메뉴 건너뛰기




Volumn , Issue , 2010, Pages 305-310

A dependability model to enhance security of cloud environment using systemlevel virtualization techniques

Author keywords

Cloud computing; Dependability model; Quantitative evaluation; Security; System level virtualization techniques

Indexed keywords

CLOUD COMPUTING; DEPENDABILITY MODELS; QUANTITATIVE EVALUATION; SECURITY; SYSTEM LEVELS;

EID: 78650450976     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCSPA.2010.81     Document Type: Conference Paper
Times cited : (36)

References (20)
  • 1
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the clouds
    • Dec.
    • A. Weiss, "Computing in the clouds," Networker, ACM, vol. 11(4), Dec. 2007, pp. 16-25.
    • (2007) Networker, ACM , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 3
    • 77954051808 scopus 로고    scopus 로고
    • Presentation on effective and secure use of cloud computing paradigm
    • Information Technology Laboratory Oct.
    • P. Mell and T. Grance, "Presentation on effective and secure use of cloud computing paradigm," National Institute of Standards and Technology, Information Technology Laboratory, http://csrc.nist.gov/groups/SNS/cloud- computing/index.html, Oct. 2009.
    • (2009) National Institute of Standards and Technology
    • Mell, P.1    Grance, T.2
  • 5
    • 68649085917 scopus 로고    scopus 로고
    • Security dynamics of cloud computing
    • Jun.-Jul.
    • K.M. Khan, "Security dynamics of cloud computing," Cutter IT Journal, vol. 22(6-7), Jun.-Jul. 2009, pp. 38-43.
    • (2009) Cutter IT Journal , vol.22 , Issue.6-7 , pp. 38-43
    • Khan, K.M.1
  • 7
    • 85024271255 scopus 로고    scopus 로고
    • The evolution of virtualization
    • Mar.
    • K.L. Kroeker, "The evolution of virtualization," Communications of the ACM, vol. 52(3), Mar. 2009, pp. 18-20.
    • (2009) Communications of the ACM , vol.52 , Issue.3 , pp. 18-20
    • Kroeker, K.L.1
  • 9
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • ESORICS 2009, IEEE Press, Sep.
    • Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," Proc. 14th European Symposium on Research in Computer Security, ESORICS 2009, IEEE Press, Sep. 2009, pp. 355-370.
    • (2009) Proc. 14th European Symposium on Research in Computer Security , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 11
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • CloudCom IEEE Press, Dec. 2009
    • L. Yan, C. Rong and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography," Proc. 1st International Conference on Cloud Computing, CloudCom 2009, IEEE Press, Dec. 2009, pp. 167-177.
    • (2009) Proc. 1st International Conference on Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 13
    • 67651046905 scopus 로고    scopus 로고
    • A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
    • Feb.
    • M. Al-Kuwaiti, N. Kyriakopoulos and S. Hussein, "A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability," IEEE Communications Surveys & Tutorials, vol. 11 (2), Feb. 2009, pp. 106-124.
    • (2009) IEEE Communications Surveys & Tutorials , vol.11 , Issue.2 , pp. 106-124
    • Al-Kuwaiti, M.1    Kyriakopoulos, N.2    Hussein, S.3
  • 16
    • 54849410094 scopus 로고    scopus 로고
    • Using virtualization to improve durability and portability of industrial applications
    • IEEE INDIN 2008, IEEE Press, Jul.
    • R. Alain, "Using virtualization to improve durability and portability of industrial applications," Proc. 6th IEEE International Conference on Industrial Informatics, IEEE INDIN 2008, IEEE Press, Jul. 2008, pp. 1545-1550.
    • (2008) Proc. 6th IEEE International Conference on Industrial Informatics , pp. 1545-1550
    • Alain, R.1
  • 19
    • 42949121939 scopus 로고    scopus 로고
    • Combinatorial performance modelling of toroidal cubes
    • Jan.-Feb.
    • H. H. Hashemi and H. A. Sarbazi, "Combinatorial performance modelling of toroidal cubes," Journal of Systems Architecture, vol. 54 (1-2), Jan.-Feb. 2008, pp. 241-252.
    • (2008) Journal of Systems Architecture , vol.54 , Issue.1-2 , pp. 241-252
    • Hashemi, H.H.1    Sarbazi, H.A.2
  • 20
    • 72049084751 scopus 로고    scopus 로고
    • Realistic disturbance modeling using hidden Markov models: Applications in model-based process control
    • Oct.
    • C. W. Wee and J. H. Lee, "Realistic disturbance modeling using Hidden Markov Models: applications in model-based process control," Journal of Process Control, vol.19 (9), Oct. 2009, pp. 1438-1450.
    • (2009) Journal of Process Control , vol.19 , Issue.9 , pp. 1438-1450
    • Wee, C.W.1    Lee, J.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.