Securing Software Application Chains in a Cloud
Title | Securing Software Application Chains in a Cloud |
Publication Type | Conference Proceedings |
Year of Publication | 2015 |
Authors | Donghoon Kim, Mladen A. Vouk |
Conference Name | 2nd International Conference on Information Science and Security (ICISS), 2015 |
Pagination | 1-4 |
Date Published | 14-16 December |
Publisher | IEEE |
Conference Location | Seoul, Korea |
Keywords | Resilient Systems, science of security, Validation and Verification, Vulnerability and Resilience Prediction Models |
Abstract | This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with a security analytics package. This model can be applied to other cloud based systems. Depending on the information being received from the cloud, this approach can also offer information about internal states of the resources in |
DOI | 10.1109/ICISSEC.2015.7371032 |
Citation Key | node-26872 |