-
2
-
-
78149238589
-
Cloud computing: The limits of public clouds for business applications
-
Nov./Dec.
-
P. Hofmann and D. Woods. "Cloud Computing: The Limits of Public Clouds for Business Applications." IEEE Internet Computing, vol.14, no. 6, pp. 90-93, Nov./Dec. 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.6
, pp. 90-93
-
-
Hofmann, P.1
Woods, D.2
-
4
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia. "A View of Cloud Computing." Communications of the ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
78349299500
-
The management of security in cloud computing
-
S. Ramgovind, M.M. Eloff and E. Smith. "The Management of Security in Cloud Computing" In Proc. ISSA, 2010, pp. 1-7.
-
(2010)
Proc. ISSA
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
7
-
-
34249989942
-
A coherent strategy for data security through data governance
-
DOI 10.1109/MSP.2007.51
-
R.L. Trope, E.M. Power, V.I. Polley and B.C.Morley. "A Coherent Strategy for Data Security through Data Governance." IEEE Security & Privacy, vol. 5, no. 3, pp. 32-39, May/Jun. 2007. (Pubitemid 46883432)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 32-39
-
-
Trope, R.L.1
Power, E.M.2
Polley, V.I.3
Morley, B.C.4
-
9
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Nov./Dec.
-
H. Takabi, J.B.D. Joshi and G.J. Ahn. "Security and Privacy Challenges in Cloud Computing Environments." IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
11
-
-
77955712658
-
Toward dynamic and attribute based publication, discovery and selection for cloud computing
-
Jul.
-
A. Goscinski and M. Brock. "Toward dynamic and attribute based publication, discovery and selection for cloud computing." Future Generation Computer Systems, vol. 26, no. 7, pp. 947-970, Jul. 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.7
, pp. 947-970
-
-
Goscinski, A.1
Brock, M.2
-
14
-
-
15744374605
-
Multilevel security and information flow in petri net workflows
-
K. Knorr. "Multilevel Security and Information Flow in Petri Net Workflows." In Proc. ICTSM, 2001, pp. 9-20.
-
(2001)
Proc. ICTSM
, pp. 9-20
-
-
Knorr, K.1
-
15
-
-
63249084376
-
Verification of workflow processes under multilevel security considerations
-
K. Barkaoui, R.B. Ayed, H. Boucheneb and A. Hicheur. "Verification of Workflow Processes Under Multilevel Security Considerations." In Proc. CRiSIS, 2008, pp. 77-84.
-
(2008)
Proc. CRiSIS
, pp. 77-84
-
-
Barkaoui, K.1
Ayed, R.B.2
Boucheneb, H.3
Hicheur, A.4
-
16
-
-
78651374724
-
Identification of a companys suitability for the adoption of cloud computing and modeling its corresponding Return on Investment
-
Feb.
-
S.C. Misra and A. Mondal. "Identification of a companys suitability for the adoption of cloud computing and modeling its corresponding Return on Investment." Mathematical and Computer Modelling, vol. 53, no. 3-4, pp. 504-521, Feb. 2011.
-
(2011)
Mathematical and Computer Modelling
, vol.53
, Issue.3-4
, pp. 504-521
-
-
Misra, S.C.1
Mondal, A.2
-
17
-
-
38049152588
-
Usability challenges in security and privacy policy-authoring interfaces
-
R.W. Reeder, C.M. Karat, J. Karat and C Brodie."Usability Challenges in Security and Privacy Policy-Authoring Interfaces." In Proc. INTERACT, 2007, pp. 141-155.
-
(2007)
Proc. INTERACT
, pp. 141-155
-
-
Reeder, R.W.1
Karat, C.M.2
Karat, J.3
Brodie, C.4
-
18
-
-
79951875368
-
Optimizing a policy authoring framework for security and privacy policies
-
article 8
-
M. Johnson, J. Karat, C.M. Karat and K. Grueneberg. "Optimizing a Policy Authoring Framework for Security and Privacy Policies." In Proc. SOUPS, 2010, article 8.
-
(2010)
Proc. SOUPS
-
-
Johnson, M.1
Karat, J.2
Karat, C.M.3
Grueneberg, K.4
-
21
-
-
70349657130
-
Deploying security policy in intra and inter workflow management systems
-
S. Ayed, N. Cuppens-Boulahia and F. Cuppens. "Deploying Security Policy in Intra and Inter Workflow Management Systems." In Proc. ARES, 2009, pp. 58-65.
-
(2009)
Proc. ARES
, pp. 58-65
-
-
Ayed, S.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
22
-
-
78650276567
-
Composable cost estimation and monitoring for computational applications in cloud computing environments
-
H.L. Truong and S. Dustdar. "Composable Cost Estimation and Monitoring for Computational Applications in Cloud Computing Environments." In Proc. ICCS, 2010, pp. 2175-2184.
-
(2010)
Proc. ICCS
, pp. 2175-2184
-
-
Truong, H.L.1
Dustdar, S.2
-
23
-
-
34748912976
-
Elevating the discussion on security management the data centric paradigm
-
DOI 10.1109/BDIM.2007.375015, 4261104, Second IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM 2007
-
T. Grandison, M. Bilger, L. OConnor, M. Graf, M. Swimmer, M. Schunter, A. Wespi and N. Zunic. "Elevating the Discussion on Security Management: The Data Centric Paradigm." In Proc. BDIM, 2007, pp. 84-93. (Pubitemid 47469396)
-
(2007)
Second IEEE/IFIP International Workshop on Business-Driven IT Management, BDIM 2007
, pp. 84-93
-
-
Grandison, T.1
Bilger, M.2
O'Connor, L.3
Graf, M.4
Swimmer, M.5
Schunter, M.6
Wespi, A.7
Zunic, N.8
-
24
-
-
84876359591
-
Auditing workflow execution against dataflow policies
-
R. Accorsi and C. Wonnemann. "Auditing Workflow Execution against Dataflow Policies." In Proc. BIS, 2010, pp. 207-217.
-
(2010)
Proc. BIS
, pp. 207-217
-
-
Accorsi, R.1
Wonnemann, C.2
-
25
-
-
79951515545
-
Cloud computing the business perspective
-
Apr.
-
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi. "Cloud Computing The business perspective." Decision Support Systems, vol. 51, no. 1, pp. 176-189, Apr. 2011.
-
(2011)
Decision Support Systems
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
26
-
-
35248864467
-
Handling dynamic changes in decentralized workflow execution environments
-
V. Atluri and S.A. Chun. "Handling Dynamic Changes in Decentralized Workflow Execution Environments." In Proc. DEXA, 2003, pp. 813-825.
-
(2003)
Proc. DEXA
, pp. 813-825
-
-
Atluri, V.1
Chun, S.A.2
|