DOI:10.1109/EMS.2013.86
Corpus ID: 795263
Evaluating Firewall Models for Hybrid Clouds
H. Kurdi, Madeeha Enazi, A. Alfaries
Published 2013
Computer Science, Engineering

2013 European Modelling Symposium
Cloud computing offers flexible IT solutions that suites the growingly dynamic organizational demands. Different types of cloud deployment models offer distinctive solutions based on the security… Expand
View On IEEE
Doi.Org
Share This Paper




4 Citations
Background Citations
2
Figures and Topics from this paper
Figure 1
Figure 2
Figure 3
Figure 5
Figure 6
Firewall (computing)
Cloud computing
Web traffic
Software deployment
Response time (technology)
Requirement
Point-to-Point Protocol
4 Citations
Impacts of VPNs and Firewalls on Public Cloud Performance
Alaa AlQhtani, Ebtesam Aloboud, Rasha Altamimi, H. Kurdi
Computer Science
2017 European Modelling Symposium (EMS)
2017
Performance evaluation of fuzzy integrated firewall model for hybrid cloud based on packet utilization
Ziaur Rahman, Asma Islam Swapna, Habibur Rahman Habib, Akramuzzaman Shaoun
Computer Science
2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI)
2016
PDF
Extrusion detection of illegal files in cloud-based systems
Robert Hegarty, J. Haggerty
Computer Science
Int. J. Space Based Situated Comput.
2015
14 Citations
PDF
An Algorithm for Handling Starvation and Resource Rejection in Public Clouds
H. Kurdi, Ebtesam Aloboud, S. Alhassan, E. Alotaibi
Computer Science
FNC/MobiSPC

2014
7 Citations
References
SHOWING 1-10 OF 11 REFERENCES
Personal Cloud Computing Security Framework
Sang-Ho Na, Jun-Young Park, Eui-nam Huh
Computer Science
2010 IEEE Asia-Pacific Services Computing Conference
2010
36 Citations
PDF
Security SLAs for Federated Cloud Services
Karin Bernsmed, M. Jaatun, P. H. Meland, A. Undheim
Computer Science
2011 Sixth International Conference on Availability, Reliability and Security
2011
92 Citations
Secure Networking for Virtual Machines in the Cloud
Miika Komu, Mohit Sethi, Ramasivakarthik Mallavarapu, Heikki Oirola, R. Khan, Sasu Tarkoma
Computer Science
2012 IEEE International Conference on Cluster Computing Workshops
2012
26 Citations
PDF
Cloud computing security auditing
I.A. Gul, Atiq ur Rehman, M. H. Islam
Business
The 2nd International Conference on Next Generation Information Technology
2011
69 Citations
Infrastructure management of hybrid cloud for enterprise users
Shixing Yan, Bu-Sung Lee, Guopeng Zhao, Ding Ma, Peer Mohamed
Business
2011 5th International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM)
2011
25 Citations
Complex Service Management in a Hybrid Cloud
Changshen Kang, R. Strong, H. Fang, T. Chen, James Rhodes, R. Zhou
Computer Science
2011 Annual SRII Global Conference
2011
7 Citations
Security and Architectural Issues for National Security Cloud Computing
Anya Kim, J. McDermott, Myong H. Kang
Computer Science
2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
2010
16 Citations
Cloud computing and cloud security challenges
Zhang Yandong, Z. Yongsheng
Computer Science
2012 International Symposium on Information Technologies in Medicine and Education
2012
35 Citations
Security Concept and Implementation for a Cloud Based E-science Infrastructure
Thomas Ludescher, T. Feilhauer, P. Brezany
Computer Science
2012 Seventh International Conference on Availability, Reliability and Security
2012
9 Citations
Data Security and Privacy Protection Issues in Cloud Computing
Dr.P.K. Rai, R. Bunkar, V. Mishra
Computer Science
2014
196 Citations
...
1
2
...
SORT BY
Related Papers
Proposing a hybrid-intelligent framework to secure e-government web applications
Asaad Moosa, E. Alsaffar
Computer Science
ICEGOV '08

2008
One of the essential needs to implement a successful e-Government web application is security. Web application firewalls...
10 Citations
Improving cloud network security using the Tree-Rule firewall
Xiangjian He, T. Chomsiri, P. Nanda, Zhiyuan Tan
Computer ScienceFuture Gener. Comput. Syst.
2014
This study proposes a new model of firewall called the 'Tree-Rule Firewall', which offers various benefits and is applic...
43 Citations
Show More
2/10
Abstract
Figures and Topics
4 Citations
11 References
Related Papers
Stay Connected With Semantic Scholar
What Is Semantic Scholar?
Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI.
Learn More
About
About Us
Publishers
Beta Program
Contact
Research
Team
Datasets
Open Corpus
Supp.ai
Resources
Librarians
Tutorials
FAQ
API
Proudly built by AI2
Terms of ServicePrivacy Policy
By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License
ACCEPT & CONTINUE