Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling

K Bijon, R Krishnan, R Sandhu - … of the 20th ACM symposium on access …, 2015 - dl.acm.org
A major concern in the adoption of cloud infrastructure-as-a-service (IaaS) arises from multi-
tenancy, where multiple tenants share the underlying physical infrastructure operated by a …

Quantify co-residency risks in the cloud through deep learning

J Han, W Zang, M Yu, R Sandhu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing, while becoming more and more popular as a dominant computing
platform, introduces new security challenges. When virtual machines are deployed in a …

Virtual resource orchestration constraints in cloud infrastructure as a service

K Bijon, R Krishnan, R Sandhu - … of the 5th ACM Conference on Data …, 2015 - dl.acm.org
In an infrastructure as a service (IaaS) cloud, virtualized IT resources such as compute,
storage and network are offered on demand by a cloud service provider (CSP) to its tenants …

[图书][B] Provenance-based access control models

D Nguyen - 2014 - search.proquest.com
Provenance data of a system resource provides historical information including the pedigree
of and past activities on the resource. This information is useful and has been demonstrated …

[图书][B] Constraints for attribute based access control with application in cloud IaaS

KZ Bijon - 2015 - search.proquest.com
Recently, attribute based access control (ABAC) has received considerable attention from
the security community for its policy flexibility and dynamic decisionmaking capabilities. The …

◾ Secure Management of Virtualized Resources

R Di Pietro, F Lombardi, M Signorini - Security in the Private Cloud, 2016 - taylorfrancis.com
Such a large collection of resources within virtual hosts is maximized among customers
(also known as tenants) with the objective to achieve the best result (ie, to provide the best …

Sifter: a service isolation strategy for internet applications

C Ye, SC Cheung, WK Chan - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
Service oriented architecture (SOA) provides a flexible platform to build collaborative
Internet applications by composing existing self-contained and autonomous services …

Towards a comprehensive model of isolation for mitigating illicit channels

K Falzon, E Bodden - International Conference on Principles of Security …, 2016 - Springer
The increased sharing of computational resources elevates the risk of side channels and
covert channels, where an entity's security is affected by the entities with which it is co …

[PDF][PDF] An End-User Centred Framework for Data Access Management and Security in the Enterprise Public Cloud

EYAN GETHRUDE - 2024 - stax.strath.ac.uk
Cloud Computing, an emerging internet technology that provides on-demand services to
end-users with high scalability in an efficient way over the internet. Enterprises in recent …

[图书][B] An Interaction-based Software-Defined Security Model and Platform to secure cloud resources

S Farahmandian - 2021 - search.proquest.com
Cloud computing has transformed a large portion of the IT industry through its ability to
provision infrastructure resources–computing, networking, storage, and software–as …