• Corpus ID: 1115257

MEGHNAD V 2 . 0 : MOGA-Based Insurance Model for Cloud Service Security and Compliance

@inproceedings{Dasgupta2012MEGHNADV2,
  title={MEGHNAD V 2 . 0 : MOGA-Based Insurance Model for Cloud Service Security and Compliance},
  author={Dipankar Dasgupta and Durdana Naseem},
  year={2012}
}
Many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructure. Security requirements are a basic necessity for all service models along with the essential need to satisfy compliance requirements. Moreover, compliance for each service model requires different specific protection for online data such as Accountability, Transparency, Accuracy, Security and Access. The main focus is to find new methods to manage risk factors and compliance… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 27 REFERENCES
Estimating Security Coverage for Cloud Services
  • D. Dasgupta, Md. Moshiur Rahman
  • Computer Science
    2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
TLDR
A framework to estimate security coverage for different type of service offerings is described, called MEGHNAD, which can serve as a specialized Cloud Doctor in prescribing the right combination of security tools for different cloud services and according to the level of security assurance required.
A framework for estimating security coverage for cloud service insurance
TLDR
This work uses an intelligent search and optimization method for determining a combination of tools (from a knowledgebase of security products--considering their features, effectiveness and consumer/vulnerability reports in mitigating risks) in providing multi-level defense for cloud services.
SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Probability and Accountability Act (HIPAA) Security Rule, which discusses security
The HIPAA Privacy Rule: An Overview of Compliance Initiatives and Requirements; the Privacy Rule Contains a Maze of Mandates and Exceptions Requiring That Entities Covered by HIPAA Need the Best of Health Care Counsel
The Privacy Project The Privacy Rule contains a maze of mandates and exceptions requiring that entities covered by HIPAA need the best of health care counsel THE Health Insurance Portability and
jMetal: A Java framework for multi-objective optimization
TLDR
This paper describes jMetal, an object-oriented Java-based framework aimed at the development, experimentation, and study of metaheuristics for solving multi-objective optimization problems, and includes two case studies to illustrate the use of jMetal in both solving a problem with a metaheuristic and designing and performing an experimental study.
A fast and elitist multiobjective genetic algorithm: NSGA-II
TLDR
This paper suggests a non-dominated sorting-based MOEA, called NSGA-II (Non-dominated Sorting Genetic Algorithm II), which alleviates all of the above three difficulties, and modify the definition of dominance in order to solve constrained multi-objective problems efficiently.
NetWrix FISMA Compliance
  • NetWrix FISMA Compliance
  • 2012
Cyber Security Operations Centre Initial Guidance Department of Defense
  • Intelligence and Security
  • 2011
Defining Best Practices in Cloud Computing
  • Defining Best Practices in Cloud Computing
  • 2011
Requirements and Security Assessment Procedures
  • Requirements and Security Assessment Procedures
  • 2010
...
1
2
3
...