Principled design of the modern Web architecture
ACM Transactions on Internet Technology (TOIT)
OpenID 2.0: a platform for user-centric identity management
Proceedings of the second ACM workshop on Digital identity management
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Future Generation Computer Systems
Information Security Tech. Report
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Distributed Intrusion Detection in Clouds Using Mobile Agents
ADVCOMP '09 Proceedings of the 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Portable tunnel establishment with a strong authentication design for secure private cloud
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Cloud-based security services for the smart grid
CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research
Hi-index | 0.00 |
Cloud computing is a great target for many applications since it provides the storage and computation needs for cloud users with relatively low-cost. Although the area of cloud computing has grown rapidly in the last few years, the area still lacks appropriate security measures that protect the data and/or applications for cloud users. We introduce a new architecture, namely Security as a Service (SECaaS) that addresses the security issues for cloud-based applications. SECaaS deals with existing services of cloud computing on its different levels. SECaaS takes a user-centric approach, in which cloud users have more control over their security. It provides security means for both cloud users and providers.