Security Issues in Cloud Computing - A Review
暂无分享,去创建一个
[1] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[2] A. Behl,et al. An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.
[3] Josef Kittler,et al. Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.
[4] Said El Hajji,et al. Homomorphic Encryption Applied to the Cloud Computing Security , 2012 .
[5] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[6] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[7] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[8] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[9] Tharam S. Dillon,et al. SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[10] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[11] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[12] Hai Jin,et al. Efficient Password-based Two Factors Authentication in Cloud Computing , 2012 .
[13] Robert E. Lyons,et al. The Use of Triple-Modular Redundancy to Improve Computer Reliability , 1962, IBM J. Res. Dev..
[14] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[15] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[16] B. B. Amberker,et al. Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation , 2012, 2012 International Symposium on Cloud and Services Computing.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Rajkumar Buyya,et al. High Performance Cluster Computing , 1999 .
[19] Jie Wu,et al. Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..
[20] Yan Bai,et al. Design and Implementation of a Secure Healthcare Social Cloud System , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[21] R. V. van Nieuwpoort,et al. The Grid 2: Blueprint for a New Computing Infrastructure , 2003 .
[22] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[23] Eric Pardede,et al. A New approach using redundancy technique to improve security in cloud computing , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[24] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[25] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[26] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[27] Elizabeth Chang,et al. Conceptual SLA framework for cloud computing , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[28] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[29] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[30] Siani Pearson,et al. End-to-End Policy-Based Encryption and Management of Data in the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.