A layered security approach for cloud computing infrastructure

Yildiz, Mehmet, Abawajy, Jemal, Ercan, Tuncay and Bernoth, Andrew 2009, A layered security approach for cloud computing infrastructure, in ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, ISPAN, [Kaohsiung, Korea], pp. 763-767.

Attached Files
Name Description MIMEType Size Downloads

Title A layered security approach for cloud computing infrastructure
Author(s) Yildiz, Mehmet
Abawajy, Jemal
Ercan, Tuncay
Bernoth, Andrew
Conference name Pervasive Systems, Algorithms and Networks. Symposium (10th : 2009 : Kaohsiung, Korea)
Conference location Kaohsiung, Korea
Conference dates 14-16 Dec. 2009
Title of proceedings ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks
Editor(s) [Unknown]
Publication date 2009
Conference series International Symposium on the Pervasive Systems, Algorithms and Networks
Start page 763
End page 767
Total pages 5
Publisher ISPAN
Place of publication [Kaohsiung, Korea]
Summary This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.
ISBN 9781424454037
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890299 Computer Software and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2009, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30029094

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 3 times in TR Web of Science
Scopus Citation Count Cited 16 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 572 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jun 2010, 10:54:19 EST by Leanne Swaneveld

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.