Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systems.
Hamza HammamiHanen BrahmiSadok Ben YahiaPublished in: ICOIN (2018)
Keyphrases
- cloud computing
- intrusion detection system
- network security
- intrusion detection
- network access
- service providers
- anomaly detection
- computing resources
- computing infrastructure
- computer security
- cloud services
- security issues
- identity management
- intrusion prevention
- cloud platform
- data center
- cyber attacks
- security architecture
- cloud computing environment
- computer networks
- cyber security
- private cloud
- network traffic
- cloud infrastructure
- information security
- security policies
- network intrusion detection
- middleware architecture
- service level agreements
- cloud storage
- data privacy
- utility computing
- data management
- fraud detection
- computer systems
- internet services
- web services
- access control
- database
- software as a service
- security mechanisms
- security requirements
- load balancing
- database systems