Benefits and Challenges of the Adoption of Cloud Computing in Business
暂无分享,去创建一个
[1] N Prabakaran,et al. CHALLENGES AND ISSUES OF DEPLOYMENT ONCLOUD , 2014 .
[2] R. Sridaran,et al. An Analysis of Security Challenges in Cloud Computing , 2013 .
[3] Y.Seetha Ramayya,et al. A Study on Cloud Computing Disaster Recovery , 2013 .
[4] Masudur Rahman,et al. A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack , 2014 .
[5] Mohammad Hammoudeh,et al. Defence for Distributed Denial of Service Attacks in Cloud Computing , 2015 .
[6] Wah M. Cheung,et al. Analysis of Cloud Computing Vulnerabilities , 2014 .
[7] Toshi Sharma,et al. Cloud Computing-SPI Framework , Deployment Models , Challenges , 2014 .
[8] Mathew Nicho,et al. Dimensions Of Security Threats In Cloud Computing: A Case Study , 2013, BIS 2013.
[9] Mohammed M. Alani. Securing the Cloud: Threats, Attacks and Mitigation Techniques , 2014 .
[10] Ashok V. Sutagundar,et al. Security Aspects in Cloud Computing , 2017 .
[11] . K.V.KMaheshKumar,et al. SOFTWARE AS A SERVICE FOR EFFICIENT CLOUD COMPUTING , 2014 .
[12] Jiann-Min Yang,et al. Analysis on Cloud-Based Security Vulnerability Assessment , 2010, 2010 IEEE 7th International Conference on E-Business Engineering.
[13] Sumit Goyal,et al. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .
[14] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[15] Karuna C. Gull,et al. Security Issues with Possible Solutions in Cloud Computing-A Survey , 2013 .
[16] Nova Ahmed,et al. Efficient and Reliable Hybrid Cloud Architechture for Big Data , 2013, CloudCom 2013.
[17] Drasko Tomic,et al. Economics of the cloud computing , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[18] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[19] Chaitanyakumar Patel,et al. Data Security in Cloud , 2014 .
[20] Kashif Munir,et al. SECURE CLOUD ARCHITECTURE , 2013 .
[21] S. A. Edalatpanah,et al. Comparison of Cloud and Grid Computing , 2014 .
[22] Swarnpreet Singh,et al. Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .
[23] Sungyoung Lee,et al. Adoption issues for cloud computing , 2009, iiWAS.
[24] M. L. Dhore,et al. CIDT: Detection of Malicious Code Injection Attacks on Web Application , 2012 .
[25] Shikha Singh,et al. Cloud Computing Attacks: A Discussion With Solutions , 2014, CloudCom 2014.
[26] Imtiaz Ahmad,et al. Cloud Computing Pricing Models: A Survey , 2013 .
[27] Arnon Rosenthal,et al. Methodological Review: Cloud computing: A new business paradigm for biomedical information sharing , 2010 .
[28] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[29] Poonam Yadav,et al. Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA , 2013, CloudCom 2013.
[30] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[31] Tiago Oliveira,et al. Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..
[32] Siddharth Dutt Choubey,et al. Study of data security and privacy preserving solutions in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[33] Vidhya. A Review of DOS Attacks in Cloud Computing , 2014 .
[34] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[35] Rania Fahim El-Gazzar,et al. A Literature Review on Cloud Computing Adoption Issues in Enterprises , 2014, TDIT.
[36] Syed M. Rahman,et al. An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.
[37] Michelle Park Lazette. State of Small Business , 2016 .
[38] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[39] Yao Zheng,et al. DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[40] M. Avram,et al. Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .
[41] Shweta Tripathi,et al. Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks , 2013 .
[42] B.Sumitra,et al. A Survey of Cloud Authentication Attacks andSolution Approaches , 2014 .
[43] Tripat Deep Singh,et al. Data Security in Cloud , 2015 .
[44] Amol C. Adamuthe,et al. Cloud Computing – A market Perspective and Research Directions , 2015 .
