Big Data Services Security and Security Challenges in Cloud Environment
暂无分享,去创建一个
Muthu Ramachandran | Victor I. Chang | Raed Alsufyani | Khursand Jama | Yulin Yao | V. Chang | M. Ramachandran | Raed Alsufyani | Yulin Yao | Khursand Jama
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[3] J. Bowyer Bell. The Irish troubles analyzed , 1993 .
[4] Sadie Creese,et al. The Cloud: Understanding the Security, Privacy and Trust Challenges , 2011 .
[5] Rusli Abdullah,et al. Security framework of cloud data storage based on Multi Agent system architecture - A pilot study , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.
[6] Richard G. Vedder,et al. Privacy and security , 1996, CSOC.
[7] Victor I. Chang,et al. Risk Analysis of Business Intelligence in Cloud Computing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[8] Victor I. Chang,et al. The development that leads to the Cloud Computing Business Framework , 2013, Int. J. Inf. Manag..
[9] Muthu Ramachandran,et al. A resiliency framework for an enterprise cloud , 2016, Int. J. Inf. Manag..
[10] Victor I. Chang,et al. The Business Intelligence as a Service in the Cloud , 2014, Future Gener. Comput. Syst..
[11] Victor I. Chang,et al. Cloud Storage in a Private Cloud Deployment - Lessons for Data Intensive Research , 2012, CLOSER.
[12] Ralph O’Brien,et al. Privacy and security , 2016 .
[13] Judith Bell,et al. 教育与社科研究入门指南(第三版) = Doing Your Research Project , 1999 .
[14] Robert John Walters,et al. Cloud Computing and Frameworks for Organisational Cloud Adoption , 2015 .
[15] Victor Chang,et al. Delivery and Adoption of Cloud Computing Services in Contemporary Organizations , 2015 .
[16] T. S. Raghu,et al. Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.
[17] Naser Movahhedinia,et al. A Model for User Trust in Cloud Computing , 2012, CloudCom 2012.
[18] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[19] Victor Chang,et al. A proposed model to analyse risk and return for Cloud adoption , 2014 .
[20] Rusli Abdullah,et al. Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture , 2012, J. Information Security.
[21] John Biggam,et al. Succeeding with your Master's Dissertation: A Step-by-Step Handbook , 2008 .
[22] Victor I. Chang,et al. Towards a Big Data system disaster recovery in a Private Cloud , 2015, Ad Hoc Networks.
[23] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[24] Mary Tate,et al. A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..