메뉴 건너뛰기




Volumn 193 CCIS, Issue PART 4, 2011, Pages 432-444

Towards achieving accountability, auditability and trust in cloud computing

Author keywords

accountability; Accountable cloud computing; audit trails; continuous auditing; logging; trusted computing platform

Indexed keywords

ACCOUNTABILITY; ACCOUNTABLE CLOUD COMPUTING; AUDIT TRAILS; CONTINUOUS AUDITING; TRUSTED COMPUTING PLATFORM;

EID: 80051570703     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-22726-4_45     Document Type: Conference Paper
Times cited : (72)

References (42)
  • 5
    • 71749090060 scopus 로고    scopus 로고
    • Accountability as a way forward for privacy protection in the cloud
    • Pearson, S., Charlesworth, A.: Accountability as a way forward for privacy protection in the cloud. In: Cloud Computing 2009, pp. 131-144 (2009)
    • (2009) Cloud Computing 2009 , pp. 131-144
    • Pearson, S.1    Charlesworth, A.2
  • 6
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • Armbrust, M., et al.: A view of cloud computing. Communications of the ACM 53(4), 50-58 (2010)
    • (2010) Communications of the ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1
  • 11
    • 80051576050 scopus 로고    scopus 로고
    • Auditing in shared distributed virtualized environments
    • Baldwin, A., Shiu, S., Beres, Y.: Auditing in shared distributed virtualized environments. HP Technical Reports (2008)
    • (2008) HP Technical Reports
    • Baldwin, A.1    Shiu, S.2    Beres, Y.3
  • 12
    • 80051557418 scopus 로고    scopus 로고
    • HyTrust. HyTrust Appliance (2010), http://www.hytrust.com/product/ overview/
    • (2010) HyTrust Appliance
  • 15
    • 80051573080 scopus 로고    scopus 로고
    • Live Forensics and the Cloud - Part 1
    • Shende, J.: Live Forensics and the Cloud - Part 1. Cloud Computing Journal (2010), http://cloudcomputing.sys-con.com/node/1547944
    • (2010) Cloud Computing Journal
    • Shende, J.1
  • 17
    • 42449132132 scopus 로고    scopus 로고
    • Provenance in databases: Past, current, and future
    • Tan, W.: Provenance in databases: Past, current, and future. Data Engineering 2007, 3 (2007)
    • (2007) Data Engineering 2007 , vol.3
    • Tan, W.1
  • 19
    • 85013596514 scopus 로고    scopus 로고
    • Concepts of trusted computing
    • Mitchell, C.J. (ed.) The Institute of Electrical Engineers (IEE), London
    • Proudler, G.: Concepts of trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series, vol. 6, pp. 11-27. The Institute of Electrical Engineers (IEE), London (2005)
    • (2005) Trusted Computing. IEE Professional Applications of Computing Series , vol.6 , pp. 11-27
    • Proudler, G.1
  • 22
    • 0019009078 scopus 로고    scopus 로고
    • OSI reference model-The ISO model of architecture for open systems interconnection
    • Zimmermann, H.: OSI reference model-The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4), 425-432 (2002)
    • (2002) IEEE Transactions on Communications , vol.28 , Issue.4 , pp. 425-432
    • Zimmermann, H.1
  • 29
    • 0002165432 scopus 로고
    • The history and development of transaction log analysis
    • Peters, T.: The history and development of transaction log analysis. Library Hi Tech. 11(2), 41-66 (1993)
    • (1993) Library Hi Tech. , vol.11 , Issue.2 , pp. 41-66
    • Peters, T.1
  • 30
    • 79952673678 scopus 로고    scopus 로고
    • A computer scientist's introductory guide to business process management (BPM)
    • Ko, R.: A computer scientist's introductory guide to business process management (BPM). ACM Crossroads 15(4), 11-18 (2009)
    • (2009) ACM Crossroads , vol.15 , Issue.4 , pp. 11-18
    • Ko, R.1
  • 31
    • 70349678836 scopus 로고    scopus 로고
    • Business process management (BPM) standards: A survey
    • Ko, R., Lee, S., Lee, E.: Business process management (BPM) standards: a survey. Business Process Management Journal 15(5), 744-791 (2009)
    • (2009) Business Process Management Journal , vol.15 , Issue.5 , pp. 744-791
    • Ko, R.1    Lee, S.2    Lee, E.3
  • 32
  • 33
    • 80051555086 scopus 로고    scopus 로고
    • Cloud Security Alliance: Trusted Cloud Initiative (2010), http://www.cloudsecurityalliance.org/trustedcloud.html
    • (2010) Trusted Cloud Initiative
  • 35
    • 80051566784 scopus 로고    scopus 로고
    • Cloud Security Alliance (2010), http://www.cloudsecurityalliance.org/
    • (2010)
  • 37
    • 80051557542 scopus 로고    scopus 로고
    • Knode, R.: CloudTrust 2.0 (2010), http://scap.nist.gov/events/2010/itsac/ presentations/day2/Security-Automation-for-Cloud-Computing-CloudTrust-2.0.pdf
    • (2010) CloudTrust 2.0
    • Knode, R.1
  • 38
    • 79960249132 scopus 로고    scopus 로고
    • Enhancing privacy in cloud computing via policybased obfuscation
    • Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policybased obfuscation. The Journal of Supercomputing, 1-25 (2010)
    • (2010) The Journal of Supercomputing , pp. 1-25
    • Mowbray, M.1    Pearson, S.2    Shen, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.