A study in data security in cloud computing
暂无分享,去创建一个
Aws Naser Jaber | Nusrat Ullah Khan | Mohamad Fadli Bin Zolkipli | Mazlina Binti Abdul Majid | A. Jaber | Mazlina Binti Abdul Majid | N. Khan
[1] Dongho Won,et al. Security Controls Based on K-ISMS in Cloud Computing Service , 2014 .
[2] Meredith Ringel Morris,et al. To search or to ask: the routing of information needs between traditional search engines and social networks , 2014, CSCW.
[3] Dan Simon,et al. Extensible Authentication Protocol (eap) Key Management Framework , 2007 .
[4] John R. Vacca. Computer and Information Security Handbook , 2009 .
[5] M. Roberts Masillamani,et al. Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment , 2014 .
[6] Nabil Sultan,et al. loud computing for education : A new dawn ? , 2009 .
[7] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[8] Bofeng Zhang,et al. Comparison of Several Cloud Computing Platforms , 2009, 2009 Second International Symposium on Information Science and Engineering.
[9] Paul Ayers. Securing and controlling data in the cloud , 2012 .
[10] Haider Abbas,et al. Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .
[11] Jinho Hwang. Improving and repurposing data center resource usage with virtualization , 2014 .
[12] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Pasi Tyrväinen,et al. Role of acquisition intervals in private and public cloud storage costs , 2014, Decis. Support Syst..
[14] Sumit Goyal,et al. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .
[15] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.