Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
暂无分享,去创建一个
[1] Nicholas S. R. Walliman. Your Undergraduate Dissertation: The Essential Guide for Success , 2004 .
[2] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.
[3] Mahmoud Al-Ayyoub,et al. SDSecurity: A Software Defined Security experimental framework , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[4] Lee Gillam,et al. Cloud Computing, Principles, Systems and Applications , 2010, Cloud Computing.
[5] Adil Al-Yasiri,et al. Framework for cloud computing adoption: A road map for Smes to cloud migration , 2016, ArXiv.
[6] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[7] Karuna Pande Joshi,et al. A Semantic Approach to Cloud Security and Compliance , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[8] D. M. Hutton,et al. Securing the Cloud: Cloud Computer Security Techniques and Tactics , 2012 .
[9] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[10] Ammar Khalid. Cloud Computing: Applying Issues in Small Business , 2010, 2010 International Conference on Signal Acquisition and Processing.
[11] Stanislav Nedev,et al. Exploring the factors influencing the adoption of Cloud computing and the challenges faced by the business , 2014 .
[12] Georgios I. Doukidis,et al. Trends in information technology in small businesses , 1994 .
[13] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[14] Yaser Jararweh,et al. PEP-side caching: An insider threat port , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).
[15] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[16] Yaser Jararweh,et al. Mitigating insider threat in cloud relational databases , 2016, Secur. Commun. Networks.
[17] Maria Azua Himmel. Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks , 2012 .
[18] Ravi Pendse,et al. Security in multi-tenancy cloud , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[19] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[20] Temesgen Kitaw Damenu,et al. Cloud Security Risk Management: A Critical Review , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[21] Martin Gilje Jaatun,et al. Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings , 2009, CloudCom.
[22] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[23] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[24] Bhavani Shankar,et al. Study of security issues in cloud computing , 2011 .
[25] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.