TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments

نویسندگان

  • Li Lin
  • Shuang Li
  • Bo Li
  • Jing Zhan
  • Yong Zhao
چکیده

1 TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments; Li Lin, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Shuang Li, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Bo Li, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China Jing Zhan, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Yong Zhao, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emerging Security Challenges of Cloud Virtual Infrastructure

The cloud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services. IaaS allows customers to increase their computing resources on the fly wit...

متن کامل

The Insider Threat Prediction and Specification Language

Various information security surveys and case studies indicate the importance and manifestation of the insider threat problem. One of the most important tools to address insider threats is to enable the researchers to build case studies and express/replay threat scenarios. The Insider Threat Prediction and Specification Language (ITPSL) is a Domain Specific Language (DSL) created to provide a s...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

Insider Threat Mitigation in Cloud Computing

Insider threat is one in all the foremost crucial security threats for any trade, even it's the foremost eldest strategy to fall associate degree empire down, quite common in diplomacy per the human history. Within the cloud computing scheme there are many issues that's tougher than the conventional (not could) eventualities. If the corporate executive threats are the foremost dangerous threat ...

متن کامل

A Scalable Architecture for Countering Network-Centric Insider Threats

Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, we introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed to self-protect applications from disgruntled privileged...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJGHPC

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2016