Towards automated security policy enforcement in multi-tenant virtual data centers

  • Authors:
  • Serdar Cabuk;Chris I. Dalton;Konrad Eriksson;Dirk Kuhlmann;Harigovind V. Ramasamy;Gianluca Ramunno;Ahmad-Reza Sadeghi;Matthias Schunter;Christian Stüble

  • Affiliations:
  • Hewlett-Packard Labs, Bristol, UK. E-mails: serdar.cabuk@gmail.com, {cid, dirk.kuhlmann}@hp.com;Hewlett-Packard Labs, Bristol, UK. E-mails: serdar.cabuk@gmail.com, {cid, dirk.kuhlmann}@hp.com;IBM Zurich Research Laboratory, Rüschlikon, Switzerland. E-mails: {kon, mts}@zurich.ibm.com;Hewlett-Packard Labs, Bristol, UK. E-mails: serdar.cabuk@gmail.com, {cid, dirk.kuhlmann}@hp.com;IBM T. J. Watson Research Center, Hawthorne, NY, USA. E-mail: hvramasa@us.ibm.com;Politecnico di Torino, Turin, Italy. E-mail: ramunno@polito.it;Ruhr-University Bochum, Germany. E-mail: ahmad.sadeghi@trust.rub.de;IBM Zurich Research Laboratory, Rüschlikon, Switzerland. E-mails: {kon, mts}@zurich.ibm.com;Sirrix AG Security Technologies, Bochum, Germany. E-mail: stueble@sirrix.com

  • Venue:
  • Journal of Computer Security - EU-Funded ICT Research on Trust and Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial ...