Security event correlation approach for cloud computing.
Massimo FiccoPublished in: Int. J. High Perform. Comput. Netw. (2013)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- network access
- computing resources
- trusted computing
- identity management
- remote attestation
- data management
- data center
- big data
- cloud services
- service providers
- computing infrastructure
- distributed computing
- business models
- security mechanisms
- computing technologies
- information security
- cloud computing platform
- load balancing
- intrusion detection
- computing platform
- grid computing
- virtual machine
- middleware architecture
- access control