Security Concerns in Cloud Computing
暂无分享,去创建一个
Issa M. Khalil | Azeem Ahmad | Abdallah Khreishah | Salah Bouktif | S. Bouktif | Abdallah Khreishah | Azeem Ahmad
[1] Issa M. Khalil,et al. Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks , 2007, Ad Hoc Networks.
[2] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[3] Abhinav Mishra,et al. Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).
[4] Zhixiong Chen,et al. IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.
[5] Wasim A. Al-Hamdani,et al. Who can you trust in the cloud?: a review of security issues within cloud computing , 2011, InfoSecCD.
[6] Ronald Maier,et al. Challenges in Cross-Organizational Security Management , 2012, 2012 45th Hawaii International Conference on System Sciences.
[7] Sally Sieloff Magnan,et al. Research Design: Qualitative and Quantitative Approaches , 1997 .
[8] Vikas Kumar,et al. Cloud security assessment and identity management , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[9] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.
[10] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[11] Pritesh Jain,et al. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.
[12] Nitha Rachel Suresh,et al. Security concerns for cloud computing in aircraft data networks , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[13] Alexander Pretschner,et al. Implementing Trust in Cloud Infrastructures , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[14] M Hasan Islam,et al. Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.
[15] Ranko Popovic,et al. A comparison and security analysis of the cloud computing software platforms , 2011, 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS).
[16] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[17] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[18] Shubhashis Sengupta,et al. Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.
[19] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[20] Issa M. Khalil,et al. Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping , 2009, Ad Hoc Networks.
[21] Yin Hu,et al. Analysis and Research about Cloud Computing Security Protect Policy , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[22] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[23] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[24] Doan B. Hoang,et al. Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[25] Zaigham Mahmood,et al. Data Location and Security Issues in Cloud Computing , 2011, 2011 International Conference on Emerging Intelligent Data and Web Technologies.
[26] Jean-Henry Morin,et al. Towards Cloud Computing SLA Risk Management: Issues and Challenges , 2012, 2012 45th Hawaii International Conference on System Sciences.
[27] J. Creswell. Qualitative inquiry and research design: choosing among five traditions. , 1998 .
[28] Farzad Sabahi,et al. Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[29] Li Xiang,et al. The study on data security in Cloud Computing based on Virtualization , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.
[30] Issa M. Khalil,et al. MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks , 2008, SecureComm.
[31] Issa M. Khalil,et al. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure , 2011, IEEE Transactions on Mobile Computing.
[32] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[33] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).
[34] Si Mao-xin,et al. Notice of RetractionWireless broadband application technology investigation of IPv6 optical network cloud computing , 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS).
[35] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.