All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

A Secure and LightWeight Approach for Critical Data Security in Cloud

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27740%2F12%3A86084779" target="_blank" >RIV/61989100:27740/12:86084779 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/CASoN.2012.6412421" target="_blank" >http://dx.doi.org/10.1109/CASoN.2012.6412421</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/CASoN.2012.6412421" target="_blank" >10.1109/CASoN.2012.6412421</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    A Secure and LightWeight Approach for Critical Data Security in Cloud

  • Original language description

    Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributedenvironment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical resources to look after in cloud environment is the data which is stored in files. The files can be configuration file at servers, or private user confidential files at users own work space but they all have a risk of data modification associated with them. If user data is modified through an attack then it will decline the trust of user on cloud services and if the important configuration files are modified, they will disrupt the functioning of cloud environment, like attacker can escalate its privileges and access to critical resources through such tampering and modifications to impor

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2012

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012 : 21 ? 23 November 2012, S?o Carlos, Brazil

  • ISBN

    978-1-4673-4793-8

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    315-320

  • Publisher name

    IEEE

  • Place of publication

    New York

  • Event location

    Sao Carlos

  • Event date

    Nov 21, 2012

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article