A survey on data breach challenges in cloud computing security: Issues and threats
暂无分享,去创建一个
[1] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[2] Alexander Lazovik,et al. IEEE International Conference on Cloud Computing , 2010 .
[3] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[4] Martin Gilje Jaatun,et al. Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[5] Ida Madieha bt. Abdul Ghani Azmi,et al. Data breach on the critical information infrastructures: Lessons from the Wikileaks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[6] P. Dhavachelvan,et al. A privacy breach preventing and mitigation methodology for cloud service data storage , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[7] V. Suganya,et al. Secure service to prevent data breaches in cloud , 2014, 2014 International Conference on Computer Communication and Informatics.
[8] Mohit Sharma,et al. Cloud computing and its security issues — A review , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[9] Latifa Ben Arfa Rabai,et al. Surveying and Analyzing Security Problems in Cloud Computing Environments , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[10] Katina Michael,et al. Cloud computing data breaches a socio-technical review of literature , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[11] Muttukrishnan Rajarajan,et al. Assessing Data Breach Risk in Cloud Systems , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[12] Kuo-pao Yang,et al. An algorithmic approach to improving cloud security: The MIST and Malachi algorithms , 2016, 2016 IEEE Aerospace Conference.
[13] Yashwant K. Malaiya,et al. A consolidated approach for estimation of data security breach costs , 2016, 2016 2nd International Conference on Information Management (ICIM).
[14] Debasis Das,et al. A framework for data security and storage in Cloud Computing , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[15] Barbara Hewitt,et al. Would Increased Regulation Reduce the Number of Information Breaches? , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).