dc.contributor.author | Taheri Monfared, Aryan | |
dc.contributor.author | Jaatun, Martin Gilje | |
dc.date.accessioned | 2018-01-04T16:22:43Z | |
dc.date.available | 2018-01-04T16:22:43Z | |
dc.date.created | 2012-02-23T11:05:46Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom) | nb_NO |
dc.identifier.isbn | 978-0-7695-4622-3 | |
dc.identifier.uri | http://hdl.handle.net/11250/2475804 | |
dc.description.abstract | Cloud computing is a new computing model, and security is ranked first among its challenges. This paper reviews existing security monitoring mechanisms compared with new challenges which are caused by this new model. We highlight possible weaknesses in existing monitoring mechanisms, and propose approaches to mitigate them. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | IEEE | nb_NO |
dc.relation.ispartof | Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on | |
dc.title | Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 772-777 | nb_NO |
dc.identifier.doi | 10.1109/CloudCom.2011.119 | |
dc.identifier.cristin | 911349 | |
dc.description.localcode | © 2011 IEEE. This is the authors' accepted manuscript. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for telematikk | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |