![]() |
Volumn , Issue , 2012, Pages 446-450
|
The MEERKATS cloud security architecture
|
Author keywords
cloud security; deception; decoys; resource management
|
Indexed keywords
CLOUD SERVICES;
CONTINUOUS SYSTEM;
DECEPTION;
DECOYS;
DESIGN PRINCIPLES;
DISTRIBUTED MONITORING;
ECONOMIES OF SCALE;
KEY ELEMENTS;
LEVELS OF ABSTRACTION;
NOVEL ARCHITECTURE;
ON CURRENTS;
PROTECTION MECHANISMS;
RESOURCE MANAGEMENT;
SECURITY ARCHITECTURE;
WEB SERVICES;
DISTRIBUTED DATABASE SYSTEMS;
|
EID: 84866390219
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICDCSW.2012.42 Document Type: Conference Paper |
Times cited : (22)
|
References (13)
|