Role of Security Mechanisms in the Building Blocks of the Cloud Infrastructure
暂无分享,去创建一个
G. R. Kanagachidambaresan | Kowsigan Mohan | P. Balasubramanie Palanisamy | Siddharth Rajesh | Sneha Narendran | G. Kanagachidambaresan | S. Narendran | K. Mohan | P. B. Palanisamy | Siddharth Rajesh
[1] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[2] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[3] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[4] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[5] Sergio Ledesma,et al. Practical Considerations for Simulated Annealing Implementation , 2008 .
[6] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[7] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[8] Yun Wang,et al. Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services , 2014 .
[9] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[10] Amandeep Saini,et al. Security Mechanisms at different Levels in Cloud Infrastructure , 2014 .
[11] Ronald L. Krutz,et al. Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .
[12] M. Kowsigan,et al. Efficient Scheduling in Computational Grid with an Improved Ant Colony Algorithm , 2011 .
[13] P. Balasubramanie,et al. An Improved Job Scheduling in Cloud Environment using Auto-Associative-Memory Network , 2016 .
[14] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[15] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[16] M. Kowsigan,et al. An Enhanced Job Scheduling in Cloud Environment Using Probability Distribution , 2017 .
[17] Robert Hawley,et al. File System Security: Secure Network Data Sharing for NT and Unix , 1998, LISA-NT.
[18] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[19] Hellen Adams,et al. Patent and Trademark Office , 2017 .
[20] M. Kowsigan,et al. An Enhanced Job Scheduling in Cloud Environment using Improved Metaheuristic Approach , 2017 .
[21] David Clark,et al. Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.
[22] T. S. Raghu,et al. The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.
[23] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[24] Y. C. Gangadharaiah. Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites , 2017 .
[25] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[26] M. Kowsigan. Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks , 2017 .