English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52351/87454 (60%)
Visitors : 9120828      Online Users : 221
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/93540

    Title: Comprehensive Security Integrated Model and Ontology within Cloud Computing
    Authors: Liu, Fong-Hao;Lo, Hsiang-Fu;Chen, Liang-Chu;Lee, Wei-Tsong
    Contributors: 淡江大學電機工程學系
    Keywords: Cloud computing;Knowledge base;Ontology;Knowledge engineering;Network attack classification
    Date: 2013-11
    Issue Date: 2014-01-22 16:41:40 (UTC+8)
    Publisher: 臺北市:臺灣學術網路管理委員會
    Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that bring up various security threats. They are extreme new, innumerous and mutational. Partial and fragmented network security knowledge is usually provided by traditional computer security systems, including IDS, anti-virus system, etc., and direct knowledge query of web search engines. However, they are unable to provide users with the comprehensive knowledge and rapid reaction solutions. Users are consequently hard to clarify the causes and consequences of network security problems. A Comprehensive Security Integrated (CSI) model with acquisition, storing, reusing and integration of network security knowledge for cloud computing is proposed to help understand and trace the suspicious network attack threats and origins. Also, several knowledge classes (frames) are constructed in the implementation for knowledge query and manipulation. The process of CSI model and how it provides the comprehensive knowledge for problem solving are then explained by demonstration cases. Moreover, the demonstration results indicate that the CSI model and the implementation are more efficient than traditional fragmented knowledge from web search.
    Relation: 網際網路技術學刊=Journal of Internet Technology 14(6),頁935-946
    DOI: 10.6138/JIT.2013.14.6.08
    Appears in Collections:[電機工程學系暨研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback