From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015‏ - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Evolution of attacks, threat models, and solutions for virtualized systems

D Sgandurra, E Lupu - ACM Computing Surveys (CSUR), 2016‏ - dl.acm.org
Virtualization technology enables Cloud providers to efficiently use their computing services
and resources. Even if the benefits in terms of performance, maintenance, and cost are …

Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment

M Saleem, MR Warsi, S Islam - Journal of Information Security and …, 2023‏ - Elsevier
Trust is an essential security component and plays a crucial role in building secure
information processing systems. Many organizations have adopted zero-trust principles in …

Formal reasoning about the security of amazon web services

N Schear, PT Cable, TM Moyer, B Richard… - Proceedings of the 32nd …, 2016‏ - dl.acm.org
Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the
provider to secure applications and data. Cloud providers do not offer the ability to create …

[كتاب][B] Large scale and big data: Processing and management

S Sakr, M Gaber - 2014‏ - books.google.com
This book provides a central source of reference on the various data management
techniques of large scale data processing and its technology application. This book presents …

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments

M Kazim, L Liu, SY Zhu - IEEE Access, 2018‏ - ieeexplore.ieee.org
IoT devices have complex requirements but their limitations in terms of storage, network,
computing, data analytics, scalability, and big data management require it to be used it with …