Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks Article Swipe
Morgan Reece
,
Nidhi Rastogi
,
Theodore Lander
,
Josiah Dykstra
,
Sudip Mittal
,
Andy Sampson
·
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1145/3649158.3657051
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1145/3649158.3657051
Multi-cloud applications have become ubiquitous in today's organizations. Multi-cloud applications are being deployed across cloud service provider platforms to deliver services to all aspects of business. With the expansive use of multi-cloud environments, security is at the forefront of concerns when deploying and managing access to multi-cloud applications and the expanded attack surface of these applications. Attackers can exploit vulnerabilities in multi-cloud environments that expose privileged information to inevitable attack.
Related Topics
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3649158.3657051
- https://dl.acm.org/doi/pdf/10.1145/3649158.3657051
- OA Status
- gold
- Cited By
- 2
- References
- 12
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4399993534
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4399993534Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3649158.3657051Digital Object Identifier
- Title
-
Defending Multi-Cloud Applications Against Man-in-the-Middle AttacksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-06-24Full publication date if available
- Authors
-
Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy SampsonList of authors in order
- Landing page
-
https://doi.org/10.1145/3649158.3657051Publisher landing page
- PDF URL
-
https://dl.acm.org/doi/pdf/10.1145/3649158.3657051Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://dl.acm.org/doi/pdf/10.1145/3649158.3657051Direct OA link when available
- Concepts
-
Cloud computing, Computer science, Computer security, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2Per-year citation counts (last 5 years)
- References (count)
-
12Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4399993534 |
|---|---|
| doi | https://doi.org/10.1145/3649158.3657051 |
| ids.doi | https://doi.org/10.1145/3649158.3657051 |
| ids.openalex | https://openalex.org/W4399993534 |
| fwci | 3.05530053 |
| type | article |
| title | Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 52 |
| biblio.first_page | 47 |
| topics[0].id | https://openalex.org/T11614 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cloud Data Security Solutions |
| topics[1].id | https://openalex.org/T11424 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9988999962806702 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Security and Verification in Computing |
| topics[2].id | https://openalex.org/T10270 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9950000047683716 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Blockchain Technology Applications and Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7449691891670227 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6061458587646484 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5701737999916077 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C111919701 |
| concepts[3].level | 1 |
| concepts[3].score | 0.12121081352233887 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[3].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.7449691891670227 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6061458587646484 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.5701737999916077 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/operating-system |
| keywords[3].score | 0.12121081352233887 |
| keywords[3].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1145/3649158.3657051 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://dl.acm.org/doi/pdf/10.1145/3649158.3657051 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings of the 29th ACM Symposium on Access Control Models and Technologies |
| locations[0].landing_page_url | https://doi.org/10.1145/3649158.3657051 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5033905501 |
| authorships[0].author.orcid | https://orcid.org/0009-0008-1970-432X |
| authorships[0].author.display_name | Morgan Reece |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I99041443 |
| authorships[0].affiliations[0].raw_affiliation_string | Mississippi State University, Starkville, MS, USA |
| authorships[0].institutions[0].id | https://openalex.org/I99041443 |
| authorships[0].institutions[0].ror | https://ror.org/0432jq872 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210141039, https://openalex.org/I99041443 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | Mississippi State University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Morgan Reece |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Mississippi State University, Starkville, MS, USA |
| authorships[1].author.id | https://openalex.org/A5001140269 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2002-3213 |
| authorships[1].author.display_name | Nidhi Rastogi |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I155173764 |
| authorships[1].affiliations[0].raw_affiliation_string | Rochester Institute of Technology, Rochester, NY, USA |
| authorships[1].institutions[0].id | https://openalex.org/I155173764 |
| authorships[1].institutions[0].ror | https://ror.org/00v4yb702 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I155173764 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | Rochester Institute of Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Nidhi Rastogi |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Rochester Institute of Technology, Rochester, NY, USA |
| authorships[2].author.id | https://openalex.org/A5092108755 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Theodore Lander |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I99041443 |
| authorships[2].affiliations[0].raw_affiliation_string | Mississippi State University, Starkville, MS, USA |
| authorships[2].institutions[0].id | https://openalex.org/I99041443 |
| authorships[2].institutions[0].ror | https://ror.org/0432jq872 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210141039, https://openalex.org/I99041443 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | Mississippi State University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Theodore Lander |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Mississippi State University, Starkville, MS, USA |
| authorships[3].author.id | https://openalex.org/A5053229632 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3455-2562 |
| authorships[3].author.display_name | Josiah Dykstra |
| authorships[3].countries | US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I130440993 |
