Cloud computing security auditing
暂无分享,去创建一个
[1] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[2] A Min Tjoa,et al. Towards a Side Access Free Data Grid Resource by Means of Infrastructure Clouds , 2009, 2009 International Conference on Parallel Processing Workshops.
[3] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[4] Dimitrios Pendarakis,et al. Security audits of multi-tier virtual infrastructures in public infrastructure clouds , 2010, CCSW '10.
[5] A Min Tjoa,et al. A Stepwise Approach Towards an Interoperable and Flexible Logging Principle for Audit Trails , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[6] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[7] Zhixiong Chen,et al. IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.
[8] Burton S. Kaliski,et al. Toward Risk Assessment as a Service in Cloud Environments , 2010, HotCloud.
[9] Meina Song,et al. Notice of Retraction A Governance Model for Cloud Computing , 2010, MASS 2010.
[10] Andreas Haeberlen,et al. A case for the accountable cloud , 2010, OPSR.
[11] C. Yeun,et al. Cloud computing security management , 2010, 2010 Second International Conference on Engineering System Management and Applications.
[12] Xuejie Zhang,et al. Information Security Risk Management Framework for the Cloud Computing Environments , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[13] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.