Abstract
Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, the attackers can also use the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper we propose techniques for securing tenant transactions in the cloud.
Original language | English |
---|---|
Title of host publication | Proceedings |
Subtitle of host publication | IEEE Fifth International Conference on Cloud Computing Technology and Science |
Place of Publication | Piscataway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 525-530 |
Number of pages | 6 |
DOIs | |
Publication status | Published - 2013 |
Event | IEEE Fifth International Conference on Cloud Computing Technology and Science - Bristol, United Kingdom Duration: 2 Dec 2013 → 5 Dec 2013 |
Conference
Conference | IEEE Fifth International Conference on Cloud Computing Technology and Science |
---|---|
Country/Territory | United Kingdom |
City | Bristol |
Period | 2/12/13 → 5/12/13 |