Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing
暂无分享,去创建一个
[1] Naixue Xiong,et al. Security and Privacy in Cloud Computing: A Survey , 2013, CloudCom 2013.
[2] Gerard Briscoe,et al. Community Cloud Computing , 2009, CloudCom.
[3] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[4] Jinzhu Kong. A Practical Approach to Improve the Data Privacy of Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[5] Sadie Creese,et al. Inadequacies of Current Risk Controls for the Cloud , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[6] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[7] Frederick R. Carlson,et al. Security Analysis of Cloud Computing , 2014, ArXiv.
[8] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[9] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[10] Ali Khajeh-Hosseini,et al. Research Agenda in Cloud Technologies , 2010, ArXiv.
[11] Jianfeng Yang,et al. Cloud Computing Research and Security Issues , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[12] Shilpashree Srinivasamurthy,et al. Survey on Cloud Computing Security , 2010 .
[13] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .