Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
暂无分享,去创建一个
Ming Yang | Jia Wang | Tilei Gao | Rong Jiang | Wanyu Xie | Ming Yang | Rong Jiang | Tilei Gao | W. Xie | Jia Wang
[1] Mushtaq Ahmad. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service , 2010, ISA.
[2] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[3] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .
[4] Hiroyuki Sato,et al. Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.
[5] Richard Morrell,et al. Cloud computing: new challenges and opportunities , 2011, Netw. Secur..
[6] Wang Zhao-cheng. Research on Information Security Risk Assessment Based on Cloud Computing Model , 2011 .
[7] Liao Ming-hua. An Approach for Campus Information Systems Security Risk Assessment Based on Fuzzy Set and Entropy Weight , 2013 .
[8] Zhu Sheng. Cloud Computing Security Risk Assessment Based on Level Protection Strategy , 2013 .
[9] Liu Bao-xu. Model for Cloud Computing Security Assessment Based on Classified Protection , 2013 .
[10] X Duan. Research on supply chain partner selection based on Markov chain dynamic fuzzy evaluation in cloud computing , 2014 .
[11] H. Föllmer,et al. Consistent Risk Measures and a non-linear Extension of Backwards Martingale Convergence. , 2015 .
[12] Fei Xiang,et al. A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks , 2016, Int. J. Netw. Secur..
[13] Carla Merkle Westphall,et al. A framework and risk assessment approaches for risk-based access control in the cloud , 2016, J. Netw. Comput. Appl..
[14] Guoyu Bai,et al. A risk matrix analysis method based on potential risk influence: A case study on cryogenic liquid hydrogen filling system , 2016 .
[15] Min-Shiang Hwang,et al. A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..
[16] Latifa Ben Arfa Rabai,et al. Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems , 2016, ANT/SEIT.
[17] Min-Shiang Hwang,et al. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..
[18] Sovan Mitra. Efficient option risk measurement with reduced model risk , 2017 .
[19] Umesh Kumar Singh,et al. Information Security Risk Management Framework for University Computing Environment , 2017, Int. J. Netw. Secur..
[20] Hongbin Zhang,et al. Access Control Based Resource Allocation in Cloud Computing Environment , 2017, Int. J. Netw. Secur..
[21] Nicola Loperfido,et al. Data breaches: Goodness of fit, pricing, and risk measurement , 2017 .
[22] Myeonggil Choi. The Security Risks of Cloud Computing , 2019 .