Security issues in cloud computing
暂无分享,去创建一个
[1] Stefanos Gritzalis,et al. Quality assured trusted third parties for deploying secure internet-based healthcare applications , 2002, Int. J. Medical Informatics.
[2] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[3] Despina Polemi. Trusted third party services for health care in Europe , 1998, Future Gener. Comput. Syst..
[4] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[5] edkar,et al. A Review on Cloud Computing Vulnerabilities , 2014 .
[6] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[7] G. Sahoo,et al. A Secure Cloud Computing , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[8] Six Strategies for Defense-in-Depth Securing the Network from the Inside , .
[9] Steve Elky. An Introduction to Information System Risk Management , 2007 .
[10] Challa Narasimham,et al. Data security in cloud using RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[11] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[12] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[13] Wenjun Zhang,et al. Integrated Security Framework for Secure Web Services , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[14] Sumit Goyal,et al. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review , 2014 .
[15] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.
[16] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[17] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[18] Martin Gilje Jaatun,et al. Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.
[19] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[20] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[21] Dennis K. Holstein,et al. Trust but Verify Critical Infrastructure Cyber Security Solutions , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[22] Liang-Jie Zhang,et al. CCOA: Cloud Computing Open Architecture , 2009, 2009 IEEE International Conference on Web Services.
[23] H. A. Dinesha,et al. A Review on Hybrid Techniques of Security In Cloud Computing , 2014 .
[24] Weidong Liu,et al. Security Issues and Solutions in Cloud Computing , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[25] Hu Shuijing,et al. Data Security: The Challenges of Cloud Computing , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[26] Gail-Joon Ahn,et al. Role-based privilege and trust management , 2005, Comput. Syst. Sci. Eng..
[27] Lakshmi Sobhana Kalli,et al. Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .
[28] Vijay Varadharajan,et al. Dynamic trust enhanced security model for trusted platform based services , 2011, Future Gener. Comput. Syst..
[29] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.