메뉴 건너뛰기




Volumn , Issue , 2013, Pages 432-439

Developing secure cloud applications: A case study

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84904560034     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SYNASC.2013.63     Document Type: Conference Paper
Times cited : (1)

References (27)
  • 7
    • 84882403734 scopus 로고    scopus 로고
    • Security event correlation approach for cloud computing
    • M. Ficco, "Security event correlation approach for cloud computing," High Performance Computing and Networking, vol. 7, no. 3, pp. 173-185, 2013.
    • (2013) High Performance Computing and Networking , vol.7 , Issue.3 , pp. 173-185
    • Ficco, M.1
  • 12
  • 21
    • 34548131684 scopus 로고    scopus 로고
    • Integrating software specification into intrusion detection
    • M. Zulkernine, M. Graves, and M. Khan, "Integrating software specification into intrusion detection," Journal on Information Security, vol. 6, pp. 345-357, 2007.
    • (2007) Journal on Information Security , vol.6 , pp. 345-357
    • Zulkernine, M.1    Graves, M.2    Khan, M.3
  • 23
    • 33847617890 scopus 로고    scopus 로고
    • Intrusion detection aware componentbased system: A specification-based framework
    • M. Hussein and M. Zulkernine, "Intrusion detection aware componentbased system: A specification-based framework," Journal of System and Software, vol. 80, no. 5, pp. 700-710, 2007.
    • (2007) Journal of System and Software , vol.80 , Issue.5 , pp. 700-710
    • Hussein, M.1    Zulkernine, M.2
  • 25
    • 0036090387 scopus 로고    scopus 로고
    • Statl-an attack language for state-based intrusion detection
    • S. Eckmann, G. Vigna, and R. Kemmerer, "Statl-an attack language for state-based intrusion detection," Journal of Computer Security, vol. 10, no. 1-2, pp. 71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 27
    • 33947368645 scopus 로고    scopus 로고
    • Model-based security analysis in seven steps-A guided tour to the coras method
    • F. den Braber, I. Hogganvik, M. Lund, K. Stlen, and F. Vraalsen, "Model-based security analysis in seven steps-A guided tour to the coras method," BT Technology Journal, vol. 25, no. 1, pp. 101-117, 2007.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Den Braber, F.1    Hogganvik, I.2    Lund, M.3    Stlen, K.4    Vraalsen, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.