dc.contributor.author | Taheri Monfared, Aryan | |
dc.contributor.author | JAATUN, Martin Gilje | |
dc.date.accessioned | 2017-07-06T07:15:13Z | |
dc.date.available | 2017-07-06T07:15:13Z | |
dc.date.created | 2012-02-22T16:13:11Z | |
dc.date.issued | 2011 | |
dc.identifier.isbn | 978-0-7695-4622-3 | |
dc.identifier.uri | http://hdl.handle.net/11250/2447996 | |
dc.description.abstract | This paper presents an approach to handle compromised components in an Infrastructure-as-a-Service Cloud Computing platform. Our experiments show that traditional incident handling procedures are applicable for cloud computing, but need some modification to function optimally. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | IEEE | nb_NO |
dc.relation.ispartof | Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on | |
dc.title | As strong as the weakest link: Handling compromised components in OpenStack | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | |
dc.source.pagenumber | 189-196 | nb_NO |
dc.identifier.doi | 10.1109/CloudCom.2011.34 | |
dc.identifier.cristin | 911248 | |
dc.description.localcode | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for telematikk | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |