ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING
暂无分享,去创建一个
[1] Alfred Basta,et al. Computer Security and Penetration Testing , 2007 .
[2] Chittaranjan Hota,et al. Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .
[3] Robert H. Deng,et al. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.
[4] Wahyu Kusuma,et al. Journal of Theoretical and Applied Information Technology , 2012 .
[5] A. Volokyta,et al. Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.
[6] Judith Hurwitz,et al. Cloud Computing for Dummies , 2009 .
[7] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[8] G. Geetha Kumari,et al. API access control in cloud using the Role Based Access Control Model , 2010, Trendz in Information Sciences & Computing(TISC2010).
[9] Ei Ei Mon,et al. The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[10] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[11] Mudhakar Srivatsa,et al. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach , 2008, TWEB.
[12] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[13] Paul England,et al. Resource management for isolation enhanced cloud services , 2009, CCSW '09.
[14] Derek Atkins,et al. Threat Analysis of the Domain Name System (DNS) , 2004, RFC.
[15] Zhuoqing Morley Mao,et al. Practical defenses against BGP prefix hijacking , 2007, CoNEXT '07.