Analyzing Cloud Computing Security Issues and Challenges
暂无分享,去创建一个
Deepa Bura | Neeti Mehra | Shalu Aggarwal | Ankita Shokeen | Shalu Aggarwal | Deepa Bura | N. Mehra | Ankita Shokeen
[1] Paul Rodrigues,et al. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.
[2] Rajkumar Buyya,et al. Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation , 2009, CloudCom.
[3] Nabil Ahmed Sultan,et al. International Journal of Information Management , 2010 .
[4] Wolter Pieters,et al. Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider , 2012, European Data Protection.
[5] Michael Kretzschmar,et al. Security management interoperability challenges for Collaborative Clouds , 2010, 2010 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management.
[6] Hassan Takabi,et al. Semantic-based policy management for cloud computing environments , 2012, Int. J. Cloud Comput..
[7] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[8] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[9] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[10] Andrew B. Whinston,et al. Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction with ASP Services , 2003, MIS Q..
[11] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[12] Bo Wang,et al. The application of cloud computing in education informatization , 2011, 2011 International Conference on Computer Science and Service System (CSSS).
[13] Dan Lin,et al. Preventing Information Leakage from Indexing in the Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[14] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[15] Rania Fahim El-Gazzar,et al. A Literature Review on Cloud Computing Adoption Issues in Enterprises , 2014, TDIT.
[16] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[17] Thomas Gross,et al. Defense-in-Depth Against Malicious Insiders in the Cloud , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).
[18] Isaac Agudo,et al. BlindIdM: A privacy-preserving approach for identity management as a service , 2014, International Journal of Information Security.
[19] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[20] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[21] Manpreet Kaur,et al. A Review of Cloud Computing Security Issues , 2015 .
[22] Nikolay Borissov,et al. Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..