Research on security evaluation of cloud computing based on attack graph.
Yexia ChengYuejin DuJunfeng XuChunyang YuanZhi XuePublished in: CCIS (2012)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- enterprise network
- cloud storage
- data privacy
- attack graph
- computing resources
- network access
- data center
- service providers
- trusted computing
- cloud services
- data management
- security mechanisms
- computing infrastructure
- business models
- information security
- computing platform
- cloud computing platform
- virtual machine
- cost effective
- load balancing
- intrusion detection
- intrusion detection system
- operating system
- access control
- real time
- cloud platform