Development of Secured Trust SLA Model from SLA Life Cycle Phases
暂无分享,去创建一个
[1] Aized Amin Soofi,et al. Encryption Techniques for Cloud Data Confidentiality , 2014 .
[2] Siddhartha Rao,et al. Analysis on Data Integrity in Cloud Environment , 2014 .
[3] Imran Ashraf,et al. Security Issues in Cloud Computing - A Review , 2014 .
[4] Edwin Baker,et al. Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..
[5] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[6] P. Haritha,et al. Multi-factor Authentication in Cloud Computing for Data Storage Security , 2014 .
[7] Patrick S. Ryan,et al. Trust in the clouds , 2012, Comput. Law Secur. Rev..
[8] S. Ziyad,et al. Critical Review of Authentication Mechanisms in Cloud Computing , 2014 .
[9] Prakash C. Gupta. Data Communications and Computer Networks , 2006 .
[10] A. M. Talib,et al. Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment , 2015 .
[11] Shayma Wail Nourildean,et al. Firewall and VPN Investigation on Cloud Computing Performance , 2014 .
[12] Chander Kant,et al. Enhanced Security Architecture for Cloud Data Security , 2013 .
[13] Monjur Ahmed,et al. Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.
[14] Ashish Kumar. World of Cloud Computing & Security , 2012, CloudCom 2012.