Service Availability in Cloud Computing : Threats and Best Practices
暂无分享,去创建一个
[1] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[2] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[3] A. Zahariev. Google App Engine , 2009 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Eric Bauer,et al. Reliability and Availability of Cloud Computing , 2012 .
[6] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[7] J McNally,et al. Information Security Standards , 2011 .
[8] Wasim A. Al-Hamdani,et al. Who can you trust in the cloud?: a review of security issues within cloud computing , 2011, InfoSecCD.
[9] Pankesh Patel,et al. Service Level Agreement in Cloud Computing , 2009 .
[10] Eric Bauer,et al. Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems , 2011 .
[11] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[12] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[13] Eugene Ciurana,et al. Google App Engine , 2009 .
[14] Imad M. Abbadi,et al. Self−Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure , 2011 .
[15] Edward Roback,et al. SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .
[16] Mark S. Young,et al. The Field Guide to Understanding Human Error , 2008 .
[17] Fang Liu,et al. NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.
[18] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[19] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[20] M. A. C. Dekker. Critical Cloud Computing. A CIIP perspective on cloud computing services , 2013 .
[21] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[22] Richard Mc Dougall,et al. Availability-What It Means , Why It ’ s Important , and How to Improve It , 1997 .
[23] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[24] Ajey Singh,et al. Evaluating a cryptographic Overview of Attacks on Cloud Computing , 2012 .