A Survey of Security Concerns, Mechanisms and Testing in Cloud Environment
暂无分享,去创建一个
[1] Wei Zhao,et al. A Framework of Testing as a Service , 2009, 2009 International Conference on Management and Service Science.
[2] Katina Michael,et al. Cloud computing data breaches a socio-technical review of literature , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[3] Dimitris Gritzalis,et al. The Insider Threat in Cloud Computing , 2011, CRITIS.
[4] Mehdi Merouane. An approach for detecting and preventing DDoS attacks in campus , 2017, Automatic Control and Computer Sciences.
[5] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[6] Fang Liu,et al. Network traffic and user behavior analysis of mobile reading applications , 2016, 2016 Sixth International Conference on Information Science and Technology (ICIST).
[7] Edgar R. Weippl,et al. The Role and Security of Firewalls in IaaS Cloud Computing , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[8] Yasir Ahmed Hamza,et al. Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing , 2013 .
[9] Andrew Vance. Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing , 2014, 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology.
[10] N. Jaisankar,et al. A Review on Various Trust Models in Cloud Environment , 2017 .
[11] M. Sasikumar,et al. Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .
[12] Hira Sathu,et al. Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment , 2015, 2015 International Conference on Information Technology (ICIT).
[13] Mohamed Rida,et al. A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).