메뉴 건너뛰기




Volumn 9, Issue 2, 2011, Pages 50-57

Understanding cloud computing vulnerabilities

Author keywords

cloud computing; computer systems organization; emerging technologies; network security; Risk management; security; software engineering

Indexed keywords

ARCHITECTURAL COMPONENTS; COMPUTER SYSTEMS ORGANIZATION; COMPUTING SECURITY; EMERGING TECHNOLOGIES; REFERENCE ARCHITECTURE; RISK FACTORS; SECURITY; SECURITY ISSUES;

EID: 79953657305     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.115     Document Type: Article
Times cited : (530)

References (5)
  • 2
    • 79953670386 scopus 로고    scopus 로고
    • Effectively and securely using the cloud computing paradigm v0.25
    • P. Mell and T. Grance, "Effectively and Securely Using the Cloud Computing Paradigm (v0.25)," presentation, US Nat'l Inst. Standards and Technology, 2009; http:// csrc.nist.gov/groups/SNS/cloud-computing.
    • (2009) Presentation US Natl Inst. Standards and Technology
    • Mell, P.1    Grance, T.2
  • 3
    • 79953661164 scopus 로고    scopus 로고
    • European network information security agency
    • ENISA Nov.
    • European Network and Information Security Agency (ENISA), Cloud Computing: Benefits, Risks and Recommendations for Information Security, Nov. 2009; www. enisa.europa.eu/act/rm/f iles/del iverables/cloud -computing-risk-assessment/at-download/fullReport.
    • (2009) Cloud Computing: Benefits Risks and Recom-mendations for Information Security


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.