Cloud Computing: Security Issues and Research Challenges
暂无分享,去创建一个
Manas Ranjan Patra | Rabi Prasad Padhy | Suresh Chandra Satapathy | Oracle India Pvt | S. Satapathy | M. Patra | R. Padhy
[1] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[2] V. T. Raja,et al. Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..
[3] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[4] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[5] Marco Aiello,et al. International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises , 2009 .
[6] Liang-Jie Zhang,et al. CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.
[7] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[8] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[9] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10] Anirban Kundu,et al. Introducing New Services in Cloud Computing Environment , 2010, J. Digit. Content Technol. its Appl..
[11] Anders Eriksson,et al. What Networking of Information Can Do for Cloud Computing , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[12] Dimitris Gritzalis,et al. The Insider Threat in Cloud Computing , 2011, CRITIS.
[13] Xuejie Zhang,et al. Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[14] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[15] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[16] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[17] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[18] Xiaowei Yang,et al. Comparing Public-Cloud Providers , 2011, IEEE Internet Computing.
[19] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[20] Miguel Correia,et al. Lucy in the sky without diamonds: Stealing confidential data in the cloud , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[21] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[22] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[23] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[24] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..