A layered security approach for cloud computing infrastructure

dc.contributor.author Mehmet Yildiz
dc.contributor.author Jemal H. Abawajy
dc.contributor.author Tuncay Ercan
dc.contributor.author Andrew Bernoth
dc.date.accessioned 2025-10-06T17:53:12Z
dc.date.issued 2009
dc.description.abstract This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS Utility Web Platform and Managed Services Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope. © 2009 IEEE. © 2010 Elsevier B.V. All rights reserved.
dc.description.sponsorship Intel Microsoft Research Stark Technologies Inc., Computer Society of the Republic of China
dc.identifier.doi 10.1109/I-SPAN.2009.157
dc.identifier.isbn 9780769539089
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-77949849343&doi=10.1109%2FI-SPAN.2009.157&partnerID=40&md5=81cec5c7b5758d2aaefaa921a61eb1df
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/10315
dc.language.iso English
dc.relation.ispartof 10th International Symposium on Pervasive Systems Algorithms and Networks I-SPAN 2009
dc.subject Cloud Computing, Dynamic Infrastructure, Grid Computing, Security, Service Oriented Architectures, Utility Computing, Virtualization, Cloud Computing, Dynamic Infrastructure, Infrastructure Security, Internet Integration, Layered Security, Literature Reviews, Managed Service, Security Approach, Security Considerations, Security Model, System Development Life Cycles, Utility Computing, Virtualizations, Information Services, Service Oriented Architecture (soa), Grid Computing
dc.subject Cloud computing, Dynamic infrastructure, Infrastructure security, Internet integration, Layered security, Literature reviews, Managed service, Security approach, Security considerations, Security model, System development life cycles, Utility computing, Virtualizations, Information services, Service oriented architecture (SOA), Grid computing
dc.title A layered security approach for cloud computing infrastructure
dc.type Conference Object
dspace.entity.type Publication
gdc.bip.impulseclass C4
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.type text::conference output
gdc.collaboration.industrial false
gdc.description.endpage 767
gdc.description.startpage 763
gdc.identifier.openalex W2169282973
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 18.0
gdc.oaire.influence 8.720892E-9
gdc.oaire.isgreen true
gdc.oaire.popularity 6.1432774E-9
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 02 engineering and technology
gdc.openalex.collaboration International
gdc.openalex.fwci 23.2421
gdc.openalex.normalizedpercentile 0.99
gdc.openalex.toppercent TOP 1%
gdc.opencitations.count 40
gdc.plumx.crossrefcites 21
gdc.plumx.mendeley 127
gdc.plumx.scopuscites 56
oaire.citation.endPage 767
oaire.citation.startPage 763
person.identifier.scopus-author-id Yildiz- Mehmet (57196876634), Abawajy- Jemal H. (8937496700), Ercan- Tuncay (21933416500), Bernoth- Andrew (35758417800)
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files