A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
暂无分享,去创建一个
Marcos A. Simplício | Mats Näslund | Charles Miers | Nelson Mimura Gonzalez | Tereza Cristina M. B. Carvalho | Makan Pourzandi | Fernando F. Redígolo
[1] Andrew P. Martin,et al. myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[2] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[3] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[4] T. S. Raghu,et al. Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.
[5] Dawn Song,et al. Proceedings of the 2009 ACM workshop on Cloud computing security , 2009, CloudCom 2009.
[6] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[7] A. Sadeghi,et al. Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .
[8] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[9] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[10] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[11] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[12] Christopher E. Dabrowski,et al. VM Leakage and Orphan Control in Open-Source Clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[13] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[14] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[15] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[16] Marcos A. Simplício,et al. A quantitative analysis of current security concerns and solutions for cloud computing , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[17] Eugene Ciurana,et al. Google App Engine , 2009 .
[18] David W. Chadwick,et al. Security APIs for My Private Cloud - Granting access to anyone, from anywhere at any time , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[19] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[20] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[21] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[22] Martin Knahl,et al. An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[23] John C. Grundy,et al. Emerging Security Challenges of Cloud Virtual Infrastructure , 2016, APSEC 2010.
[24] Frank Leymann,et al. Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[25] Vladimir A. Oleshchuk,et al. Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[26] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[27] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[28] Andrew P. Martin,et al. myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, CloudCom.