Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …

eztrust: Network-independent zero-trust perimeterization for microservices

Z Zaheer, H Chang, S Mukherjee… - Proceedings of the 2019 …, 2019 - dl.acm.org
Emerging microservices-based workloads introduce new security risks in today's data
centers as attacks can propagate laterally within the data center relatively easily by …

Masq: Rdma for virtual private cloud

Z He, D Wang, B Fu, K Tan, B Hua, ZL Zhang… - Proceedings of the …, 2020 - dl.acm.org
RDMA communication in virtual private cloud (VPC) networks is still a challenging job due to
the difficulty in fulfilling all virtualization requirements without sacrificing RDMA …

Cloud Service Misconfigurations: Emerging Threats, Enterprise Data Breaches and Solutions

J Guffey, Y Li - 2023 IEEE 13th Annual Computing and …, 2023 - ieeexplore.ieee.org
Organizations are increasingly relying more on cloud services due to their scalability and
reduced maintenance costs. However, there is still a significant amount of configurations …

Towards secure and leak-free workflows using microservice isolation

L Miller, P Mérindol, A Gallais… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
Companies like Netflix increasingly use the cloud to deploy their business processes. Those
processes often involve partnerships with other companies, and can be modeled as …

CONTROL-CORE: a framework for simulation and design of closed-loop peripheral neuromodulation control systems

P Kathiravelu, M Arnold, J Fleischer, Y Yao… - IEEE …, 2022 - ieeexplore.ieee.org
Closed-loop Vagus Nerve Stimulation (VNS) based on physiological feedback signals is a
promising approach to regulate organ functions and develop therapeutic devices. Designing …

Securing workflows using microservices and metagraphs

L Miller, P Mérindol, A Gallais, C Pelsser - Electronics, 2021 - mdpi.com
Companies such as Netflix increasingly use the cloud to deploy their business processes.
Those processes often involve partnerships with other companies, and can be modeled as …

Capnet: security and least authority in a capability-enabled cloud

A Burtsev, D Johnson, J Kunz, E Eide… - Proceedings of the …, 2017 - dl.acm.org
We present CapNet, a capability-based network architecture designed to enable least
authority and secure collaboration in the cloud. CapNet allows fine-grained management of …

Users' attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China

R Palanisamy, Y Shi - Information & Computer Security, 2023 - emerald.com
Purpose The purpose of this paper is to rank the users' attitude on major components of
mobile cloud computing (MCC) security and investigate the degree of impact of these …

Securing workflows: on the use of microservices and metagraphs to prevent data exposures

L Miller - 2022 - theses.hal.science
This thesis deals with the topic of data leaks and breaches in workflows. Workflows are used
everywhere and by everyone, multi-party workflows in particular being needed whenever …