Location-Based Security Framework for Cloud Perimeters

The authors present an approach to compose firewall policies to protect mobile and static cloud perimeters. The approach introduces location in the firewall to filter out attacks from unsafe locations, which requires identification of unsafe locations. The authors present two ways to discover attack locations for mobile and static clouds.