-
1
-
-
34547460535
-
Trust and control interrelations
-
C. Costa and K. Bijlsma-Frankema, "Trust and Control Interrelations," Group and Organization Management, vol. 32, no. 4, 2007, pp. 392-406.
-
(2007)
Group and Organization Management
, vol.32
, Issue.4
, pp. 392-406
-
-
Costa, C.1
Bijlsma-Frankema, K.2
-
2
-
-
77953097363
-
Evolution in relation to risk and trust management
-
May
-
M. Lund and B. Solhaug, "Evolution in Relation to Risk and Trust Management," Computer, May 2010, pp. 49-55.
-
(2010)
Computer
, pp. 49-55
-
-
Lund, M.1
Solhaug, B.2
-
4
-
-
77957707210
-
In cloud we trust?
-
Jan.
-
S. Perez, "In Cloud We Trust?" ReadWriteWeb, Jan. 2009; www.readwriteweb.com/enterprise/2009/01/in-cloud-we-trust.php.
-
(2009)
ReadWriteWeb
-
-
Perez, S.1
-
5
-
-
70350139817
-
In cloud shall we trust?
-
Sept./Oct.
-
B. Michael, "In Cloud Shall We Trust?" IEEE Security & Privacy, Sept./Oct. 2009, p. 3.
-
(2009)
IEEE Security & Privacy
, pp. 3
-
-
Michael, B.1
-
6
-
-
84870829588
-
Taking control of the cloud for your enterprise
-
Intel SOA Expressway, June
-
B. Dournaee, "Taking Control of the Cloud for Your Enterprise," white paper, Intel SOA Expressway, June 2010.
-
(2010)
White Paper
-
-
Dournaee, B.1
-
7
-
-
77957711315
-
VMware unveils security API
-
Apr.
-
N. Riter, "VMware Unveils Security API," Search Security, Apr. 2009; http://searchsecurity.techtarget.com. au/articles/31679-VMware-unveils- security-API.
-
(2009)
Search Security
-
-
Riter, N.1
-
8
-
-
77957700037
-
Thinking person's guide to the cloud, Part 3b
-
1 Nov.
-
G. Peterson, "Thinking Person's Guide to the Cloud, Part 3b," blog, 1 Nov. 2009; http://1raindrop.typepad.com/1-raindrop/2009/10/thinking- persons-guide-to-the-cloud-part-3b.html.
-
(2009)
Blog
-
-
Peterson, G.1
-
9
-
-
77957701985
-
Cloud computing: Who is in control?
-
25 June
-
D. Blum, "Cloud Computing: Who Is in Control?" Burton Group Blogs' Security and Risk Management Blog, 25 June 2009; http://srmsblog. burtongroup. com/2009/06/cloud-computing-who-is-in-control.html.
-
(2009)
Burton Group Blogs' Security and Risk Management Blog
-
-
Blum, D.1
-
10
-
-
77249143925
-
Can a trusted environment provide security?
-
Jan./Feb.
-
L. Kaufmann, "Can a Trusted Environment Provide Security?" IEEE Security & Privacy, Jan./Feb. 2010, pp. 50-52.
-
(2010)
IEEE Security & Privacy
, pp. 50-52
-
-
Kaufmann, L.1
-
11
-
-
77957701461
-
Security and the cloudy cloud: A revolution for the infrastructure
-
Oct.
-
J. Boles, "Security and the Cloudy Cloud: A Revolution for the Infrastructure," Computerworld, Oct. 2008; http://blogs.computerworld.com/ security-in-the-cloud.
-
(2008)
Computerworld
-
-
Boles, J.1
-
12
-
-
74549138563
-
Addressing cloud computing in enterprise architecture
-
K. Khan, "Addressing Cloud Computing in Enterprise Architecture," Cutter IT Journal, vol. 22, no. 11, 2009, pp. 27-33.
-
(2009)
Cutter IT Journal
, vol.22
, Issue.11
, pp. 27-33
-
-
Khan, K.1
-
13
-
-
77954945350
-
The information assurance practices of cloud computing vendors
-
July/Aug.
-
R. Chakraborty et al., "The Information Assurance Practices of Cloud Computing Vendors," IT Professional, July/Aug. 2010, pp. 29-37.
-
(2010)
IT Professional
, pp. 29-37
-
-
Chakraborty, R.1
-
14
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM Press
-
T. Ristenpart et al., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Comm. Security, ACM Press, 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security
, pp. 199-212
-
-
Ristenpart, T.1
|