-
1
-
-
79960177396
-
-
Retrieved from
-
Bain, S. A., Read, I., Thomas, J. J., & Merchant, F. (2009). Advantages of a dynamic infrastructure: A closer look at Private Cloud TCO, from IBM Rep. Retrieved from http://ftp://public.dhe.ibm.com/common/ssi/ecm/en/ zsw03126usen/ZSW03126U-SEN.PDF
-
(2009)
Advantages of A Dynamic Infrastructure: A Closer Look at Private Cloud TCO, From IBM Rep
-
-
Bain, S.A.1
Read, I.2
Thomas, J.J.3
Merchant, F.4
-
2
-
-
80052871341
-
-
Amsterdam, The Netherlands: Elsevier
-
Buyya, R., Yeo, C. H., Venugopal, S., Broberg, J., & Brandic, I. (2009). Future generation computer system. Amsterdam, The Netherlands: Elsevier.
-
(2009)
Future Generation Computer System
-
-
Buyya, R.1
Yeo, C.H.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
4
-
-
77954695824
-
-
Retrieved from
-
Cloud Security Alliance. (2010). Top threats to cloud computing. Retrieved from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0. pdf
-
(2010)
Top Threats to Cloud Computing
-
-
-
5
-
-
77749313308
-
-
Retrieved from
-
Google Inc. (2009). App engine. Retrieved from http://code.google.com/ status/appengine
-
(2009)
App Engine
-
-
-
6
-
-
80052887209
-
-
Retrieved from
-
Google Inc. (2010). Security whitepaper Google Apps messaging and collaboration products. Retrieved from http://static.googleusercontent.com/ external-content/untrusted-dlcp/www.google.com/zh-TW//a/help/intl/en/admins/pdf/ ds-gsa-apps-whitepaper-0207.pdf
-
(2010)
Security Whitepaper Google Apps Messaging and Collaboration Products
-
-
-
7
-
-
84888343237
-
-
Retrieved from
-
Google Inc. (2011a). Securityand privacy. Retrieved from http://www.google.com/support/a/bin/answer py?answer=60762
-
(2011)
Securityand Privacy
-
-
-
8
-
-
80052885873
-
-
Retrieved from
-
Google Inc. (2011b). The JRE class white list. Retrieved from http://code.google.com/appengine/docs/java/jrewhitelist.html
-
(2011)
The JRE Class White List
-
-
-
9
-
-
0242652022
-
Design science in information systems research
-
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. Management Information Systems Quarterly, 28(1), 75-105.
-
(2004)
Management Information Systems Quarterly
, vol.28
, Issue.1
, pp. 75-105
-
-
Hevner, A.R.1
March, S.T.2
Park, J.3
Ram, S.4
-
13
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
doi:10.1109/MSP.2010.45
-
Jaeger, T., & Schiffman, J. (2010). Outlook: Cloudy with a chance of security challenges and improvements. IEEE Security & Privacy, 8(1), 77-80. doi:10.1109/MSP.2010.45
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
15
-
-
80052907398
-
-
n. d., Retrieved from
-
Koppe, N. (n. d.). Ektosym. Retrieved from http://www.ektosym.com
-
Ektosym
-
-
Koppe, N.1
-
16
-
-
77958138195
-
Cloud computing in developing economies
-
Kshetri, N. (2010). Cloud computing in developing economies. IEEE Computer, 43(10), 47-55.
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 47-55
-
-
Kshetri, N.1
-
17
-
-
77949842100
-
-
Sebastopol, CA: O'Reilly Media
-
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security andprivacy. Sebastopol, CA: O'Reilly Media.
-
(2009)
Cloud Security Andprivacy
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
20
-
-
77958134141
-
In trust we trust
-
Miller, K. W., Voas, J., & Laplante, P. (2010). In trust we trust. IEEE Computer, 43(10), 85-87.
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 85-87
-
-
Miller, K.W.1
Voas, J.2
Laplante, P.3
-
21
-
-
80052898482
-
-
Retrieved from
-
OWASP (2010) Top (Madrid), 10, Retrieved from http://www.owasp.org/index. php/Top-10-2010-Main.
-
(2010)
Top (Madrid)
, vol.10
-
-
-
22
-
-
58849126641
-
Engineering rural development
-
doi:10.1145/1435417.1435433
-
Parikh, T. S. (2009). Engineering rural development. Communications of the ACM, 52(1), 54-63. doi:10.1145/1435417.1435433
-
(2009)
Communications of the ACM
, vol.52
, Issue.1
, pp. 54-63
-
-
Parikh, T.S.1
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, IL
-
th ACM Conference on Computer and Communication Security, Chicago, IL (pp. 199-212).
-
(2009)
th ACM Conference on Computer and Communication Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
77949861819
-
-
Retrieved from
-
Sun Microsystems Inc. (2009). Introduction to cloud computing architecture. Retrieved from http://webobjects.cdw.com/webobjects/media/pdf/Sun- CloudComputing.pdf
-
(2009)
Introduction to Cloud Computing Architecture
-
-
-
25
-
-
80052897778
-
-
T-Systems, Frankfurt, Germany: T-Systems International GmbH
-
T-Systems. (2010). White paper security inthe cloud. Frankfurt, Germany: T-Sy stems International GmbH.
-
(2010)
White Paper Security Inthe Cloud
-
-
|