Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[2] G. Sahoo,et al. Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.
[3] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[4] Marjory S. Blumenthal. Is Security Lost in the Clouds? , 2011 .
[5] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[6] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[7] Clement E. Onime,et al. A User Identity Management Protocol for Cloud Computing Paradigm , 2011, Int. J. Commun. Netw. Syst. Sci..
[8] Muhammad Ali Babar,et al. A tale of migration to cloud computing for sharing experiences and observations , 2011, SECLOUD '11.
[9] Ed Tallent. Hey! You! Get Off of My Cloud , 2012 .
[10] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[11] Syed M. Rahman,et al. An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.
[12] Vinicius Cardoso Garcia,et al. Systematic Mapping Study On Security Threats in Cloud Computing , 2013, ArXiv.
[13] T. S. Raghu,et al. The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.
[14] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.