Modeling Security Risk Factors in a Cloud Computing Environment
暂无分享,去创建一个
[1] Thar Baker,et al. Security-oriented cloud computing platform for critical infrastructures , 2012, Comput. Law Secur. Rev..
[2] Iliya Markov,et al. Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..
[3] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[4] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[5] Deepak H. Sharma,et al. Cloud Computing - Understanding Risk, Threats, Vulnerability and Controls: A Survey , 2013 .
[6] Kamal Dahbur,et al. A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Naixue Xiong,et al. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications , 2014, Inf. Sci..
[9] Ali Mili,et al. A cybersecurity model in cloud computing environments , 2013, J. King Saud Univ. Comput. Inf. Sci..
[10] Vidyanand Choudhary,et al. Software as a Service: Implications for Investment in Software Development , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[11] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[12] A. Leite,et al. Commentary: Cloud computing - A security problem or solution? , 2011, Inf. Secur. Tech. Rep..
[13] Christopher J. Novak,et al. 2009 Data Breach Investigations Report , 2009 .
[14] George Reese,et al. Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .
[15] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[16] Rosli Salleh,et al. A Survey on Cloud Computing Security , 2012, ArXiv.
[17] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[18] Jordi Guitart,et al. Business-driven management of infrastructure-level risks in Cloud providers , 2014, Future Gener. Comput. Syst..
[19] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[20] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[21] Paula Kotzé,et al. Secure cloud computing: Benefits, risks and controls , 2011, 2011 Information Security for South Africa.
[22] M. Avram,et al. Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .
[23] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[24] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[25] S Drissi,et al. Survey: Risk Assessment for Cloud Computing , 2013 .
[26] Rabiah Ahmad,et al. A conceptual framework of info structure for information security risk assessment (ISRA) , 2013, J. Inf. Secur. Appl..
[27] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[28] Vasudeva Varma,et al. Towards Analyzing Data Security Risks in Cloud Computing Environments , 2010, ICISTM.
[29] Patrick S. Ryan,et al. Trust in the clouds , 2012, Comput. Law Secur. Rev..
[30] Liu Dong,et al. The New Risk Assessment Model for Information System in Cloud Computing Environment , 2011 .
[31] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .