An Enhanced Attack Graph Model Based Technique to Mitigate Zombie Attack in Cloud Computing using Fuzzy Logic
Abstract
Full Text:
PDFReferences
Chirag Langaliya, Rajanikanth Aluvalu, “Enhancing Cloud Security through Access Control Models: A Survey”, International Journal of Computer Applications, ISSN: 0975 – 8887, Volume 112, No. 7, February 2015, pp: 8-12
Prachi Shah, “Data Security for Cloud Storage System Using Role Based Access Control”, International Journal of Science and Research, ISSN (Online): 2319-7064, Volume 4 Issue 1, January 2015, pp: 305-307
RajaniKanth Aluvalu, Lakshmi Muddana, “A Survey on Access Control Models in Cloud Computing”, Advances in Intelligent Systems and Computing, Volume: 1, 2016, pp: 653-664
B. Mahesh Babu, Mary Saira Bhanu, “Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud”, Eleventh International Multi-Conference on Information Processing, Volume: 54, 2015, pp: 157-166
Daniel Stock, Matthias Stöhr, Ursula Rauschecker, Thomas Bauernhansl, "Cloud-based Platform to facilitate Access to Manufacturing IT", 8th International Conference on Digital Enterprise Technology, Vol: 25, 2014, pp: 320-328
Jordan Shropshire, "Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design", 47th Hawaii International Conference on System Science, 2014, pp: 5008-5017
Rizwana Shaikh, M. Sasikumar, "Trust Model for Measuring Security Strength of Cloud Computing Service", International Conference on Advanced Computing Technologies and Applications, Vol: 45, 2015, pp: 380-389
Shams Zawoad, Ragib Hasan, John Grimes, "LINCS: Towards building a trustworthy litigation hold enabled cloud storage system", DFRWS, 2015
Rizwana Shaikh, M. Sasikumar, "Data Classification for achieving Security in cloud computing", Vol: 45, 2015, pp: 493-498
M.Arun Fera, C.manikandaprabhu, Ilakiya Natarajan, K.Brinda, R.Darathiprincy, "Enhancing security in Cloud using Trusted Monitoring Framework", International Conference on Intelligent Computing, Communication & Convergence, Vol: 48, 2015, pp: 198-203
DOI: https://doi.org/10.23956/ijarcsse.v7i8.51
Refbacks
- There are currently no refbacks.