메뉴 건너뛰기




Volumn 28, Issue 4, 2011, Pages 279-291

A cross section of the issues and research activities related to both information security and cloud computing

Author keywords

Cloud computing; Information security; Virtualization

Indexed keywords

COMPUTING ENVIRONMENTS; CROSS SECTION; END-USER EXPERIENCE; GENERAL DESCRIPTION; PERFORMANCE COSTS; RESEARCH ACTIVITIES; RESEARCH OPPORTUNITIES; SECURITY RESEARCH; SECURITY SOLUTIONS; TECHNICAL DETAILS; VIRTUALIZATION;

EID: 80052173864     PISSN: 02564602     EISSN: 09745971     Source Type: Journal    
DOI: 10.4103/0256-4602.83549     Document Type: Article
Times cited : (29)

References (34)
  • 5
    • 80052185561 scopus 로고    scopus 로고
    • OProfile. Available from: Last accessed on 2011 Feb 1
    • OProfile. Available from: http://oprofile.sourceforge.net [Last accessed on 2011 Feb 1].
  • 7
    • 77955131289 scopus 로고    scopus 로고
    • Can public-cloud security meet its unique challenges?
    • L. M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?," IEEE Security and Privacy, vol. 8, pp. 55-7, 2010.
    • (2010) IEEE Security and Privacy , vol.8 , pp. 55-57
    • Kaufman, L.M.1
  • 8
    • 85012229582 scopus 로고    scopus 로고
    • Security in the cloud
    • G. Anthes, "Security in the Cloud," ACM Communications vol. 53, pp. 16-8, 2010.
    • (2010) ACM Communications , vol.53 , pp. 16-18
    • Anthes, G.1
  • 11
    • 80052181552 scopus 로고    scopus 로고
    • Available from: Last accessed on 2011 Feb 1
    • P. Nicolas, Cloud Multitenancy. Available from: http://www. slideshare.net/pnicolas/cloudmultitenancy [Last accessed on 2011 Feb 1].
    • Cloud Multitenancy
    • Nicolas, P.1
  • 14
    • 60349120237 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • M. Naor, and G. N. Rothblum, "The Complexity of Online Memory Checking," Journal of the ACM, vol. 56, pp. 1-46, 2009.
    • (2009) Journal of the ACM , vol.56 , pp. 1-46
    • Naor, M.1    Rothblum, G.N.2
  • 17
    • 80052159427 scopus 로고    scopus 로고
    • Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA. Technical Report NASTR-0030-2006
    • L. S. Clair, L. Johansen, K. Butler, W. Enck, M. Pirretti, P. Traynor, et al., "Password Exhaustion: Predicting the End of Password Usefulness," Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA. Technical Report NASTR- 0030-2006, 2007.
    • (2007) Password Exhaustion: Predicting the End of Password Usefulness
    • Clair, L.S.1    Johansen, L.2    Butler, K.3    Enck, W.4    Pirretti, M.5    Traynor, P.6
  • 18
    • 27944460383 scopus 로고    scopus 로고
    • Efficient fingerprint-based user authentication for embedded systems
    • 14.5, Proceedings 2005, 42nd Design Automation Conference, DAC 2005
    • P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha, "Efficient Fingerprint-based User Authentication for Embedded Systems," in Proceedings of the 42nd annual Design Automation Conference, Anaheim, California, USA, pp. 244-7, 2005. (Pubitemid 41675437)
    • (2005) Proceedings - Design Automation Conference , pp. 244-247
    • Gupta, P.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 19
    • 67549132170 scopus 로고    scopus 로고
    • Fingerprint biometric based self-authentication and deniable authentication schemes for the electronic world
    • M. K. Khan, "Fingerprint Biometric based Self-Authentication and Deniable Authentication Schemes for the Electronic World," IETE Technical Review, vol. 26, pp. 191-5, 2010.
    • IETE Technical Review , vol.26 , Issue.2010 , pp. 191-5
    • Khan, M.K.1
  • 21
    • 67549099270 scopus 로고    scopus 로고
    • Analysis, feature extraction, modeling and testing techniques for speaker recognition
    • H. S. Jayanna, and S. R. M. Prasanna, "Analysis, Feature Extraction, Modeling and Testing Techniques for Speaker Recognition," IETE Technical Review, vol. 26, pp. 181-90, 2009.
    • (2009) IETE Technical Review , vol.26 , pp. 181-190
    • Jayanna, H.S.1    Prasanna, S.R.M.2
  • 22
    • 77956257783 scopus 로고    scopus 로고
    • A context-aware access control model for pervasive environments
    • S. Al-Rwais, and J. Al-Muhtadi, "A Context-aware Access Control Model for Pervasive Environments," IETE Technical Review, vol. 27, pp. 371-9, 2010.
    • (2010) IETE Technical Review , vol.27 , pp. 371-379
    • S. Al-Rwais1    J. Al-Muhtadi2
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," ACM Communications vol. 21, pp. 120-6, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.