Data security in cloud computing
暂无分享,去创建一个
Gary B. Wills | Robert John Walters | Madini O. Alassafi | Ahmed Albugmi | G. Wills | R. Walters | M. Alassafi | Ahmed Albugmi
[1] Paul S. Wooley. Identifying Cloud Computing Security Risks , 2011 .
[2] Vic Winkler. Securing the Cloud: Key Strategies and Best Practices , 2011 .
[3] Srdjan Capkun,et al. Home is safer than the cloud!: privacy concerns for consumer cloud storage , 2011, SOUPS.
[4] S. Srinivasan. Cloud Computing Basics , 2014 .
[5] Gary B. Wills,et al. An Overview of Cloud Services Adoption Challenges in Higher Education Institutions , 2015, ESaaSA@CLOSER.
[6] Manuel Oriol,et al. Security risks and their management in cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[7] E. M. Mohamed,et al. Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[8] Farzad Sabahi,et al. Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[9] Victor I. Chang,et al. Security Challenges in Cloud Storages , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.
[10] Mladen A. Vouk,et al. Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.
[11] Andreas Klein,et al. A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[12] Luis Miguel Vaquero Gonzalez,et al. Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..
[13] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[14] Mukesh Singhal,et al. A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing , 2016, Cluster Computing.
[15] Zhi Li,et al. Cloud computing risk assessment method based on game theory , 2015 .
[16] Tomas A. Lipinski. Click Here to Cloud: End User Issues in Cloud Computing Terms of Service Agreements , 2013 .
[17] A Min Tjoa,et al. Retaining Data Control to the Client in Infrastructure Clouds , 2009, 2009 International Conference on Availability, Reliability and Security.
[18] Raghu Yeluri,et al. Cloud Computing Basics , 2014 .
[19] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[20] Yuan Zhou,et al. Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems , 2010 .
[21] Tzonelih Hwang,et al. Untraceable Sensor Movement in Distributed IoT Infrastructure , 2015, IEEE Sensors Journal.
[22] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[23] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[24] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[25] Haibo Chen,et al. Security-Preserving Live Migration of Virtual Machines in the Cloud , 2012, Journal of Network and Systems Management.
[26] D. M. Hutton,et al. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .