A Survey on Security Threats for Cloud Computing
暂无分享,去创建一个
[1] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[2] Rajkumar Buyya,et al. Introduction to Cloud Computing , 2011, CloudCom 2011.
[3] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[4] S. Sujatha,et al. Efficient access of Cloud Resources through virtualization techniques , 2012, 2012 International Conference on Recent Trends in Information Technology.
[5] Ralf Steinmetz,et al. Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.
[6] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[7] Qiaoyan Wen,et al. A View about Cloud Data Security from Data Life Cycle , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[8] Yin Hu,et al. Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[9] Jinzhu Kong. A Practical Approach to Improve the Data Privacy of Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[10] Shaftab Ahmed,et al. Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.
[11] M Hasan Islam,et al. Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.
[12] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] Sugata Sanyal,et al. A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.
[14] Guang Jin,et al. Improve the information security pactice instruction with virtual machine techniques , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[15] Zhuolin Yang,et al. Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.
[16] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[17] Ruby B. Lee,et al. A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[18] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[19] Shoichi Hasegawa,et al. A Two-Step Execution Mechanism for Thin Secure Hypervisors , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[20] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[22] Subasish Mohapatra,et al. Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues , 2010, 2010 Second International Conference on Computer and Network Technology.
[23] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[24] Farzad Sabahi,et al. Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[25] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[26] Vijay Varadharajan,et al. TVDSEC: Trusted Virtual Domain Security , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[27] Kouichi Sakurai,et al. Towards Countermeasure of Insider Threat in Network Security , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[28] Panagiotis Kalagiakos,et al. Cloud Computing learning , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[29] Prashant Srivastava,et al. An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[30] Ravi Pendse,et al. Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[31] Qiang Zhang,et al. The Characteristics of Cloud Computing , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[32] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[33] Ashutosh Saxena,et al. Energy analysis of security for cloud application , 2011, 2011 Annual IEEE India Conference.
[34] B. Joshi,et al. Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.
[35] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[36] Lin Yang,et al. Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[37] Aman Bakshi,et al. Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine , 2010, 2010 Second International Conference on Communication Software and Networks.
[38] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[39] Che-Hung Liu,et al. How to manage information security in cloud computing , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[40] Omkhar Arasaratnam,et al. Introduction to Cloud Computing , 2011 .
[41] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[42] A. Volokyta,et al. Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.
[43] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[44] Murat Kantarcioglu,et al. Impact of security risks on cloud computing adoption , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).