메뉴 건너뛰기




Volumn , Issue , 2010, Pages 13-17

Towards a discipline of mission-aware cloud computing

Author keywords

Cloud computing; Cyber security; Mission assurance; Mission effectiveness

Indexed keywords

BUSINESS APPLICATIONS; BUSINESS COMMUNITY; BUSINESS FUNCTIONS; CLOUD COMPUTING; COMMERCIAL MARKETPLACE; COMMERCIAL SECTOR; COMMUNICATION INFRASTRUCTURE; CURRENT MISSIONS; CYBER SECURITY; INFORMATION ASSURANCE; MISSION ASSURANCE; MISSION EFFECTIVENESS; POSITION PAPERS; POTENTIAL CUSTOMERS; RESEARCH CHALLENGES; SECURITY POLICY; US DEPARTMENT OF DEFENSE;

EID: 78650161685     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866835.1866839     Document Type: Conference Paper
Times cited : (25)

References (22)
  • 1
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing, version 2.1
    • December
    • Security guidance for critical areas of focus in cloud computing, version 2.1. Cloud Security Alliance, December 2009.
    • (2009) Cloud Security Alliance
  • 6
    • 70349751513 scopus 로고    scopus 로고
    • Market-oriented cloud computing: Vision, hype, and reality of delivering computing as the 5th utility
    • R. Buyya. Market-oriented cloud computing: Vision, hype, and reality of delivering computing as the 5th utility. IEEE International Symposium on Cluster Computing and the Grid, 2009.
    • (2009) IEEE International Symposium on Cluster Computing and the Grid
    • Buyya, R.1
  • 7
    • 0003969633 scopus 로고
    • DoD National Computer Security Center (DoD 5200.28-STD) December
    • DoD National Computer Security Center (DoD 5200.28-STD). Trusted Computer System Evaluation Criteria, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 11
    • 52249104197 scopus 로고    scopus 로고
    • ORGs for scalable, robust, privacy-friendly client cloud computing
    • C. Hewitt. ORGs for scalable, robust, privacy-friendly client cloud computing. IEEE Internet Computing, 12(5):96-99, 2008.
    • (2008) IEEE Internet Computing , vol.12 , Issue.5 , pp. 96-99
    • Hewitt, C.1
  • 12
    • 77249130262 scopus 로고    scopus 로고
    • Outlook: Cloudy with a chance of security challenges and improvements
    • Jan.-Feb.
    • T. Jaeger and J. Schiffman. Outlook: Cloudy with a chance of security challenges and improvements. Security & Privacy, IEEE, 8(1):77-80, Jan.-Feb. 2010.
    • (2010) Security & Privacy, IEEE , vol.8 , Issue.1 , pp. 77-80
    • Jaeger, T.1    Schiffman, J.2
  • 13
    • 78650141515 scopus 로고    scopus 로고
    • The cloud-SOA connection
    • Feb 10
    • P. Krill. The cloud-SOA connection. InfoWorld, Feb 10, 2009.
    • (2009) InfoWorld
    • Krill, P.1
  • 15
    • 77953221164 scopus 로고    scopus 로고
    • Securing elasticity in the cloud
    • D. Owens. Securing elasticity in the cloud. Commun. ACM, 53(6):46-51, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.6 , pp. 46-51
    • Owens, D.1
  • 18
    • 69349098776 scopus 로고    scopus 로고
    • Cloud computing and the common man
    • J. Viega. Cloud computing and the common man. IEEE Computer, 42(8):106-108, 2009.
    • (2009) IEEE Computer , vol.42 , Issue.8 , pp. 106-108
    • Viega, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.