{"title":"基于云的关键信息基础设施安全保护机制","authors":"B. van Niekerk, Pierre Jacobs","doi":"10.1109/ICASTECH.2013.6707515","DOIUrl":null,"url":null,"abstract":"In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Cloud-based security mechanisms for critical information infrastructure protection\",\"authors\":\"B. van Niekerk, Pierre Jacobs\",\"doi\":\"10.1109/ICASTECH.2013.6707515\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.\",\"PeriodicalId\":173317,\"journal\":{\"name\":\"2013 International Conference on Adaptive Science and Technology\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Adaptive Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASTECH.2013.6707515\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Adaptive Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASTECH.2013.6707515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud-based security mechanisms for critical information infrastructure protection
In this paper the suitability of cloud-based security services (SECaaS) for critical information infrastructure protection (CIIP) is discussed. A background of cloud-based security services is provided. The suitability of these services for CIIP is discussed, and it is concluded that a mixed cloud and traditional solution is best. A model for providing cloud-based protection to critical infrastructure in this manner is proposed.