A Review of Challenges and Security Risks of Cloud Computing
暂无分享,去创建一个
Mohammed Hasan Ali | Yazan A. Alsariera | Hussam Alddin S. Ahmed | Mohamad Fadli Zolkipli | Laith M. Kadhum | M. F. Zolkipli | Y. A. Alsariera | M. H. Ali | H. A. Ahmed
[1] Madjid Merabti,et al. Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .
[2] B. Loganayagi,et al. Cloud computing in Stax Platform , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[3] Rajkumar Buyya,et al. Power‐aware provisioning of virtual machines for real‐time Cloud services , 2011, Concurr. Comput. Pract. Exp..
[4] Chuan Wang,et al. A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques , 2010, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications.
[5] Henry E. Schaffer,et al. X as a Service, Cloud Computing, and the Need for Good Judgment , 2009, IT Prof..
[6] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..
[7] Ana Cristina Oliveira,et al. Efficient network service level agreement monitoring for cloud computing systems , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[8] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[9] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[10] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[11] Sungyoung Lee,et al. Adoption issues for cloud computing , 2009, iiWAS.
[12] Lei Ren,et al. Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..
[13] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[14] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[15] S. Sujatha,et al. Creating virtual platform for cloud computing , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.
[16] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[17] Mikyung Kang,et al. Heterogeneous Cloud Computing , 2011, 2011 IEEE International Conference on Cluster Computing.
[18] B. Loganayagi,et al. Enhanced Cloud Security by Combining Virtualization and Policy Monitoring Techniques , 2012 .
[19] Nils Gruschka,et al. A survey of attacks on web services , 2009, Computer Science - Research and Development.
[20] Rajkumar Buyya,et al. Power-aware provisioning of Cloud resources for real-time services , 2009, MGC '09.
[21] Xiaofeng Liao,et al. Cloud computing privacy & security global issues, challenges, & mechanisms , 2011, 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM).
[22] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[23] Rubén S. Montero,et al. Key Challenges in Cloud Computing: Enabling the Future Internet of Services , 2013, IEEE Internet Computing.
[24] Jean-Paul Van Belle,et al. Management Issues with Cloud Computing , 2013, ICCC.
[25] Andreas Mladenow,et al. Value Creation Using Clouds: Analysis of Value Drivers for Start-Ups and Small and Medium Sized Enterprises in the Textile Industry , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[26] Thirunavukarasu Ramkumar,et al. Enhanced Survey and Proposal to secure the data in Cloud Computing Environment , 2013 .
[27] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[28] Zahid Raza,et al. Cloud Computing: Issues & Challenges , 2013 .