Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model
暂无分享,去创建一个
[1] No License,et al. Intel ® 64 and IA-32 Architectures Software Developer ’ s Manual Volume 3 A : System Programming Guide , Part 1 , 2006 .
[2] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[3] Mohammad Hammoudeh,et al. A Survey on Data Confidentiality and Privacy in Cloud Computing , 2017, ICFNDS.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Karen Mercedes Goertzel. Enhancing the Development Life Cycle To Produce Secure Software , 2008 .
[6] Ruby B. Lee,et al. New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.
[7] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[8] M. Aramudhan,et al. Security Issues: Public vs Private vs Hybrid Cloud Computing , 2012 .
[9] Jennifer Rexford,et al. NoHype: virtualized cloud infrastructure without the virtualization , 2010, ISCA.
[10] B. Joshi,et al. Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.
[11] Xiaodi Huang,et al. Cloud Computing for Higher Education: A roadmap , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[12] John Grundy,et al. TOSSMA: A Tenant-Oriented SaaS Security Management Architecture , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[13] Tanupriya Choudhury,et al. Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[14] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[15] Anca Ioana Andreescu,et al. Using Cloud Computing in Higher Education: A Strategy to Improve Agility in the Current Financial Crisis , 2011 .
[16] Jennifer Rexford,et al. Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.
[17] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[18] John Liederbach,et al. Digital Crime and Digital Terrorism , 2005 .
[19] Diana Bohm,et al. Computer And Information Security Handbook , 2016 .
[20] Nureni Ayofe Azeez,et al. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis , 2019, Egyptian Informatics Journal.