咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Security-as-a-Service with Cyb... 收藏

Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud

作     者:Junchao Wang Jianmin Pang Jin Wei 

作者机构:State Key Laboratory of Mathematical Engineering and Advanced ComputingZhengZhouChina School of Computer ScienceFudan UniversityShanghaiChina Shanghai Key Laboratory of Data ScienceFudan UniversityShanghaiChina 

出 版 物:《国际计算机前沿大会会议论文集》 (International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE))

年 卷 期:2021年第2期

页      面:129-138页

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Key Research and Development Program of China(2017YFB0803202) Major Scientific Research Project of Zhejiang Lab(No.2018FD0ZX01) National Core Electronic Devices,High-end Generic Chips and Basic Software Major Projects(2017ZX01030301) the National Natural Science Foundation of China(No.61309020)and the National Natural Science Fund for Creative Research Groups Project(No.61521003) 

主  题:Cyberspace mimic defense Software diversity Security-as-a-Service Multi-compiler Application deployment 

摘      要:Users usually focus on the application-level requirements which are quite friendly and direct to ***,there are no existing tools automating the application-level requirements to infrastructure provisioning and application *** some security issues have been solved during the development phase,the undiscovered vulnerabilities remain hidden threats to the application’s *** mimic defense(CMD)technologies can help to enhance the application’s security despite the existence of the *** this paper,the concept of SECurity-as-a-Service(SECaaS)is proposed with CMD technologies in cloud *** experiment on it was *** is found that the application’s security is greatly improved to meet the user’s security and performance requirements within budgets through *** experimental results show that SECaaS can help the users to focus on application-level requirements(monetary costs,required security level,etc.)and automate the process of application orchestration.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分