Security Threats with Associated Mitigation Techniques in Cloud Computing
暂无分享,去创建一个
[1] Abhinav Mishra,et al. Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[2] R. Lua,et al. Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.
[3] Robert L. Grossman,et al. The Case for Cloud Computing , 2009, IT Professional.
[4] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.
[5] Yushi Shen,et al. Cloud Computing Overview , 2014 .
[6] Thomas Sandholm,et al. What's inside the Cloud? An architectural map of the Cloud landscape , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[7] Florin Ogigau-Neamtiu,et al. CLOUD COMPUTING SECURITY ISSUES , 2012 .
[8] Aman Bakshi,et al. Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine , 2010, 2010 Second International Conference on Communication Software and Networks.
[9] Christof Weinhardt,et al. Business Models in the Service World , 2009, IT Professional.
[10] Joachim Schaper,et al. Cloud Services , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[11] Jeffrey S. Chase,et al. Automated control in cloud computing: challenges and opportunities , 2009, ACDC '09.
[12] Xuejie Zhang,et al. Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[13] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[14] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[15] Rich Maggiani. Cloud computing is changing how we communicate , 2009, 2009 IEEE International Professional Communication Conference.
[16] Sugata Sanyal,et al. A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.
[17] Gadadhar Sahoo,et al. Cloud Computing: Future Framework for e-Governance , 2010 .
[18] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[19] Sonal Anand,et al. Semantic Cloud for Mobile Technology , 2010 .
[20] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[21] Jian Huang,et al. SaaAS - The mobile agent based service for cloud computing in internet environment , 2010, 2010 Sixth International Conference on Natural Computation.
[22] Mohsin Nazir,et al. Cloud Computing: Overview & Current Research Challenges , 2012 .
[23] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[24] Chris Rose,et al. A Break in the Clouds: Towards a Cloud Definition , 2011 .
[25] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[26] Marta Mattoso,et al. Towards a Taxonomy for Cloud Computing from an e-Science Perspective , 2010, Cloud Computing.
[27] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[28] Rabiah Ahmad,et al. Communications in Computer and Information Science , 2010 .
[29] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[30] Gurdev Singh,et al. CM Measurement Facets for Cloud Performance , 2011 .
[31] Roberto Bifulco,et al. Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[32] Zhenyu Zhang,et al. Modeling and testing of cloud applications , 2009, 2009 IEEE Asia-Pacific Services Computing Conference (APSCC).
[33] Ujwal A. Lanjewar,et al. Implementation of Cloud Computing on Web Application , 2010 .
[34] W. Marsden. I and J , 2012 .
[35] Hiroyuki Sato,et al. A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[36] Huaglory Tianfield. Security issues in cloud computing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[37] Krishnashree Achuthan,et al. Preventing Insider Attacks in the Cloud , 2011, ACC.
[38] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[39] Matthew Metheny,et al. Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.
[40] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[41] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[42] Rituparna Chaki,et al. Handling Write Lock Assignment in Cloud Computing Environment , 2011, CISIM.
[43] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[44] Kevin W. Hamlen,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[45] Sakshi Kaushal,et al. Cloud Computing Security Issues and Challenges: A Survey , 2011, ACC.
[46] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[47] Dieter Gollmann,et al. Securing Web applications , 2008, Inf. Secur. Tech. Rep..
[48] Prashant J. Shenoy,et al. The Case for Enterprise-Ready Virtual Private Clouds , 2009, HotCloud.
[49] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[50] Eduardo S. Ogasawara,et al. Is Cloud Computing the Solution for Brazilian Researchers , 2010 .
[51] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .