CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework
暂无分享,去创建一个
[1] Xiaojiang Du,et al. Efficiently secure data privacy on hybrid cloud , 2013, 2013 IEEE International Conference on Communications (ICC).
[2] Fekade Getahun Taddesse,et al. Cloud readiness assessment framework and recommendation system , 2015, AFRICON 2015.
[3] Juan Li,et al. Multi-Cloud Governance Service based on Model Driven Policy Generation , 2013, CLOSER.
[4] B. V. Thirumala Rao,et al. A Secured Cloud Data Storage with Access Privileges , 2016 .
[5] M. P. F. C. A. J. Sammes BSc,et al. Forensic Computing , 2000, Practitioner Series.
[6] Ausra Dilijonaite,et al. Digital Forensic Readiness , 2017 .
[7] Song Guo,et al. Byzantine-Resilient Secure Software-Defined Networks with Multiple Controllers in Cloud , 2014, IEEE Transactions on Cloud Computing.
[8] Randall Craig Reid,et al. Using the Parkerian Hexad to introduce security in an information literacy class , 2010, InfoSecCD.
[9] Yogesh Pai. Create, Copy, Disrupt: India's Intellectual Property Dilemmas , 2016 .
[10] Albert Sagala,et al. Private Cloud Storage Using OpenStack with Simple Network Architecture , 2016 .
[11] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..
[12] Adrian McEwen,et al. Designing the Internet of Things , 2013 .
[13] Sangjin Lee,et al. A new triage model conforming to the needs of selective search and seizure of electronic evidence , 2013, Digit. Investig..
[14] Stephen D. Wolthusen,et al. Mitigation of Cloud-Internal Denial of Service Attacks , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.
[15] Xiaoping Wu,et al. Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[16] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[17] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[18] T. Senthil Kumaran,et al. Cloud Deployment Methods In Guarantee of Protection and Confidentiality Constraints , 2018 .
[19] Zhiyong Li,et al. Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud , 2013 .
[20] Kim-Kwang Raymond Choo,et al. Cloud Storage Forensic Framework , 2014 .
[21] George Sibiya,et al. Digital forensic readiness in a cloud environment , 2013, 2013 Africon.
[22] Chia Hung Kao,et al. A prototype system for object management in private cloud , 2011, 2011 International Conference on Cloud and Service Computing.