Cloud Computing and Security Issues that can affect users
暂无分享,去创建一个
[1] Karuna Pande Joshi,et al. A Semantic Approach to Cloud Security and Compliance , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[2] Sarfraz Nawaz Brohi. Seven Deadly Threats and Vulnerabilities in Cloud Computing , 2011 .
[3] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[4] Carla Merkle Westphall,et al. Customer Security Concerns in Cloud Computing , 2011, ICON 2011.
[5] Madjid Merabti,et al. Secure Cloud Computing for Critical Infrastructure: A Survey , 2012 .
[6] Tuncay Ercan,et al. Effective use of cloud computing in educational institutions , 2010 .
[7] RattenVanessa. Cloud Computing Services , 2012 .
[8] Arokia Paul Rajan,et al. Evolution of Cloud Storage as Cloud Computing Infrastructure Service , 2013, ArXiv.
[9] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[10] A. A. Elusoji,et al. An Effective Measurement of Data Security in a Cloud Computing Environment , 2013 .
[11] Mohammed Ibrahim,et al. THEMATIC ANALYSIS: A CRITICAL REVIEW OF ITS PROCESS AND EVALUATION , 2012 .
[12] S. Srinivasan. Cloud Computing Basics , 2014 .
[13] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[14] Dean Whitehead,et al. Analysing Data in Qualitative Research , 2007 .
[15] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[16] Garima Tiwari,et al. Cloud Computing: A New Era of IT Opportunity and Challenges , 2013 .
[17] Ahmed Shawish,et al. Cloud Computing: Paradigms and Technologies , 2014 .
[18] Amy Blackstone,et al. Principles of Sociological Inquiry – Qualitative and Quantitative Methods , 2014 .
[19] Sonia Bassi,et al. Cloud Computing Data Security-Background & Benefits , 2015 .
[20] C. R. Kothari,et al. Research Methodology: Methods and Techniques , 2009 .
[21] Barrie Sosinsky,et al. Cloud Computing Bible , 2010 .
[22] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[23] Jaydip Sen,et al. Security and Privacy Issues in Cloud Computing , 2013, ArXiv.
[24] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[25] Anmin Fu,et al. Privacy-preserving public auditing for non-manager group , 2017, 2017 IEEE International Conference on Communications (ICC).
[26] Imran Ashraf. An Overview of Service Models of Cloud Computing , 2014 .
[27] R. Sridaran,et al. An Analysis of Security Challenges in Cloud Computing , 2013 .
[28] Shao Ying Zhu,et al. A survey on top security threats in cloud computing , 2015 .
[29] John C. Grundy,et al. An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.
[30] Mohammed Farik,et al. Cloud Computing Security Latest Issues amp Countermeasures , 2015 .
[31] Muthu Dayalan. Security Issues and Challenges in Cloud Computing , 2017 .