A Layered Security Approach for Cloud Computing Infrastructure
Citations
288 citations
Cites background from "A Layered Security Approach for Clo..."
...From the works of the aforementioned researchers (Archer et al., 2010; Chow et al., 2009; Grobauer et al., 2010; Wrenn, 2010; Yildiz et al., 2009) we can summarize that there is a hardware limitation of compartmentalization....
[...]
...Yildiz et al. (2009) cited the example of mainframes where secure separation is possible but the cost is always unacceptable to the SaaS providers....
[...]
83 citations
82 citations
Cites background from "A Layered Security Approach for Clo..."
...Again, using the generally accepted terminology [1][2][3][4][5][6][7], there are Public Clouds, which are analogous to ISP’s and Service Providers offering routed IP in the Internet world....
[...]
...Work detailing high level architectures for Intercloud interoperability were proposed next [4][5]....
[...]
79 citations
79 citations
References
[...]
2,265 citations
609 citations
"A Layered Security Approach for Clo..." refers background in this paper
...Cloud computing is receiving traction with businesses and has become increasingly popular for hosting data and deploying software and services....
[...]
600 citations
"A Layered Security Approach for Clo..." refers background in this paper
...We also present a dynamic infrastructure security model....
[...]
218 citations
"A Layered Security Approach for Clo..." refers background in this paper
...Although cloud computing provides a number of advantages that include economies of scale, dynamic provisioning, increased flexibility and low capital expenditures, it also introduces a range of new security risks [22]....
[...]
88 citations
"A Layered Security Approach for Clo..." refers background in this paper
...Key words: Cloud computing, Grid computing, Utility computing, Dynamic infrastructure, Security, Virtualization, Service Oriented Architectures....
[...]