최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of information technology and web engineering : an official publication of the Information Resources Management Association, v.11 no.3, 2016년, pp.50 - 64
Khan, Nabeel , Al-Yasiri, Adil
초록이 없습니다.
Al-Ayyoub. M., Jararweh. Y., Benkhelifa. E., Vouk. M., & Rindos. A. (2015). SDSecurity: a software defined security experimental framework. Proceedings of the 2015 IEEE International Conference onCommunication Workshop (ICCW) (pp. 1871-1876). IEEE.
Almulla, S. A., & Yeun, C. Y. (2010). Cloud Computing Security Management, Engineering Systems Management and Its Applications (ICESMA. Proceedings of the2010 Second International Conference on Cloud Security.
Anne Thomas, M. (2008, December 5). Cloud Computing: the Gap between Hype and Reality (Presentation). Proceedings of the Burton Group ECAR Symposium, Boca Raton, FL, USA.
10.1147/JRD.2009.5429060 Berger, S., Cáceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, JR., Rom, E., Sailer, R.., Schildhauer, W., Srinivasan, D., Tal, S., & Valdez, E. (2009). Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., 53(4), 560-571.
G.Blokdijk 2009 Cloud Computing - the Complete Cornerstone Guide to Cloud Computing Best Practices: Concepts, Terms, and Techniques for Successfully Planning
Carlin, Sean, Curran, Kevin. Cloud Computing Security :. International journal of ambient computing and intelligence, vol.3, no.1, 14-19.
Centre for the Protection of National Infrastructure. (2010). Information Security Briefing 01/2010 Cloud Computing.
10.1016/j.ijinfomgt.2013.01.005 Chang, V., Walters, R.J., & Will, G. (2013) The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3).
Cloud Security Alliance. (2010). Top Threats to Cloud Computing V1.0.
Cloud Security Alliance. (2011). Security guidance for critical areas of focus in Cloud Computing V3.0.
Cloud Security Alliance. (2012). SecaaS implementation guidance, category 1: identity and Access management.
Dawoud, W., Takouna, I., & Meinel, C. (2010). Infrastructure as a service security: Challenges and solutions. Proceedings of the 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany (pp 1-8).
ENISA. (2009). Cloud Computing: benefits, risks and recommendations for information Security.
Security challenges in Cloud Computing L.Ertaul 2010 36 Proceedings of the 2010 International conference on Security and Management SAM’10
Garfinkel, T., & Rosenblum, M. (2005). When virtual is harder than real: Security challenges in virtual machine based computing environments, Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM, USA (Vol. 10, pp 227-229). USENIX Association Berkeley, CA, USA.
S.Gautam 2010 Enterprise Cloud Computing: Technology, Architecture, Applications
L.Gillam 2010 Cloud Computing: Principles, Systems and Applications
Grobauer, B, Walloschek, T, Stocker, E. Understanding Cloud Computing Vulnerabilities. IEEE security & privacy, vol.9, no.2, 50-57.
Harnik, Danny, Pinkas, Benny, Shulman-Peleg, Alexandra. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE security & privacy, vol.8, no.6, 40-47.
Himmel, M.A. (2012). Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks. ETD Collection for Pace University.
IBM. (2010). Defining a framework for cloud adoption (Technical paper).
Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.. Software defined cloud: Survey, system and evaluation. Future generation computer systems : FGCS, vol.58, 56-74.
G.Jung 2013 Cloud Advisor: a recommendation-as-a-service platform for Cloud configuration and pricing. Proceedings of the IEEE ninth world congress on service
Li, W., Ping, L.. Trust Model to Enhance Security and Interoperability of Cloud Environment. Lecture notes in computer science, vol.5931, 69-79.
Marinos, A., Briscoe, G.. Community Cloud Computing. Lecture notes in computer science, vol.5931, 472-484.
Martens, Benedikt, Teuteberg, Frank. Decision-making in cloud computing environments: A cost and risk based approach. Information systems frontiers, vol.14, no.4, 871-893.
