Articles with "proactive security" as a keyword



Photo from wikipedia

R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01860-z

Abstract: Cloud service provide the information security to protect the data using broad set of privacy policies and controls. Various security mechanisms concentrates the reality of key leakage issues to deal the security policy. The problem… read more here.

Keywords: proactive security; security encryption; encryption standard; security ... See more keywords
Photo by scottwebb from unsplash

ProSAS: Proactive Security Auditing System for Clouds

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3062204

Abstract: The multi-tenancy in a cloud along with its dynamic and self-service nature could cause severe security concerns, such as isolation breaches among cloud tenants. To mitigate such concerns and ensure the accountability and transparency of… read more here.

Keywords: auditing system; proactive security; security; cloud ... See more keywords
Photo by scottwebb from unsplash

Proactive Security-Constrained Unit Commitment Against Typhoon Disasters: An Approximate Dynamic Programming Approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3208574

Abstract: Proactive security-constrained unit commitment (SCUC) is one of the effective resilience-oriented responses to keep the secure operation of the power system during natural disasters. The approaches proposed in the previous research works cannot guarantee high-quality… read more here.

Keywords: unit commitment; security constrained; constrained unit; typhoon ... See more keywords
Photo by scottwebb from unsplash

The Importance of Security Is in the Eye of the Beholder: Cultural, Organizational, and Personal Factors Affecting the Implementation of Security by Design

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Software Engineering"

DOI: 10.1109/tse.2021.3119721

Abstract: Security by design is a recommended approach, addressing end-to-end security and privacy in the design of software systems. To realize this approach, proactive security behavior is required from software developers. This research follows results from… read more here.

Keywords: software; security behavior; proactive security; design ... See more keywords