Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 6
Page No. 544 - 551

Coalition Technique Protecting Cloud Storage by Shielding it Against Intrusion

Authors : D. Seethalakshmi and G.M. Nasira

References

Bai, K., H. Wang and P. Liu, 2005. Towards database firewalls. Proceedings of the 19th Annual Working Conference on Data and Applications Security and Privacy, August 7-10, 2005, Springer, Berlin, Germany, pp: 178-192.

Bates, D., A. Barth and C. Jackson, 2010. Regular expressions considered harmful in client-side XSS filters. Proceedings of the 19th International Conference on World Wide Web, April 26-30, 2010, ACM, Raleigh, North Carolina, ISBN:978-1-60558-799-8, pp: 91-100.

Boneh, D. and M.K. Franklin, 2001. Identity-based Encryption from the Weil Pairing. In: Advances in Cryptology, Kilian, J. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-42456-7, pp: 213-229.

Boneh, D., X. Boyen and H. Shacham, 2004. Short Group Signatures. In: Advances in Cryptology-CRYPToZ004, Franklin, M.K. (Ed.). LNCS 3152. Springer, Berlin, pp: 41-55.

Christodorescu, M. and S. Jha, 2006. Static analysis of executables to detect malicious patterns. MSc Thesis, Dept of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin.

Debar, H., M. Dacier and A. Wespi, 1999. Towards a taxonomy of intrusion-detection systems. Comput. Networks, 31: 805-822.
CrossRef  |  Direct Link  |  

Dolev, D. and A.C. Yao, 1983. On the security of public key protocols. IEEE Trans. Inform. Theor., 29: 198-208.

Frohlich, B. and J. Plate, 2000. The cubic mouse: A new device for three-dimensional input. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 01-06, 2000, ACM, Hague, Netherlands, ISBN:1-58113-216-6, pp: 526-531.

NVD., 2017. Subscribe to updates from NVD, SCAP, XCCDF and emerging specifications: Announcement and discussion lists. Northern Vision Development, Whitehorse, Canada. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4333.

Nabeel, M., N. Shang and E. Bertino, 2013. Privacy preserving policy-based content sharing in public clouds. IEEE. Trans. Knowl. Data Eng., 25: 2602-2614.
CrossRef  |  Direct Link  |  

Sekar, R., 2009. An efficient black-box technique for defeating web application attacks. Master Thesis, Stony Brook University, Stony Brook, New York.

Stavrou, A., C.G.F. Cretu, M.E. Locasto and S.J. Stolfo, 2009. Keep your friends close: The necessity for updating an anomaly sensor with legitimate environment changes. Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, November 09-09, 2009, ACM, Chicago, Illinois, USA., ISBN:978-1-60558-781-3, pp: 39-46.

Tupakula, U.K. and V. Varadharajan, 2003. A practical method to counteract denial of service attacks. Proceedings of the 26th International Conference on Australasian Computer Science Vol. 16, February, 14, 2003, Australian Computer Society, Adelaide, Australia, ISBN:0-909-92594-1, pp: 275-284.

Wagner, D. and D. Dean, 2001. Intrusion detection via static analysis. Proceedings of the IEEE Symposium on Security and Privacy, May 14-16, Oakland, CA., USA., pp: 156-168.

Yu, Y.T. and M.F. Lau, 2006. A comparison of MC-DC, MUMCUT and several other coverage criteria for logical decisions. J. Syst. Software, 79: 577-590.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved