메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Infrastructure as a service security: Challenges and solutions

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; COMPUTING MODEL; DATA LEVEL; SECURITY ASSESSMENT; SECURITY CHALLENGES; SECURITY ISSUES; SECURITY MODEL; SERVICE SECURITY;

EID: 77953172125     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (153)

References (46)
  • 2
    • 17144406525 scopus 로고    scopus 로고
    • SLA Management Team, 4th ed. Enterprise Perspective
    • SLA Management Team, SLA Management Handbook, 4th ed. Enterprise Perspective, 2004.
    • (2004) SLA Management Handbook
  • 3
    • 38149017227 scopus 로고    scopus 로고
    • Service Level Agreements: Web Services and Security
    • ser. Berlin, Heidelberg: Springer Berlin Heidelberg
    • G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, vol. 4607.
    • (2007) Lecture Notes in Computer Science , vol.4607
    • Frankova, G.1
  • 4
    • 80054796219 scopus 로고    scopus 로고
    • Service Level Agreement in Cloud Computing
    • [Online]. Available
    • P. Patel, A. Ranabahu, and A. Sheth, "Service Level Agreement in Cloud Computing," Cloud Workshops at OOPSLA09, 2009. [Online]. Available: http://knoesis.wright.edu/aboutus/visitors/summer2009/PatelReport.pdf
    • Cloud Workshops at OOPSLA09, 2009
    • Patel, P.1    Ranabahu, A.2    Sheth, A.3
  • 7
    • 67651053378 scopus 로고    scopus 로고
    • Manning Publications, [Online]. Available
    • R. Kanneganti and P. Chodavarapu, SOA Security. Manning Publications, 2008. [Online]. Available: http://www.amazon.com/SOASecurity-Ramarao-Kanneganti/ dp/1932394680
    • (2008) SOA Security
    • Kanneganti, R.1    Chodavarapu, P.2
  • 10
    • 77953173466 scopus 로고    scopus 로고
    • [Online]. Available
    • B. D. Payne, "Xenaccess." [Online]. Available: http://doc.xenaccess.org/
    • Xenaccess
    • Payne, B.D.1
  • 11
  • 15
    • 79951816145 scopus 로고    scopus 로고
    • Towards Trusted Cloud Computing
    • [Online]. Available
    • N. Santos, G. P. Krishna, and R. Rodrigues, "Towards Trusted Cloud Computing," HotCloud'09, 2009. [Online]. Available: http://www.usenix.org/ event/hotcloud09/tech/full papers/santos.pdf
    • (2009) HotCloud'09
    • Santos, N.1    Krishna, G.P.2    Rodrigues, R.3
  • 17
    • 71549130410 scopus 로고    scopus 로고
    • Security Protocols
    • ser. Berlin, Heidelberg: Springer Berlin Heidelberg
    • W. Mao, A. Martin, H. Jin, and H. Zhang, Security Protocols, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, vol. 5087.
    • (2009) Lecture Notes in Computer Science , vol.5087
    • Mao, W.1    Martin, A.2    Jin, H.3    Zhang, H.4
  • 18
    • 56649102115 scopus 로고    scopus 로고
    • Property-Based TPM Virtualization
    • "Property-Based TPM Virtualization," Lecture Notes In Computer Science; Vol. 5222, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5222
  • 31
    • 84870692036 scopus 로고    scopus 로고
    • Intrusion Detection Techniques in Grid and Cloud Computing Environment
    • no. PrePrints
    • K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion Detection Techniques in Grid and Cloud Computing Environment," IT Professional, vol. 99, no. PrePrints, 2009.
    • (2009) IT Professional , vol.99
    • Vieira, K.1    Schulter, A.2    Westphall, C.3    Westphall, C.4
  • 32
    • 9744239645 scopus 로고    scopus 로고
    • Intrusion Prevention System Design
    • X. Zhang, C. Li, and W. Zheng, "Intrusion Prevention System Design," CIT, 2004.
    • (2004) CIT
    • Zhang, X.1    Li, C.2    Zheng, W.3
  • 34
    • 55649089217 scopus 로고    scopus 로고
    • Automated containment of rootkits attacks
    • [Online]. Available
    • A. Baliga, L. Iftode, and X. Chen, "Automated containment of rootkits attacks," Computers & Security, vol. 27, no. 7-8, pp. 323-334, 2008. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/ S0167404808000382
    • (2008) Computers & Security , vol.27 , Issue.7-8 , pp. 323-334
    • Baliga, A.1    Iftode, L.2    Chen, X.3
  • 35
    • 49049106371 scopus 로고    scopus 로고
    • Anti-DDoS Virtualized Operating System
    • S. Garg and H. Saran, "Anti-DDoS Virtualized Operating System," ARES, p. 7, 2008.
    • (2008) ARES , pp. 7
    • Garg, S.1    Saran, H.2
  • 43
  • 45
    • 84948153094 scopus 로고    scopus 로고
    • Key Management for Encrypted Data Storage in Distributed Systems
    • L. Seitz, J.-M. Pierson, and L. Brunie, "Key Management for Encrypted Data Storage in Distributed Systems," SISW, 2003.
    • (2003) SISW
    • Seitz, L.1    Pierson, J.-M.2    Brunie, L.3
  • 46
    • 77953161241 scopus 로고    scopus 로고
    • Research and Implement of an Encrypted File System Used to NAS
    • H. Jianzhong, X. Changsheng, and C. Bin, "Research and Implement of an Encrypted File System Used to NAS," SISW, 2003.
    • (2003) SISW
    • Jianzhong, H.1    Changsheng, X.2    Bin, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.