Spring, 2011 - Google Patents

Monitoring cloud computing by layer, part 2

Spring, 2011

Document ID
17222465087972313198
Author
Spring J
Publication year
Publication venue
IEEE Security & Privacy

External Links

Snippet

This article presents a set of recommended restrictions and audits to facilitate cloud security. Monitoring cloud computing is complex; although outsourcing the decision might appear to simplify the problem, it might raise as many questions as it answers. By analyzing what the …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Souppaya et al. Secure software development framework (ssdf) version 1.1
Matulevičius Fundamentals of secure system modelling
Howard et al. The security development lifecycle
Spring Monitoring cloud computing by layer, part 2
Khan et al. Security assurance model of software development for global software development vendors
Ellison et al. Evaluating and mitigating software supply chain security risks
Armando et al. Securing the" bring your own device" paradigm
Faruk et al. Investigating novel approaches to defend software supply chain attacks
Gokkaya et al. Software supply chain: review of attacks, risk assessment strategies and security controls
Chandramouli et al. Strategies for the integration of software supply chain security in DevSecOps CI/CD pipelines
Nagasundari et al. Extensive review of threat models for DevSecOps
Reichert et al. Software supply chain security: a systematic literature review
Khan et al. A fuzzy‐AHP decision‐making framework for optimizing software maintenance and deployment in information security systems
Williams et al. Proactive Software Supply Chain Risk Management Framework (P-SSCRM)
Espedahlen Attack trees describing security in distributed internet-enabled metrology
Bouke Software Development Security
Sabnis et al. Intrinsically secure next-generation networks
Runsewe A policy-based management framework for cloud computing security
Kudo et al. Application integrity protection on kubernetes cluster based on manifest signature verification
Niemann Enterprise architecture management and its role in IT governance and IT investment planning
Hellström et al. A Lightweight Secure Development Process for Developers
Babar et al. Supporting security sensitive architecture design
Sapkota A Framework of DevSecOps for Software Development Teams
Han et al. A hierarchical security-auditing methodology for cloud computing
Bollieddula ¬¬ Challenges and Solutions in the Implementation of DevOps Tools & Security (DevSecOps): A Systematic Review