| authorships[3].affiliations[0].raw_affiliation_string | National Security Agency, Fort Meade, MD, USA |
| authorships[3].institutions[0].id | https://openalex.org/I130440993 |
| authorships[3].institutions[0].ror | https://ror.org/0047bvr32 |
| authorships[3].institutions[0].type | government |
| authorships[3].institutions[0].lineage | https://openalex.org/I130440993, https://openalex.org/I1330347796 |
| authorships[3].institutions[0].country_code | US |
| authorships[3].institutions[0].display_name | National Security Agency |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Josiah Dykstra |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | National Security Agency, Fort Meade, MD, USA |
| authorships[4].author.id | https://openalex.org/A5074949168 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-9151-8347 |
| authorships[4].author.display_name | Sudip Mittal |
| authorships[4].countries | US |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I99041443 |
| authorships[4].affiliations[0].raw_affiliation_string | Mississippi State University, Starkville, MS, USA |
| authorships[4].institutions[0].id | https://openalex.org/I99041443 |
| authorships[4].institutions[0].ror | https://ror.org/0432jq872 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I4210141039, https://openalex.org/I99041443 |
| authorships[4].institutions[0].country_code | US |
| authorships[4].institutions[0].display_name | Mississippi State University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Sudip Mittal |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Mississippi State University, Starkville, MS, USA |
| authorships[5].author.id | https://openalex.org/A5018127860 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Andy Sampson |
| authorships[5].countries | US |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I130440993 |
| authorships[5].affiliations[0].raw_affiliation_string | National Security Agency, Fort Meade, MD, USA |
| authorships[5].institutions[0].id | https://openalex.org/I130440993 |
| authorships[5].institutions[0].ror | https://ror.org/0047bvr32 |
| authorships[5].institutions[0].type | government |
| authorships[5].institutions[0].lineage | https://openalex.org/I130440993, https://openalex.org/I1330347796 |
| authorships[5].institutions[0].country_code | US |
| authorships[5].institutions[0].display_name | National Security Agency |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Andy Sampson |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | National Security Agency, Fort Meade, MD, USA |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://dl.acm.org/doi/pdf/10.1145/3649158.3657051 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11614 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cloud Data Security Solutions |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2748952813, https://openalex.org/W4244478748, https://openalex.org/W4223488648, https://openalex.org/W2134969820, https://openalex.org/W2251605416, https://openalex.org/W2560439919, https://openalex.org/W4389340727, https://openalex.org/W3150465815, https://openalex.org/W1997222214 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3649158.3657051 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3649158.3657051 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings of the 29th ACM Symposium on Access Control Models and Technologies |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3649158.3657051 |
| primary_location.id | doi:10.1145/3649158.3657051 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://dl.acm.org/doi/pdf/10.1145/3649158.3657051 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings of the 29th ACM Symposium on Access Control Models and Technologies |
| primary_location.landing_page_url | https://doi.org/10.1145/3649158.3657051 |
| publication_date | 2024-06-24 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W4297836393, https://openalex.org/W2908314267, https://openalex.org/W4312810470, https://openalex.org/W2163476793, https://openalex.org/W2032665639, https://openalex.org/W3208939081, https://openalex.org/W2965782153, https://openalex.org/W4230634801, https://openalex.org/W4206688049, https://openalex.org/W2783317467, https://openalex.org/W3192688457, https://openalex.org/W3196483090 |
| referenced_works_count | 12 |
| abstract_inverted_index.at | 35 |
| abstract_inverted_index.in | 5, 60 |
| abstract_inverted_index.is | 34 |
| abstract_inverted_index.of | 24, 30, 38, 53 |
| abstract_inverted_index.to | 18, 21, 45, 67 |
| abstract_inverted_index.all | 22 |
| abstract_inverted_index.and | 42, 48 |
| abstract_inverted_index.are | 10 |
| abstract_inverted_index.can | 57 |
| abstract_inverted_index.the | 27, 36, 49 |
| abstract_inverted_index.use | 29 |
| abstract_inverted_index.With | 26 |
| abstract_inverted_index.have | 2 |
| abstract_inverted_index.that | 63 |
| abstract_inverted_index.when | 40 |
| abstract_inverted_index.being | 11 |
| abstract_inverted_index.cloud | 14 |
| abstract_inverted_index.these | 54 |
| abstract_inverted_index.access | 44 |
| abstract_inverted_index.across | 13 |
| abstract_inverted_index.attack | 51 |
| abstract_inverted_index.become | 3 |
| abstract_inverted_index.expose | 64 |
| abstract_inverted_index.aspects | 23 |
| abstract_inverted_index.attack. | 69 |
| abstract_inverted_index.deliver | 19 |
| abstract_inverted_index.exploit | 58 |
| abstract_inverted_index.service | 15 |
| abstract_inverted_index.surface | 52 |
| abstract_inverted_index.today's | 6 |
| abstract_inverted_index.concerns | 39 |
| abstract_inverted_index.deployed | 12 |
| abstract_inverted_index.expanded | 50 |
| abstract_inverted_index.managing | 43 |
| abstract_inverted_index.provider | 16 |
| abstract_inverted_index.security | 33 |
| abstract_inverted_index.services | 20 |
| abstract_inverted_index.Attackers | 56 |
| abstract_inverted_index.business. | 25 |
| abstract_inverted_index.deploying | 41 |
| abstract_inverted_index.expansive | 28 |
| abstract_inverted_index.forefront | 37 |
| abstract_inverted_index.platforms | 17 |
| abstract_inverted_index.inevitable | 68 |
| abstract_inverted_index.privileged | 65 |
| abstract_inverted_index.ubiquitous | 4 |
| abstract_inverted_index.Multi-cloud | 0, 8 |
| abstract_inverted_index.information | 66 |
| abstract_inverted_index.multi-cloud | 31, 46, 61 |
| abstract_inverted_index.applications | 1, 9, 47 |
| abstract_inverted_index.environments | 62 |
| abstract_inverted_index.applications. | 55 |
| abstract_inverted_index.environments, | 32 |
| abstract_inverted_index.organizations. | 7 |
| abstract_inverted_index.vulnerabilities | 59 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 94 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.88527137 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |