Identifying the Top Threats in Cloud Computing and Its Suggested Solutions: A Survey
暂无分享,去创建一个
[1] Yasir Ahmed Hamza,et al. Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing , 2013 .
[2] Sheetal Kalra,et al. A Survey on Security Threats in Cloud ComputingTechnology , 2014 .
[3] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..
[4] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[5] Raheem A. Beyah,et al. MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] D. Meng. Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.
[7] Khaled M. Khan. Security Dynamics of Cloud Computing , 2009 .
[8] Song Guo,et al. Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Deepak H. Sharma,et al. Cloud Computing - Understanding Risk, Threats, Vulnerability and Controls: A Survey , 2013 .
[10] O KuyoroS.. Survey of Cloud Computing Issues at Implementation Level , 2013 .
[11] Erik Elmroth,et al. The Cloud Supply Chain : A Framework for Information, Monitoring, Accounting and Billing , 2011, CloudCom 2011.
[12] Colin Ting Si Xue,et al. Benefits and Challenges of the Adoption of Cloud Computing in Business , 2016, CloudCom 2016.
[13] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[14] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[15] William Allen,et al. Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions , 2016 .
[16] D. Manivannan,et al. A Classification and Characterization of Security Threats in Cloud Computing , 2016, Int. J. Next Gener. Comput..
[17] Ruby B. Lee,et al. BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[18] A. B. Dieker,et al. Cloud Computing Operations Research , 2013 .
[19] Artur Rot,et al. Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection , 2017, FedCSIS.
[20] Massimiliano Rak,et al. Stealthy Denial of Service Strategy in Cloud Computing , 2015, IEEE Transactions on Cloud Computing.
[21] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[22] Stephen J. Cohen,et al. A Decision Framework for Cloud Computing , 2012, 2012 45th Hawaii International Conference on System Sciences.
[23] Wanchun Dou,et al. A clusterized firewall framework for cloud computing , 2014, 2014 IEEE International Conference on Communications (ICC).
[24] Abdullah Ebrahim Alsaadi,et al. Conceptualising the Right to Data Protection in an Era of Big Data , 2016 .
[25] Yao Zheng,et al. DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[26] Ciprian RACUCIU,et al. THREATS AND RISKS IN CLOUD COMPUTING , 2015 .
[27] Xuejiao Liu,et al. Efficient distributed access control for big data in clouds , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Garima Gupta,et al. A Survey on Cloud Security Issues and Techniques , 2014, RCIS 2014.
[29] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[30] Martine Bellaïche,et al. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.
[31] Martin Knahl,et al. Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[32] Weimin Zheng,et al. Defend Against Denial of Service Attack with VMM , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.
[33] Atulay Mahajan,et al. The Malicious Insiders Threat in the Cloud , 2015 .
[34] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.