TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments
نویسندگان
چکیده
1 TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments; Li Lin, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Shuang Li, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Bo Li, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China Jing Zhan, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China Yong Zhao, College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, China
منابع مشابه
Emerging Security Challenges of Cloud Virtual Infrastructure
The cloud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet allowing customers to remotely run and manage these services. Infrastructure-as-a-service (IaaS) is one of the popular cloud computing services. IaaS allows customers to increase their computing resources on the fly wit...
متن کاملThe Insider Threat Prediction and Specification Language
Various information security surveys and case studies indicate the importance and manifestation of the insider threat problem. One of the most important tools to address insider threats is to enable the researchers to build case studies and express/replay threat scenarios. The Insider Threat Prediction and Specification Language (ITPSL) is a Domain Specific Language (DSL) created to provide a s...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملInsider Threat Mitigation in Cloud Computing
Insider threat is one in all the foremost crucial security threats for any trade, even it's the foremost eldest strategy to fall associate degree empire down, quite common in diplomacy per the human history. Within the cloud computing scheme there are many issues that's tougher than the conventional (not could) eventualities. If the corporate executive threats are the foremost dangerous threat ...
متن کاملA Scalable Architecture for Countering Network-Centric Insider Threats
Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, we introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed to self-protect applications from disgruntled privileged...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJGHPC
دوره 8 شماره
صفحات -
تاریخ انتشار 2016