메뉴 건너뛰기




Volumn , Issue , 2010, Pages 276-279

Attack surfaces: A taxonomy for attacks on cloud services

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; CLOUD SERVICES; SECURITY RISKS; WORK-IN-PROGRESS;

EID: 77957955892     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2010.23     Document Type: Conference Paper
Times cited : (179)

References (10)
  • 1
    • 71749105371 scopus 로고    scopus 로고
    • Assessing the security risks of cloud computing
    • [Online]. Available
    • J. Heiser and M. Nicolett, "Assessing the security risks of cloud computing," Gartner Report, 2009. [Online]. Available: http://www.gartner. com/DisplayDocument?id=685308.
    • (2009) Gartner Report
    • Heiser, J.1    Nicolett, M.2
  • 3
    • 70449636536 scopus 로고    scopus 로고
    • On a classification approach for soa vulnerabilities
    • L. Lowis and R. Accorsi, "On a classification approach for soa vulnerabilities," in COMPSAC (2), 2009, pp. 439-444.
    • (2009) COMPSAC , Issue.2 , pp. 439-444
    • Lowis, L.1    Accorsi, R.2
  • 5
    • 60649121295 scopus 로고    scopus 로고
    • Invisible intruders: Rootkits in practice
    • D. Brumley, "invisible intruders: rootkits in practice," USENIX, 1999.
    • (1999) USENIX
    • Brumley, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.