On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019‏ - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

Automation for network security configuration: State of the art and research trends

D Bringhenti, G Marchetto, R Sisto… - ACM Computing Surveys, 2023‏ - dl.acm.org
The size and complexity of modern computer networks are progressively increasing, as a
consequence of novel architectural paradigms such as the Internet of Things and network …

RETRACTED ARTICLE: Analysis of security issues of cloud-based web applications

S Mishra, SK Sharma, MA Alowaidi - Journal of Ambient Intelligence and …, 2021‏ - Springer
The Cloud computing is a powerful tool to optimize the cost in terms of hardware,
controllable, utility to sharing the data, due to abovementioned features most of the …

A kubernetes ci/cd pipeline with asylo as a trusted execution environment abstraction framework

J Mahboob, J Coffman - 2021 IEEE 11th Annual Computing …, 2021‏ - ieeexplore.ieee.org
Modern commercial software development organizations frequently prescribe to a
development and deployment pattern for releases known as continuous …

Toward automated security analysis and enforcement for cloud computing using graphical models for security

S An, A Leung, JB Hong, T Eom, JS Park - IEEe Access, 2022‏ - ieeexplore.ieee.org
Cloud computing has become widely adopted by businesses for hosting applications with
improved performance at a fraction of the operational costs and complexity. The rise of cloud …

[HTML][HTML] Evaluation of time-based virtual machine migration as moving target defense against host-based attacks

M Torquato, P Maciel, M Vieira - Journal of Systems and Software, 2025‏ - Elsevier
Abstract Moving Target Defense (MTD) consists of applying dynamic reconfiguration in the
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …

Short paper: Automatic configuration for an optimal channel protection in virtualized networks

D Bringhenti, G Marchetto, R Sisto… - Proceedings of the 2nd …, 2020‏ - dl.acm.org
Data confidentiality, integrity and authentication are security properties which are often
enforced with the generation of secure channels, such as Virtual Private Networks, over …

A literature survey of security issues in Cloud, Fog, and Edge IT infrastructure

P Akello, NL Beebe, KKR Choo - Electronic Commerce Research, 2022‏ - Springer
Increasing complexity in and interconnectivity between technologies and systems (eg, cloud
computing, Internet of Things (IoT), fog and edge computing) can complicate data …

A review on cloud security issues and solutions

AR Chaudhari, BN Gohil… - Journal of Computer …, 2023‏ - content.iospress.com
Cloud computing provides computing resources, platforms, and applications as a service in
a flexible, cost-effective, and efficient way. Cloud computing has integrated with industry and …

Locally-centralized certificate validation and its application in desktop virtualization systems

B Li, J Lin, Q Wang, Z Wang… - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
To validate a certificate, a user needs to install the certificate of the root certification authority
(CA) and download the certificate revocation information (CRI). Although operating systems …