메뉴 건너뛰기




Volumn 12, Issue 5, 2010, Pages 20-27

Establishing trust in cloud computing

Author keywords

certification; cloud computing; control on data; Hybrid cloud computing; information technology; private enclave; reflection of security profile; security and privacy; trust

Indexed keywords

CERTIFICATION; CLOUD COMPUTING; HYBRID CLOUD COMPUTING; PRIVATE ENCLAVE; SECURITY AND PRIVACY; TRUST;

EID: 77957700442     PISSN: 15209202     EISSN: None     Source Type: Journal    
DOI: 10.1109/MITP.2010.128     Document Type: Article
Times cited : (256)

References (14)
  • 2
    • 77953097363 scopus 로고    scopus 로고
    • Evolution in relation to risk and trust management
    • May
    • M. Lund and B. Solhaug, "Evolution in Relation to Risk and Trust Management," Computer, May 2010, pp. 49-55.
    • (2010) Computer , pp. 49-55
    • Lund, M.1    Solhaug, B.2
  • 4
    • 77957707210 scopus 로고    scopus 로고
    • In cloud we trust?
    • Jan.
    • S. Perez, "In Cloud We Trust?" ReadWriteWeb, Jan. 2009; www.readwriteweb.com/enterprise/2009/01/in-cloud-we-trust.php.
    • (2009) ReadWriteWeb
    • Perez, S.1
  • 5
    • 70350139817 scopus 로고    scopus 로고
    • In cloud shall we trust?
    • Sept./Oct.
    • B. Michael, "In Cloud Shall We Trust?" IEEE Security & Privacy, Sept./Oct. 2009, p. 3.
    • (2009) IEEE Security & Privacy , pp. 3
    • Michael, B.1
  • 6
    • 84870829588 scopus 로고    scopus 로고
    • Taking control of the cloud for your enterprise
    • Intel SOA Expressway, June
    • B. Dournaee, "Taking Control of the Cloud for Your Enterprise," white paper, Intel SOA Expressway, June 2010.
    • (2010) White Paper
    • Dournaee, B.1
  • 7
    • 77957711315 scopus 로고    scopus 로고
    • VMware unveils security API
    • Apr.
    • N. Riter, "VMware Unveils Security API," Search Security, Apr. 2009; http://searchsecurity.techtarget.com. au/articles/31679-VMware-unveils- security-API.
    • (2009) Search Security
    • Riter, N.1
  • 8
    • 77957700037 scopus 로고    scopus 로고
    • Thinking person's guide to the cloud, Part 3b
    • 1 Nov.
    • G. Peterson, "Thinking Person's Guide to the Cloud, Part 3b," blog, 1 Nov. 2009; http://1raindrop.typepad.com/1-raindrop/2009/10/thinking- persons-guide-to-the-cloud-part-3b.html.
    • (2009) Blog
    • Peterson, G.1
  • 9
    • 77957701985 scopus 로고    scopus 로고
    • Cloud computing: Who is in control?
    • 25 June
    • D. Blum, "Cloud Computing: Who Is in Control?" Burton Group Blogs' Security and Risk Management Blog, 25 June 2009; http://srmsblog. burtongroup. com/2009/06/cloud-computing-who-is-in-control.html.
    • (2009) Burton Group Blogs' Security and Risk Management Blog
    • Blum, D.1
  • 10
    • 77249143925 scopus 로고    scopus 로고
    • Can a trusted environment provide security?
    • Jan./Feb.
    • L. Kaufmann, "Can a Trusted Environment Provide Security?" IEEE Security & Privacy, Jan./Feb. 2010, pp. 50-52.
    • (2010) IEEE Security & Privacy , pp. 50-52
    • Kaufmann, L.1
  • 11
    • 77957701461 scopus 로고    scopus 로고
    • Security and the cloudy cloud: A revolution for the infrastructure
    • Oct.
    • J. Boles, "Security and the Cloudy Cloud: A Revolution for the Infrastructure," Computerworld, Oct. 2008; http://blogs.computerworld.com/ security-in-the-cloud.
    • (2008) Computerworld
    • Boles, J.1
  • 12
    • 74549138563 scopus 로고    scopus 로고
    • Addressing cloud computing in enterprise architecture
    • K. Khan, "Addressing Cloud Computing in Enterprise Architecture," Cutter IT Journal, vol. 22, no. 11, 2009, pp. 27-33.
    • (2009) Cutter IT Journal , vol.22 , Issue.11 , pp. 27-33
    • Khan, K.1
  • 13
    • 77954945350 scopus 로고    scopus 로고
    • The information assurance practices of cloud computing vendors
    • July/Aug.
    • R. Chakraborty et al., "The Information Assurance Practices of Cloud Computing Vendors," IT Professional, July/Aug. 2010, pp. 29-37.
    • (2010) IT Professional , pp. 29-37
    • Chakraborty, R.1
  • 14
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • ACM Press
    • T. Ristenpart et al., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Comm. Security, ACM Press, 2009, pp. 199-212.
    • (2009) Proc. 16th ACM Conf. Computer and Comm. Security , pp. 199-212
    • Ristenpart, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.