z-logo
open-access-imgOpen Access
A cybersecurity model in cloud computing environments
Author(s) -
Latifa Ben Arfa Rabai,
Mouna Jouini,
Anis Ben Aissa,
Ali Mili
Publication year - 2012
Publication title -
journal of king saud university - computer and information sciences
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.617
H-Index - 33
eISSN - 2213-1248
pISSN - 1319-1578
DOI - 10.1016/j.jksuci.2012.06.002
Subject(s) - cloud computing , flexibility (engineering) , computer science , computer security , cloud computing security , measure (data warehouse) , utility computing , commodity , scale (ratio) , business , database , operating system , economics , finance , physics , management , quantum mechanics
Cloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, convenience but it raises major issues, not least of which are: loss of control and loss of security. In this paper, we explore a user-centered measure of cyber-security, and see how this measure can be used to analyze cloud computing as a business model

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom