메뉴 건너뛰기




Volumn 28, Issue 3, 2012, Pages 583-592

Addressing cloud computing security issues

Author keywords

Cloud computing security; Information and communication security; Public key infrastructure; Trust; Trusted Third Party

Indexed keywords

COMPUTING SECURITY; INFORMATION AND COMMUNICATION; PUBLIC KEY INFRASTRUCTURE; TRUST; TRUSTED THIRD PARTIES;

EID: 79959557055     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2010.12.006     Document Type: Article
Times cited : (1473)

References (32)
  • 2
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Information Technology Laboratory
    • National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.
    • (2009) The NIST Definition of Cloud Computing
  • 7
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • B. Rajkumar, C. Yeo, S. Venugopal, and S. Malpani Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 2009
    • (2009) Future Generation Computer Systems
    • Rajkumar, B.1    Yeo, C.2    Venugopal, S.3    Malpani, S.4
  • 10
    • 79951852502 scopus 로고    scopus 로고
    • Dynamic trust enhanced security model for trusted platform based
    • 10.1016/j.future.2010.10.008
    • A. Nagarajan, and V. Varadharajan Dynamic trust enhanced security model for trusted platform based Future Generation Computer Systems 2010 10.1016/j.future.2010.10.008
    • (2010) Future Generation Computer Systems
    • Nagarajan, A.1    Varadharajan, V.2
  • 12
    • 0041376599 scopus 로고    scopus 로고
    • Establishing and managing trust within the public key infrastructure
    • D. Lekkas Establishing and managing trust within the public key infrastructure Computer Communications 26 16 2003
    • (2003) Computer Communications , vol.26 , Issue.16
    • Lekkas, D.1
  • 14
    • 78149311121 scopus 로고    scopus 로고
    • Service selection decision support in the Internet of services
    • Lecture Notes in Computer Science 10.1007/978-3-642-15681-62
    • K. Tserpes, F. Aisopos, D. Kyriazis, and T. Varvarigou Service selection decision support in the Internet of services Economics of Grids, Clouds, Systems, and Services Lecture Notes in Computer Science vol. 6296 2010 16 33 10.1007/978-3-642-15681-62
    • (2010) Economics of Grids, Clouds, Systems, and Services , vol.6296 VOL. , pp. 16-33
    • Tserpes, K.1    Aisopos, F.2    Kyriazis, D.3    Varvarigou, T.4
  • 15
    • 0026837629 scopus 로고
    • Distributed systems security
    • R. Sherman Distributed systems security Computers & Security 11 1 1992
    • (1992) Computers & Security , vol.11 , Issue.1
    • Sherman, R.1
  • 19
    • 77954695824 scopus 로고    scopus 로고
    • Cloud Security Alliance Cloud Security Alliance
    • Cloud Security Alliance. Top threats to cloud computing, Cloud Security Alliance, 2010.
    • (2010) Top Threats to Cloud Computing
  • 20
    • 0026837629 scopus 로고
    • Distributed systems security
    • R. Sherman Distributed systems security Computers & Security 11 1 1992
    • (1992) Computers & Security , vol.11 , Issue.1
    • Sherman, R.1
  • 21
    • 0032095015 scopus 로고    scopus 로고
    • Trusted third party services for health care in Europe
    • PII S0167739X98000089
    • D. Polemi Trusted third party services for health care in Europe Future Generation Computer Systems 14 1998 51 59 (Pubitemid 128401571)
    • (1998) Future Generation Computer Systems , vol.14 , Issue.1-2 , pp. 51-59
    • Polemi, D.1
  • 22
    • 2142728363 scopus 로고
    • Code of practice and management guidelines for trusted third party services
    • S. Castell, Code of practice and management guidelines for trusted third party services, INFOSEC Project Report S2101/02, 1993.
    • (1993) INFOSEC Project Report S2101/02
    • Castell, S.1
  • 25
    • 80655143254 scopus 로고    scopus 로고
    • A technical comparison of IPSec and SSL
    • A. Alshamsi, and T. Saito A technical comparison of IPSec and SSL Cryptology 2004
    • (2004) Cryptology
    • Alshamsi, A.1    Saito, T.2
  • 26
    • 80655143252 scopus 로고    scopus 로고
    • Cloud Identity Summit Cloud identity summit, Retrieved on 10/11/2010
    • Cloud Identity Summit, Secure the cloud now, Cloud identity summit, Retrieved on 10/11/2010 from: http://www.cloudidentitysummit.com/.
    • Secure the Cloud Now
  • 27
    • 80655135179 scopus 로고    scopus 로고
    • Retrieved on 10/11/2010
    • Internet 2, Shibboleth [Online] 2007, Retrieved on 10/11/2010 from: http://shibboleth.internet2.edu/.
    • (2007) Internet 2, Shibboleth
  • 28
    • 80655143248 scopus 로고    scopus 로고
    • Shibboleth, Internet 2 Retrieved on 10/11/2010
    • Internet 2, FAQ on SAML and Shibboleth relationship, Shibboleth, Internet 2, 2010. Retrieved on 10/11/2010 from: http://shibboleth.internet2.edu/ Shibboleth-SAML-FAQ.html.
    • (2010) Internet 2, FAQ on SAML and Shibboleth Relationship
  • 29
    • 80655135176 scopus 로고    scopus 로고
    • UK Federation Information Centre, UK federation information centre, 2007
    • UK Federation Information Centre, UK federation information centre, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.