Serious Security Flaws Identified in Cloud Systems

被引:0
|
作者
Garber, Lee
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:21 / 23
页数:3
相关论文
共 50 条
  • [1] SoK: Benchmarking Flaws in Systems Security
    van der Kouwe, Erik
    Heiser, Gernot
    Andriesse, Dennis
    Bos, Herbert
    Giuffrida, Cristiano
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 310 - 325
  • [2] Security Flaws and Improvement of A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Khor, Jing Huey
    Sidorov, Michail
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 487 - 491
  • [3] SERIOUS GAMES EXPERIENCE IN TEACHING CLOUD SECURITY
    Szilvia Ruboczki, Edit
    [J]. ICERI2016: 9TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2016, : 1388 - 1393
  • [4] Critical security flaws in electronic commerce systems
    Moyer, Philip R.
    [J]. Computer Security Journal, 14 (04): : 7 - 15
  • [5] An Analysis With Serious Flaws
    Nunn, Andrew J.
    Phillips, Patrick P. J.
    [J]. CLINICAL INFECTIOUS DISEASES, 2013, 57 (07) : 1064 - +
  • [6] SERIOUS FLAWS - REPLY
    BESSMAN, JD
    WILLIAMS, LJ
    GILMER, PR
    [J]. AMERICAN JOURNAL OF CLINICAL PATHOLOGY, 1982, 77 (02) : 232 - 233
  • [7] SECURITY FLAWS
    Teodoro, Jose
    [J]. FILM COMMENT, 2019, 55 (05) : 50 - 53
  • [8] A Taxonomy for Security Flaws in Event-Based Systems
    Lee, Youn Kyu
    Kim, Dohoon
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 21
  • [9] REPORT HAS SERIOUS FLAWS
    HORAK, D
    [J]. FISHERIES, 1994, 19 (04) : 18 - 21
  • [10] Security on distributed systems: Cloud security versus traditional IT
    Himmel, M. Azua
    Grossman, F.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2014, 58 (01)