Spring, 2011 - Google Patents
Monitoring cloud computing by layer, part 2Spring, 2011
- Document ID
- 17222465087972313198
- Author
- Spring J
- Publication year
- Publication venue
- IEEE Security & Privacy
External Links
Snippet
This article presents a set of recommended restrictions and audits to facilitate cloud security. Monitoring cloud computing is complex; although outsourcing the decision might appear to simplify the problem, it might raise as many questions as it answers. By analyzing what the …
- 230000006399 behavior 0 description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Souppaya et al. | Secure software development framework (ssdf) version 1.1 | |
| Matulevičius | Fundamentals of secure system modelling | |
| Howard et al. | The security development lifecycle | |
| Spring | Monitoring cloud computing by layer, part 2 | |
| Khan et al. | Security assurance model of software development for global software development vendors | |
| Ellison et al. | Evaluating and mitigating software supply chain security risks | |
| Armando et al. | Securing the" bring your own device" paradigm | |
| Faruk et al. | Investigating novel approaches to defend software supply chain attacks | |
| Gokkaya et al. | Software supply chain: review of attacks, risk assessment strategies and security controls | |
| Chandramouli et al. | Strategies for the integration of software supply chain security in DevSecOps CI/CD pipelines | |
| Nagasundari et al. | Extensive review of threat models for DevSecOps | |
| Reichert et al. | Software supply chain security: a systematic literature review | |
| Khan et al. | A fuzzy‐AHP decision‐making framework for optimizing software maintenance and deployment in information security systems | |
| Williams et al. | Proactive Software Supply Chain Risk Management Framework (P-SSCRM) | |
| Espedahlen | Attack trees describing security in distributed internet-enabled metrology | |
| Bouke | Software Development Security | |
| Sabnis et al. | Intrinsically secure next-generation networks | |
| Runsewe | A policy-based management framework for cloud computing security | |
| Kudo et al. | Application integrity protection on kubernetes cluster based on manifest signature verification | |
| Niemann | Enterprise architecture management and its role in IT governance and IT investment planning | |
| Hellström et al. | A Lightweight Secure Development Process for Developers | |
| Babar et al. | Supporting security sensitive architecture design | |
| Sapkota | A Framework of DevSecOps for Software Development Teams | |
| Han et al. | A hierarchical security-auditing methodology for cloud computing | |
| Bollieddula | ¬¬ Challenges and Solutions in the Implementation of DevOps Tools & Security (DevSecOps): A Systematic Review |