[go: up one dir, main page]

Lahmar et al., 2021 - Google Patents

Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA

Lahmar et al., 2021

View PDF
Document ID
5269615201159816881
Author
Lahmar F
Mezni H
Publication year
Publication venue
Soft Computing

External Links

Snippet

With the emergence of cloud computing and to better satisfy users' complex requirements in front of the huge number of cloud services, these latter may be combined while considering the virtualized environment's constraints, including quality of services, security policies …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Lahmar et al. Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA
US20240022607A1 (en) Automated and adaptive model-driven security system and method for operating the same
US11823017B2 (en) Interoperation of machine learning algorithms
US11451398B2 (en) Management of interoperating machine learning algorithms
US11698818B2 (en) Load balancing of machine learning algorithms
US20200274894A1 (en) Anomaly scoring using collaborative filtering
US20230396635A1 (en) Adaptive system for network and security management
Sallow et al. An investigation for mobile malware behavioral and detection techniques based on android platform
US20210142206A1 (en) Adaptation of machine learning algorithms
WO2018206407A1 (en) Autonomous logic modules
KR102738467B1 (en) Protect your computer assets from malicious attacks
Polatidis et al. Recommender systems meeting security: From product recommendation to cyber-attack prediction
Berdibayev et al. A concept of the architecture and creation for siem system in critical infrastructure
Datta et al. A user-centric threat model and repository for cyber attacks
Vorobeychik et al. Plan interdiction games
Deng et al. A flexible RBAC model based on trust in open system
US12231434B1 (en) Cloud data attack surface tracking using graph-based excessive privilege detection
Jiang et al. A Survey on Vulnerability Prioritization: Taxonomy, Metrics, and Research Challenges
Argyropoulos et al. Decision-making in security requirements engineering with constrained goal models
Sathya et al. Network activity classification schema in IDS and log audit for cloud computing
Patel et al. Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Aljohani Transforming data‐intensive workflows: A cutting‐edge multi‐layer security and quality aware security framework
Harikrishna et al. Securing the fog computing environment and enhancing resource allocation
US12321491B2 (en) Risk event detection using activity and graph-based context for cloud data security posture management
US20250007952A1 (en) Cyber twin of ngfw for security posture management