Lahmar et al., 2021 - Google Patents
Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCALahmar et al., 2021
View PDF- Document ID
- 5269615201159816881
- Author
- Lahmar F
- Mezni H
- Publication year
- Publication venue
- Soft Computing
External Links
Snippet
With the emergence of cloud computing and to better satisfy users' complex requirements in front of the huge number of cloud services, these latter may be combined while considering the virtualized environment's constraints, including quality of services, security policies …
- 239000000203 mixture 0 title abstract description 172
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lahmar et al. | Security-aware multi-cloud service composition by exploiting rough sets and fuzzy FCA | |
US20240022607A1 (en) | Automated and adaptive model-driven security system and method for operating the same | |
US11823017B2 (en) | Interoperation of machine learning algorithms | |
US11451398B2 (en) | Management of interoperating machine learning algorithms | |
US11698818B2 (en) | Load balancing of machine learning algorithms | |
US20200274894A1 (en) | Anomaly scoring using collaborative filtering | |
US20230396635A1 (en) | Adaptive system for network and security management | |
Sallow et al. | An investigation for mobile malware behavioral and detection techniques based on android platform | |
US20210142206A1 (en) | Adaptation of machine learning algorithms | |
WO2018206407A1 (en) | Autonomous logic modules | |
KR102738467B1 (en) | Protect your computer assets from malicious attacks | |
Polatidis et al. | Recommender systems meeting security: From product recommendation to cyber-attack prediction | |
Berdibayev et al. | A concept of the architecture and creation for siem system in critical infrastructure | |
Datta et al. | A user-centric threat model and repository for cyber attacks | |
Vorobeychik et al. | Plan interdiction games | |
Deng et al. | A flexible RBAC model based on trust in open system | |
US12231434B1 (en) | Cloud data attack surface tracking using graph-based excessive privilege detection | |
Jiang et al. | A Survey on Vulnerability Prioritization: Taxonomy, Metrics, and Research Challenges | |
Argyropoulos et al. | Decision-making in security requirements engineering with constrained goal models | |
Sathya et al. | Network activity classification schema in IDS and log audit for cloud computing | |
Patel et al. | Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations | |
Aljohani | Transforming data‐intensive workflows: A cutting‐edge multi‐layer security and quality aware security framework | |
Harikrishna et al. | Securing the fog computing environment and enhancing resource allocation | |
US12321491B2 (en) | Risk event detection using activity and graph-based context for cloud data security posture management | |
US20250007952A1 (en) | Cyber twin of ngfw for security posture management |