
interest to deploy solutions for the future Internet. Smart environments are integrated with …

[PDF][PDF] Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications.

S Mandal, DA Khan - Journal of Engineering Science & Technology …, 2021 - jestr.org
The emergence of the cloud computing paradigm has influenced business organizations for
migration over two decades. This has enabled a more incredible communication speed …