{"id":"https://openalex.org/W2505478273","doi":"https://doi.org/10.1109/infocom.2016.7524508","title":"Understanding security group usage in a public IaaS cloud","display_name":"Understanding security group usage in a public IaaS cloud","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2505478273","doi":"https://doi.org/10.1109/infocom.2016.7524508","mag":"2505478273"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2016.7524508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2016.7524508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113456828","display_name":"Cheng Jin","orcid":"https://orcid.org/0000-0001-7737-5781"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Cheng Jin","raw_affiliation_strings":["Computer Science Dept., University of Minnesota"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept., University of Minnesota","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101961676","display_name":"Abhinav Srivastava","orcid":"https://orcid.org/0000-0003-4995-2646"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhinav Srivastava","raw_affiliation_strings":["AT&T Research"],"affiliations":[{"raw_affiliation_string":"AT&T Research","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100622097","display_name":"Zhi-Li Zhang","orcid":"https://orcid.org/0000-0001-8584-2319"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhi-Li Zhang","raw_affiliation_strings":["Computer Science Dept., University of Minnesota"],"affiliations":[{"raw_affiliation_string":"Computer Science Dept., University of Minnesota","institution_ids":["https://openalex.org/I130238516"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113456828"],"corresponding_institution_ids":["https://openalex.org/I130238516"],"apc_list":null,"apc_paid":null,"fwci":3.3174,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.93246776,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8862660527229309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7759563326835632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7339569926261902},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6741009950637817},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5717703104019165},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.45665442943573},{"id":"https://openalex.org/keywords/cloud-service-provider","display_name":"Cloud service provider","score":0.45064717531204224},{"id":"https://openalex.org/keywords/socrates","display_name":"SOCRATES","score":0.4297909140586853},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.41316959261894226},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09291288256645203}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8862660527229309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7759563326835632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7339569926261902},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6741009950637817},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5717703104019165},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.45665442943573},{"id":"https://openalex.org/C2983819522","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud service provider","level":4,"score":0.45064717531204224},{"id":"https://openalex.org/C2779259174","wikidata":"https://www.wikidata.org/wiki/Q7553104","display_name":"SOCRATES","level":2,"score":0.4297909140586853},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.41316959261894226},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09291288256645203},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2016.7524508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2016.7524508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W78987640","https://openalex.org/W1982255089","https://openalex.org/W2022570654","https://openalex.org/W2050321691","https://openalex.org/W2077101621","https://openalex.org/W2120255160","https://openalex.org/W2122266630","https://openalex.org/W2140073547","https://openalex.org/W2166975838","https://openalex.org/W6678385351","https://openalex.org/W6902590832"],"related_works":["https://openalex.org/W2992381278","https://openalex.org/W2532081440","https://openalex.org/W1984615645","https://openalex.org/W2501254609","https://openalex.org/W2537266736","https://openalex.org/W2353177111","https://openalex.org/W1616490367","https://openalex.org/W1985332856","https://openalex.org/W4210544776","https://openalex.org/W2187935396"],"abstract_inverted_index":{"To":[0,170],"ensure":[1],"security,":[2],"cloud":[3,14,45,58,158,183,198],"service":[4],"providers":[5],"employ":[6],"security":[7,25,39,61,70,79,126,159,184,206],"groups":[8,26,62,160],"as":[9,152,154],"a":[10,75,95,194],"key":[11,164],"tool":[12,96],"for":[13],"tenants":[15,59,85,101,140,199],"to":[16,33,53,64,102,124,138,181,192,196],"protect":[17],"their":[18,205],"virtual":[19],"machines":[20],"(VMs)":[21],"from":[22],"attacks.":[23],"However,":[24],"can":[27],"be":[28],"complex":[29],"and":[30,55,63,82,93,104,109,121,161,191,202],"often":[31],"hard":[32],"configure,":[34],"which":[35,99],"may":[36],"result":[37],"in":[38,67,86,167],"vulnerabilities":[40],"that":[41],"impact":[42],"the":[43,107,143,148,163,171,179],"entire":[44],"platform.":[46],"The":[47],"goal":[48],"of":[49,78,157,173],"this":[50],"paper":[51],"is":[52,178],"investigate":[54],"understand":[56,106],"how":[57],"configure":[60],"assist":[65],"them":[66],"designing":[68],"better":[69,203],"groups.":[71],"We":[72,90],"first":[73,180],"conduct":[74],"measurement-based":[76],"analysis":[77],"group":[80,127,185,207],"configuration":[81],"usage":[83,150,186],"by":[84],"an":[87],"IaaS":[88,144],"cloud.":[89],"then":[91],"propose":[92],"develop":[94,193],"called":[97],"Socrates,":[98],"enables":[100],"visualize":[103],"hence":[105],"static":[108],"dynamic":[110],"access":[111],"relations":[112],"among":[113],"VMs.":[114,135],"Socrates":[115,137],"also":[116],"helps":[117],"diagnose":[118,201],"potential":[119],"misconfigurations":[120],"provides":[122],"suggestions":[123],"refine":[125,204],"configurations":[128],"based":[129,187],"on":[130,142,188],"observed":[131],"traffic":[132],"traversing":[133],"tenants'":[134],"Applying":[136],"all":[139],"hosted":[141],"cloud,":[145],"we":[146],"analyze":[147,182],"common":[149],"(\u201cgood\u201d":[151],"well":[153],"\u201cbad\u201d":[155],"practices)":[156],"report":[162],"lessons":[165],"learned":[166],"our":[168,174,176],"study.":[169],"best":[172],"knowledge,":[175],"work":[177],"real-world":[189],"datasets,":[190],"system":[195],"help":[197],"understand,":[200],"configurations.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
