Challenges and Issues Within Cloud Computing Technology
暂无分享,去创建一个
Jeffrey Soar | Omar Ali | J. Soar | Omar Ali
[1] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[2] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[3] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[4] Daniel Osterwalder,et al. Trust Through Evaluation and Certification? , 2001 .
[5] Peeyush Mathur,et al. Cloud computing: New challenge to the entire computer industry , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[6] Eric K. Clemons,et al. Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[7] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[8] Colin Camerer,et al. Not So Different After All: A Cross-Discipline View Of Trust , 1998 .
[9] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[10] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[11] Singh Ghuman,et al. Cloud Computing-A Study of Infrastructure as a Service , 2015 .
[12] Taqwa Hariguna. Prototype Cloud Computing for E-Government , 2012 .
[13] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[14] V. B. Singh,et al. E-Governance: Past, Present and Future in India , 2012, ArXiv.
[15] David Hilley,et al. Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings , 2009 .
[16] Åke Grönlund,et al. Electronic Government and the Information Systems Perspective , 2011, Lecture Notes in Computer Science.
[17] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[18] Xi He,et al. Cloud Computing: a Perspective Study , 2010, New Generation Computing.
[19] H. Nissenbaum. Can Trust be Secured Online? A theoretical perspective , 1999 .
[20] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[21] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[22] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[23] Siani Pearson,et al. Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms , 2005, iTrust.
[24] Saudi Arabia,et al. Cloud Based E-Government: Benefits and Challenges , 2013 .
[25] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[26] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[27] Seyyed Mohsen Hashemi,et al. Cloud computing: use cases & various applications , 2014 .
[28] S. Singhal,et al. Outsourcing Business to Cloud Computing Services: Opportunities and Challenges , 2009 .
[29] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[30] The Sarbanes-Oxley Act: Implications for large-scale IT outsourcing , 2007 .
[31] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[32] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[33] Ayob Sether,et al. Cloud Computing Benefits , 2016 .
[34] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[35] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[36] Michael R Nelson,et al. Building an Open Cloud , 2009, Science.
[37] Kristina Irion. Government cloud computing and the policies of data sovereignty , 2011 .
[38] Vasudeva Varma,et al. Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.
[39] Judith Hurwitz,et al. Cloud Computing for Dummies , 2009 .
[40] Enrico Francesconi,et al. Electronic Government and the Information Systems Perspective , 2016, Lecture Notes in Computer Science.
[41] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[42] Ronald H. Perrott,et al. Provider-Independent Use of the Cloud , 2009, Euro-Par.
[43] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[44] Shifei Ding,et al. Cloud computing: a new computing paradigm , 2016 .
[45] S. S. Yadav,et al. CLOUD: A computing infrastructure on demand , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[46] Joan Hash,et al. Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-47 , 2002 .