Cloud Computing Security: A Survey
暂无分享,去创建一个
[1] Satish Muppidi,et al. Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .
[2] Amit Chugh,et al. SURVEY PAPER ON CLOUD STORAGESECURITY , 2013 .
[3] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[4] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[5] Ashutosh Saxena,et al. Data integrity proofs in cloud storage , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[6] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[7] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[8] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[9] Mohamed,et al. Data Security Model for Cloud Computing , 2013 .
[10] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[11] Susheel Kumar,et al. Cloud Storage and its Secure Overlay Techniques , 2014 .
[12] K. S. Wagh,et al. Securing Data Transfer in Cloud Environment , 2014 .
[13] Osman Ghazali,et al. Trust Management in Cloud Computing: A Critical Review , 2012, ArXiv.
[14] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[15] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..
[16] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[17] Vasudeva Varma,et al. Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.