A quantitative analysis of current security concerns and solutions for cloud computing
暂无分享,去创建一个
Marcos A. Simplício | Mats Näslund | Charles Miers | Nelson Mimura Gonzalez | Tereza Cristina M. B. Carvalho | Makan Pourzandi | Fernando F. Redígolo | M. Näslund | M. Simplício | T. Carvalho | F. Redígolo | C. Miers | M. Pourzandi | N. Gonzalez
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] T. S. Raghu,et al. Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.
[3] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[4] Frank Leymann,et al. Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[5] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[6] Vladimir A. Oleshchuk,et al. Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[7] A. Sadeghi,et al. Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .
[8] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[9] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[10] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[11] Rabia Khan. Interoperability and Portability among Open Clouds Using FIPA Agent , 2012 .
[12] Christopher E. Dabrowski,et al. VM Leakage and Orphan Control in Open-Source Clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[13] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[14] David W. Chadwick,et al. Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[15] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[16] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[17] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[18] A. Zahariev. Google App Engine , 2009 .
[19] Martin Knahl,et al. An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[20] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[21] Andrew P. Martin,et al. myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[22] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[23] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[24] John C. Grundy,et al. Emerging Security Challenges of Cloud Virtual Infrastructure , 2016, APSEC 2010.
[25] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[26] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.