The migration of the university IT infrastructure toward a secure IaaS Cloud
暂无分享,去创建一个
[1] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[2] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[3] Xiangjian He,et al. Improving cloud network security using the Tree-Rule firewall , 2014, Future Gener. Comput. Syst..
[4] Marcos A. Simplício,et al. A quantitative analysis of current security concerns and solutions for cloud computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[5] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Xiangjian He,et al. Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall , 2012, IDCS.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Hironori Washizaki,et al. A survey on security patterns , 2008 .
[9] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.