T.Mather 2009 Cloud Security and Privacy
Morsy, M.A. Grundy, J., & Müller, I. (2010). An analysis of the Cloud Computing Security problem. Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia.
S.Nedev 2014 Exploring the Factors Influencing the Adoption of Cloud Computing and the Challenges Faced by the Business
OWASP. (2010). The Ten most critical Web application Security risks.
Reuben, J. S. (2007, October). A survey on virtual machine Security. Seminar on Network Security (Technical report). Helsinki University of Technology.
J. W.Rittinghouse 2007 Security in the Cloud, Cloud Computing. Implementation, Management, and Security
J. W.Rittinghouse 2009 Security in the Cloud, Cloud Computing. Implementation, Management, and Security
Santos, N., Gummadi, K. P., & Rodrigues, R. (2009). Towards Trusted Cloud Computing, Proceedings of the 2009 conference on Hot topics in cloud computing, San Diego, California.
Singh, L.V., Bole, A.V., & Yadav, S.K. (2015, January). Security Issues of Cloud Computing- A Survey. International Journal of Advance Research in Computer Science and Management Studies, 3(1).
A Survey on Data Storage and Security in Cloud Computing V.Spoorthy 2014 306 6 International Journal of Computer Science and Mobile Computing IJCSMC 3
M.Tebaa 2012 86 Homomorphic encryption method applied to Cloud Computing. Proceedings of the National Days of Network Security and Systems (JNS2)
Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., & Liu, J. (2015). Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Transactions on Services Computing, 99(99).
Study of Security Issues in Cloud Computing A.Varsha Wadhwa 2015 230 6 International Journal of Computer Science and Mobile Computing IJCSMC 4
Viega, J.. Cloud Computing and the Common Man. Computer, vol.42, no.8, 106-108.
Walliman, N. (2012). Your Undergraduate Dissertation: The Essential Guide for Success (2nd ed.). London: Sage Publications.
10.1007/s12599-009-0071-2 Weinhardt, C., Anandasivam, A., Blau, B., Borissov, N., Meinl, T., Michalk, W., & Stober, J. (2009). Cloud Computing - A Classification, Business Models, and Research Directions. Journal of Business and Information Systems Engineering.
V.Winkler 2011 Securing the Cloud: Cloud computer Security techniques and tactics
Wu, H., Ding, Y., Winer, C., & Yao, L. (2010). Network Security for virtual machine in Cloud Computing. Proceedings of the 5th International conference on computer sciences and convergence information technology (ICCIT) (pp. 18-21).
Wu, H., Ding, Y., Winer, C., & Yao, L. (2010). Network Security for virtual machine in Cloud Computing. Proceedings of the 5th International conference on computer sciences and convergence information technology (ICCIT) (pp. 18-21).
J.Wylie 2015 Selecting the right data distribution scheme for a survivable Storage system
G.Xiaopeng 2010 395 VNSS: a Network Security sandbox for virtual Computing environment. Proceedings of the IEEE youth conference on information Computing and telecommunications (YC-ICT)
10.1002/sec.1405 Yaseen, Q., Althebyan. Q., Panda. B., & Jararweh. Y. (2016). Mitigating insider threat in cloud relational databases. Security and Communication Networks, 9(10), 1132-1145.
10.1109/APTC.2008.15 Zhang, F., Huang, Y., Wang, H., Chen, H., & Zang, B. (2008). PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection. Proceedings of the Third Asia- Pacific Trusted Infrastructure Technologies Conference APTC’08 (pp. 9-18). IEEE Computer Society, Washington, DC, USA.
Zhao, G., Liu, J., Tang, Y., Sun, W., Zhang, F., Ye, X., Tang, N.. Cloud Computing: A Statistics Aspect of Users. Lecture notes in computer science, vol.5931, 347-358.
Zissis, D., Lekkas, D.. Addressing cloud computing security issues. Future generation computer systems : FGCS, vol.28, no.3, 583-592.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.