메뉴 건너뛰기




Volumn 3, Issue 1, 2011, Pages 132-142

Information security of cloud computing for enterprises

Author keywords

Cloud computing; Information security; Internet hacking; Server as a service

Indexed keywords

CLOUD COMPUTING; COMPUTER CRIME; INTRUSION DETECTION; MOBILE COMMERCE; NETWORK SECURITY; PERSONAL COMPUTING; SECURITY OF DATA; WEBSITES;

EID: 79952749520     PISSN: 19763700     EISSN: None     Source Type: None    
DOI: 10.4156/aiss.vol3.issue1.16     Document Type: Article
Times cited : (44)

References (22)
  • 1
    • 79952741679 scopus 로고    scopus 로고
    • accessed on Sep 2009 and Apr
    • Gartner Incorporation, http://www.gartner.com/, accessed on Sep 2009 and Apr 2010.
    • (2010) Gartner Incorporation
  • 10
    • 79952741315 scopus 로고    scopus 로고
    • accessed on April 10
    • http://www.cloudsecurity.org, accessed on April 10, 2009.
    • (2009)
  • 11
    • 79952752931 scopus 로고    scopus 로고
    • accessed on April 09
    • Sampling issues we are addressing, http://cloudsecurityalliance.org/issues.html#15, accessed on April 09, 2009.
    • (2009) Sampling Issues We Are Addressing
  • 13
  • 19
    • 84966827837 scopus 로고    scopus 로고
    • Anatomy of the libvirt virtualization library
    • Jan
    • M. Tim Jones, Anatomy of the libvirt virtualization library, IBM developer Works, pp. 97-108, Jan 2010.
    • (2010) IBM Developer Works , pp. 97-108
    • Tim, J.M.1
  • 20
    • 79952744996 scopus 로고    scopus 로고
    • Access on Jan 26
    • Access on Jan 26, 2010. http://www.ibm.com/developerworks/linux/library/llibvirt/index.html?ca=dgr-lnxw82LXlibvirt-APIdth-X&S_TACT=105AGX59&S_CMP=lnxw82.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.