Cloud Computing Security: An Issue of Concern
暂无分享,去创建一个
[1] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[2] Zhixiong Chen,et al. IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.
[3] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[4] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[5] H. Bernard,et al. Data Management and Analysis Methods , 2000 .
[6] Peter Desnoyers,et al. Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.
[7] Issa M. Khalil,et al. An OFDMA-based MAC protocol for under water acoustic wireless sensor networks , 2009, IWCMC.
[8] Issa M. Khalil,et al. MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks , 2008, SecureComm.
[9] Ranko Popovic,et al. A comparison and security analysis of the cloud computing software platforms , 2011, 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS).
[10] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[11] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[12] Sabrina De Capitani di Vimercati,et al. Data protection in outsourcing scenarios: issues and directions , 2010, ASIACCS '10.
[13] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[14] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[15] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[16] Vikas Kumar,et al. Cloud security assessment and identity management , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[17] M Hasan Islam,et al. Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.
[18] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[19] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[20] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[21] Issa M. Khalil,et al. SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks , 2009, 2009 IEEE Symposium on Computers and Communications.
[22] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[23] Issa M. Khalil. MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[24] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[25] Yin Hu,et al. Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[26] Yi-Ming Chen,et al. Retrospective detection of malware attacks by cloud computing , 2010, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[27] Pritesh Jain,et al. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.
[28] Issa M. Khalil. ELMO: Energy Aware Local Monitoring in Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[29] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[30] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.