Show simple item record

dc.contributor.authorTaheri Monfared, Aryan
dc.contributor.authorJaatun, Martin Gilje
dc.date.accessioned2018-01-04T16:22:43Z
dc.date.available2018-01-04T16:22:43Z
dc.date.created2012-02-23T11:05:46Z
dc.date.issued2011
dc.identifier.citation2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom)nb_NO
dc.identifier.isbn978-0-7695-4622-3
dc.identifier.urihttp://hdl.handle.net/11250/2475804
dc.description.abstractCloud computing is a new computing model, and security is ranked first among its challenges. This paper reviews existing security monitoring mechanisms compared with new challenges which are caused by this new model. We highlight possible weaknesses in existing monitoring mechanisms, and propose approaches to mitigate them.nb_NO
dc.language.isoengnb_NO
dc.publisherIEEEnb_NO
dc.relation.ispartofCloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on
dc.titleMonitoring Intrusions and Security Breaches in Highly Distributed Cloud Environmentsnb_NO
dc.typeChapternb_NO
dc.typeConference objectnb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber772-777nb_NO
dc.identifier.doi10.1109/CloudCom.2011.119
dc.identifier.cristin911349
dc.description.localcode© 2011 IEEE. This is the authors' accepted manuscript. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for telematikk
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record