Cloud Computing and Security Issues in the Cloud
暂无分享,去创建一个
[1] Hai Jin,et al. Efficient Password-based Two Factors Authentication in Cloud Computing , 2012 .
[2] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[3] Jianhua Che,et al. Study on the Security Models and Strategies of Cloud Computing , 2011 .
[4] Ruxandra- tefania Petre. Data mining in Cloud Computing , 2012 .
[5] Kangchan Lee. Security Threats in Cloud Computing Environments 1 , 2012 .
[6] Florin Ogigau-Neamtiu,et al. CLOUD COMPUTING SECURITY ISSUES , 2012 .
[7] Marinela Mircea. Addressing Data Security in the Cloud , 2012 .
[8] V. T. Raja,et al. Protecting the privacy and security of sensitive customer data in the cloud , 2012, Comput. Law Secur. Rev..
[9] Antonio Puliafito,et al. Virtual machine provisioning through satellite communications in federated Cloud environments , 2012, Future Gener. Comput. Syst..
[10] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[11] G. Rajesh Babu,et al. Security Risks Associated with the Cloud Computing , 2015 .
[12] Syed M. Rahman,et al. An Overview of the Security Concerns in Enterprise Cloud Computing , 2011, ArXiv.
[13] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[14] Jinjun Chen,et al. A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..
[15] Carla Merkle Westphall,et al. Management and Security for Grid, Cloud and Cognitive Networks , 2011 .
[16] Noriswadi Ismail,et al. Cursing the Cloud (or) Controlling the Cloud? , 2011, Comput. Law Secur. Rev..
[17] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[18] Shabnam Sharma,et al. COMPARATIVE ANALYSIS OF VARIOUS AUTHENTICATION TECHNIQUES IN CLOUD COMPUTING , 2013 .
[19] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[20] Ashish Kumar. World of Cloud Computing & Security , 2012, CloudCom 2012.
[21] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[22] Valentina Casola,et al. The CloudGrid approach: Security analysis and performance evaluation , 2013, Future Gener. Comput. Syst..
[23] Kangchan Lee. Security Threats in Cloud Computing Environments , 2012 .
[24] David Teneyuca. Internet cloud security: The illusion of inclusion , 2011, Inf. Secur. Tech. Rep..
[25] Ahmed E. Youssef. Exploring Cloud Computing Services and Applications , 2012 .
[26] Matjaz B. Juric,et al. Towards a unified taxonomy and architecture of cloud frameworks , 2013, Future Gener. Comput. Syst..
[27] Won Kim,et al. Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..
[28] Bhavani M. Thuraisingham,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[29] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[30] Takuya Suzuki,et al. Security Architectures for Cloud Computing , 2010 .
[31] Swarnpreet Singh,et al. Cost breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues , 2012 .
[32] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[33] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[34] John J. Rehr,et al. A high performance scientific cloud computing environment for materials simulations , 2012, Comput. Phys. Commun..
[35] Andrew P. Martin,et al. Trust in the Cloud , 2011, Inf. Secur. Tech. Rep..
[36] Atish,et al. Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2014 .
[37] Edwin Baker,et al. Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..
[38] Stephen Mason,et al. Digital evidence and 'cloud' computing , 2011, Comput. Law Secur. Rev..
[39] Patrick S. Ryan,et al. Trust in the clouds , 2012, Comput. Law Secur. Rev..
[40] Aderemi A. Atayero,et al. Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption , 2011 .
[41] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[42] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[43] Dana Petcu,et al. Portable Cloud applications - From theory to practice , 2013, Future Gener. Comput. Syst..
[44] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[45] Yi Mu,et al. Identity-based data storage in cloud computing , 2013, Future Gener. Comput. Syst..
[46] Abdelmajid Hassan Mansour Emam. Additional Authentication and Authorization using Registered Email-ID for Cloud Computing , 2013 .
[47] Seng-phil Hong,et al. A Consolidated Authentication Model in Cloud Computing Environments , 2012 .
[48] Jie Xu,et al. A novel intrusion severity analysis approach for Clouds , 2013, Future Gener. Comput. Syst..
[49] Edwin Baker,et al. Knowing the past to understand the present1 - issues in the contracting for cloud based services , 2011, Comput. Law Secur. Rev..