Cloud computing: Overview and risk identification based on classification by type
暂无分享,去创建一个
[1] Chia-Lun Yeh,et al. Cloud Computing: Overview and Risk Analysis , 2012, J. Inf. Syst..
[2] Burton S. Kaliski,et al. Toward Risk Assessment as a Service in Cloud Environments , 2010, HotCloud.
[3] Ahmed Lounis,et al. Security in cloud computing , 2014, International Journal of Information Security.
[4] Roger Clarke,et al. User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[5] Hiroyuki Sato,et al. Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.
[6] Mohammed El Ghazi,et al. Cloud computing: Security challenges , 2012, 2012 Colloquium in Information Science and Technology.
[7] Thibaut Probst. Évaluation et analyse des mécanismes de sécurité des réseaux dans les infrastructures virtuelles de cloud computing. (Evaluation and analysis of network security mechanisms in virtual infrastructure cloud) , 2015 .
[8] Cyril Onwubiko,et al. Security Issues to Cloud Computing , 2010, Cloud Computing.
[9] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[10] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[11] Anderson Santana de Oliveira,et al. A risk assessment model for selecting cloud service providers , 2016, Journal of Cloud Computing.
[12] Iliya Markov,et al. Risk perception and risk management in cloud computing: Results from a case study of Swiss companies , 2013, Int. J. Inf. Manag..
[13] Adil Al-Yasiri,et al. Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework , 2016, FNC/MobiSPC.
[14] Kamal Dahbur,et al. A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.
[15] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[16] Haider Abbas,et al. Cloud Computing Risk Assessment: A Systematic Literature Review , 2014 .
[17] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[18] Sara Bedin. Cloud Computing : evolution or revolution ? , 2014 .
[19] Elio Goettelmann,et al. Risk-aware Business Process Modelling and Trusted Deployment in the Cloud. (Modélisation de processus métiers sensibilisés aux risques et déploiement en confiance dans le cloud) , 2015 .
[20] Jaydip Sen,et al. Security and Privacy Issues in Cloud Computing , 2013, ArXiv.
[21] Myeonggil Choi. The Security Risks of Cloud Computing , 2019 .
[22] R. K. Bunkar,et al. Study of Security Risk and Vulnerabilities of Cloud Computing , 2014 .
[23] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[24] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[25] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[26] Mridula Angepat,et al. Cloud Computing : Analysing the risks involved in cloud computing environments , 2010 .
[27] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .