A Layered Security Approach for Cloud Computing Infrastructure
| dc.contributor.author | Mehmet Yildiz | |
| dc.contributor.author | Jemal Abawajy | |
| dc.contributor.author | Tuncay Ercan | |
| dc.contributor.author | Andrew Bernoth | |
| dc.contributor.author | Ercan, Tuncay | |
| dc.contributor.author | Bernoth, Andrew | |
| dc.contributor.author | Abawajy, Jemal | |
| dc.contributor.author | Yildiz, Mehmet | |
| dc.coverage.spatial | 10th International Symposium on Pervasive Systems Algorithms and Networks | |
| dc.date.accessioned | 2025-10-06T16:22:01Z | |
| dc.date.issued | 2009 | |
| dc.description.abstract | This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS Utility Web Platform and Managed Services Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope. | |
| dc.description.sponsorship | Intel, Microsoft Research, Stark Technologies Inc.; Computer Society of the Republic of China | |
| dc.identifier.doi | 10.1109/I-SPAN.2009.157 | |
| dc.identifier.isbn | 978-1-4244-5403-7 | |
| dc.identifier.isbn | 9781424454037 | |
| dc.identifier.isbn | 9780769539089 | |
| dc.identifier.scopus | 2-s2.0-77949849343 | |
| dc.identifier.uri | http://dx.doi.org/10.1109/I-SPAN.2009.157 | |
| dc.identifier.uri | https://gcris.yasar.edu.tr/handle/123456789/7178 | |
| dc.identifier.uri | https://doi.org/10.1109/I-SPAN.2009.157 | |
| dc.language.iso | English | |
| dc.publisher | IEEE | |
| dc.relation.ispartof | 10th International Symposium on Pervasive Systems Algorithms and Networks | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.source | 2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS ALGORITHMS AND NETWORKS (ISPAN 2009) | |
| dc.subject | Cloud computing, Grid computing, Utility computing, Dynamic infrastructure, Security, Virtualization, Service Oriented Architectures | |
| dc.subject | Dynamic Infrastructure | |
| dc.subject | Security | |
| dc.subject | Utility Computing | |
| dc.subject | Virtualization | |
| dc.subject | Grid Computing | |
| dc.subject | Cloud Computing | |
| dc.subject | Service Oriented Architectures | |
| dc.title | A Layered Security Approach for Cloud Computing Infrastructure | |
| dc.type | Conference Object | |
| dspace.entity.type | Publication | |
| gdc.author.id | Ercan, Tuncay/0000-0003-0014-5106 | |
| gdc.author.scopusid | 57196876634 | |
| gdc.author.scopusid | 21933416500 | |
| gdc.author.scopusid | 8937496700 | |
| gdc.author.scopusid | 35758417800 | |
| gdc.author.wosid | Abawajy, Jemal/A-1802-2008 | |
| gdc.author.wosid | Ercan, Tuncay/F-9938-2011 | |
| gdc.bip.impulseclass | C4 | |
| gdc.bip.influenceclass | C4 | |
| gdc.bip.popularityclass | C4 | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | ||
| gdc.description.departmenttemp | [Yildiz, Mehmet; Bernoth, Andrew] IBM Australia, Global Technol Serv, Melbourne, Vic, Australia; [Ercan, Tuncay] Yasar Univ, Dept Comp Engn, Izmir, Turkey; [Abawajy, Jemal] Deakin Univ, Sch Engn & Informat Technol, Geelong, Vic, Australia | |
| gdc.description.endpage | 767 | |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| gdc.description.startpage | 763 | |
| gdc.description.woscitationindex | Conference Proceedings Citation Index - Science | |
| gdc.identifier.openalex | W2169282973 | |
| gdc.identifier.wos | WOS:000291013200136 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 18.0 | |
| gdc.oaire.influence | 8.720892E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.popularity | 6.1432774E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 23.2421 | |
| gdc.openalex.normalizedpercentile | 0.99 | |
| gdc.openalex.toppercent | TOP 1% | |
| gdc.opencitations.count | 40 | |
| gdc.plumx.crossrefcites | 21 | |
| gdc.plumx.mendeley | 127 | |
| gdc.plumx.scopuscites | 56 | |
| gdc.scopus.citedcount | 56 | |
| gdc.virtual.author | Ercan, Ahmet Tuncay | |
| gdc.wos.citedcount | 24 | |
| oaire.citation.endPage | + | |
| oaire.citation.startPage | 763 | |
| person.identifier.orcid | Ercan- Tuncay/0000-0003-0014-5106 | |
| relation.isAuthorOfPublication | d5d6046c-9c23-4c09-8227-6778ec4ba06b | |
| relation.isAuthorOfPublication.latestForDiscovery | d5d6046c-9c23-4c09-8227-6778ec4ba06b | |
| relation.isOrgUnitOfPublication | ac5ddece-c76d-476d-ab30-e4d3029dee37 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ac5ddece-c76d-476d-ab30-e4d3029dee37 |
