Data Security for Software as a Service
暂无分享,去创建一个
[1] Dave Cliff,et al. A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.
[2] Vladimir A. Oleshchuk,et al. Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[3] Robert P. Biuk-Aghai,et al. Critical path based approach for predicting temporal exceptions in resource constrained concurrent workflows , 2009, Int. J. Inf. Technol. Web Eng..
[4] Pradnyesh Rane. Securing SaaS Applications: A Cloud Security Perspective for Application Providers , 2011 .
[5] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[6] Hai V. Tran. Data Management Challenges in Cloud Computing , 2013, 2013 13th International Conference on Computational Science and Its Applications.
[7] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[8] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[9] Jörg Schwenk,et al. All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.
[10] Garth A. Gibson,et al. RAID: high-performance, reliable secondary storage , 1994, CSUR.
[11] H K Huang,et al. Medical image security in a HIPAA mandated PACS environment. , 2003, Computerized medical imaging and graphics : the official journal of the Computerized Medical Imaging Society.
[12] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[13] Deepak H. Sharma,et al. Security-as-a-Service from Clouds: A Comprehensive Analysis , 2013 .
[14] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[15] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[16] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[17] Nilanjan Dey,et al. Recent Research on Multi Input Multi Output (MIMO) based Mobile ad hoc Network: A Review , 2014, Int. J. Serv. Sci. Manag. Eng. Technol..
[18] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[19] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[20] G. Sahoo,et al. Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.
[21] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[22] Nilanjan Dey,et al. Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..
[23] Tommaso Cucinotta,et al. Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..
[24] Ravi Pendse,et al. Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[25] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .
[26] Peter Weiß,et al. Basics to Develop Web Services for Human Resources , 2009 .
[27] Jemal H. Abawajy,et al. Big Data in Complex Systems: Challenges and Opportunities , 2015 .
[28] A. Whyte,et al. THE GRAMM-LEACH-BLILEY ACT OF 1999: RISK IMPLICATIONS FOR THE FINANCIAL SERVICES INDUSTRY , 2004 .
[29] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[30] Ben Archibald. Expect more from your SaaS vendor. , 2009, Occupational health & safety.
[31] Tomayess Issa,et al. Artificial Intelligence Technologies and the Evolution of Web 3.0 , 2015 .
[32] Gail-Joon Ahn,et al. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[33] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[34] Elio Toppano,et al. How Culture May Influence Ontology Co-Design: A Qualitative Study , 2011, Int. J. Inf. Technol. Web Eng..
[35] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[36] Hua Wang,et al. Improved security of a dynamic remote data possession checking protocol for cloud storage , 2014, Expert Syst. Appl..
[37] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[38] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[39] Dirk Söffker,et al. Modeling of Complex Human-Process Interaction as Framework for Assistance and Supervisory Control of Technical Processes , 2012, Int. J. Inf. Technol. Web Eng..
[40] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[41] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[42] Mehmet Hadi Gunes,et al. Enhancing data privacy and integrity in the cloud , 2011, 2011 International Conference on High Performance Computing & Simulation.
[43] Hamid Banirostam,et al. A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[44] Yang Gao,et al. Secure cloud storage based on cryptographic techniques , 2012 .
[45] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[46] Adel Taweel,et al. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements , 2011 .
[47] B. B. Amberker,et al. Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation , 2012, 2012 International Symposium on Cloud and Services Computing.
[48] Zhuolin Yang,et al. Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.
[49] David Taniar,et al. Image Mining: A Case for Clustering Shoe prints , 2008, Int. J. Inf. Technol. Web Eng..
[50] Fahima Cheikh,et al. Web Services Composition Problem: Model and Complexity , 2011 .
[51] Adam Jatowt,et al. Utilizing Past Web for Knowledge Discovery , 2009 .
[52] Arthur Tatnall. Web Technologies: Concepts, Methodologies, Tools and Applications , 2010 .