[45] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[46] AL-Museelem Waleed,et al. User Privacy and Security in Cloud Computing , 2016 .
[47] Marin Litoiu,et al. Feedback-based optimization of a private cloud , 2012, Future Gener. Comput. Syst..
[48] Kailas Devadkar,et al. Understanding DDoS Attack & its Effect in Cloud Environment , 2015 .
[49] Nitasha Hasteer,et al. Analyzing Security Solutions in Cloud Computing , 2013 .
[50] Paula Kotzé,et al. Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.
[51] Abdulaziz Aljabre. Cloud Computing for Increased Business Value , 2012 .
[52] Susan V. Vrbsky. Security Attacks and Solutions in Clouds Kazi Zunnurhain , 2010 .
[53] Ahmed E. Youssef. Exploring Cloud Computing Services and Applications , 2012 .
[54] Lola Yorita Astri,et al. A Study Literature of Critical Success Factors of Cloud Computing in Organizations , 2015 .
[55] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[56] Imran Ashraf. An Overview of Service Models of Cloud Computing , 2014 .
[57] Angela Lin,et al. Cloud computing as an innovation: Percepetion, attitude, and adoption , 2012, Int. J. Inf. Manag..
[58] T Devi,et al. Platform-as-a-Service (PaaS): Model and Security Issues , 2015 .
[59] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[60] Alexander G. Chefranov,et al. Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing , 2013, ArXiv.
[61] S. Jamwal,et al. Model To Prevent Websites From XSS Vulnerabilities , 2015 .
[62] Manuel Castro,et al. The Use of Cloud Computing in SMEs , 2016, ANT/SEIT.
[63] George Suciu,et al. Study on advantages and disadvantages of Cloud Computing – the advantages of Telemetry Applications in the Cloud , 2013 .
[65] Sayyed Mohammad Sadegh Sajjadi,et al. Study of SQL Injection Attacks and Countermeasures , 2013 .
[66] Feng Tian,et al. A Business Analysis of Cloud Computing: Data Security and Contract Lock-In Issues , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[67] Hamisu Alhaji Ali. Cloud Computing Security: An Investigation into the Security Issues and Challenges Associated with Cloud Computing, for both Data Storage and Virtual Applications , 2015 .
[68] Nabil Sultan,et al. loud computing for education : A new dawn ? , 2009 .
[69] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[70] R. H. Goudar,et al. Cloud Computing - Research Issues, Challenges, Architecture, Platforms and Applications: A Survey , 2012 .
[71] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[72] Ritesh Sharma,et al. Cloud Computing—Security, Issues, and Solutions , 2020 .
[73] Nova Ahmed,et al. EFFICIENT AND RELIABLE H YBRID CLOUD ARCHITECTURE FOR BIGDATABASE , 2013 .
[74] Adel Alkhalil,et al. Cloud Computing from SMEs Perspective: A Survey-based Investigation , 2013 .
[75] Ian Sommerville,et al. Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[76] J. Hoover,et al. Compliance in the Ether: Cloud Computing, Data Security and Business Regulation , 2013 .
[77] Kevin Allan Johnston Prof,et al. The Business Value of Cloud Computing in South Africa , 2016 .
[78] Mojtaba Alizadeh,et al. Identifying Benefits and risks associated with utilizing cloud computing , 2014, ArXiv.
[79] Piotr Pazowski,et al. Cloud Computing: A Case Study for the New Idea of the IS/IT Implementation , 2013 .
[80] Fa-Chang Cheng,et al. The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy , 2012 .
[81] Mo Adam Mahmood,et al. Impact of Cloud Computing Adoption on Firm Stock Price - An Empirical Research , 2014, AMCIS.
[82] Mak Sharma,et al. Cloud Computing: Adoption Considerations for Business and Education , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[83] Paul Quinn,et al. Heads in the cloud , 2014 .
[84] C. Devasena. IMPACT STUDY OF CLOUD COMPUTING ON BUSINESS DEVELOPMENT , 2014 .
[85] G. Kulkarni,et al. A security aspects in cloud computing , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering.