메뉴 건너뛰기




Volumn 3, Issue 2, 2011, Pages 1-13

Risk assessment for cloud-based IT systems

Author keywords

Cloud Computing; Google App Engine; ISO IEC 2700x; OWASP; Risk management

Indexed keywords

COMPUTING SERVICES; COMPUTING SOLUTIONS; ECONOMIC BENEFITS; ISO/IEC; IT SYSTEM; OWASP; STUDY CASE;

EID: 80052901106     PISSN: 19380259     EISSN: 19380267     Source Type: Journal    
DOI: 10.4018/jghpc.2011040101     Document Type: Article
Times cited : (16)

References (27)
  • 4
    • 77954695824 scopus 로고    scopus 로고
    • Retrieved from
    • Cloud Security Alliance. (2010). Top threats to cloud computing. Retrieved from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0. pdf
    • (2010) Top Threats to Cloud Computing
  • 5
    • 77749313308 scopus 로고    scopus 로고
    • Retrieved from
    • Google Inc. (2009). App engine. Retrieved from http://code.google.com/ status/appengine
    • (2009) App Engine
  • 6
    • 80052887209 scopus 로고    scopus 로고
    • Retrieved from
    • Google Inc. (2010). Security whitepaper Google Apps messaging and collaboration products. Retrieved from http://static.googleusercontent.com/ external-content/untrusted-dlcp/www.google.com/zh-TW//a/help/intl/en/admins/pdf/ ds-gsa-apps-whitepaper-0207.pdf
    • (2010) Security Whitepaper Google Apps Messaging and Collaboration Products
  • 7
    • 84888343237 scopus 로고    scopus 로고
    • Retrieved from
    • Google Inc. (2011a). Securityand privacy. Retrieved from http://www.google.com/support/a/bin/answer py?answer=60762
    • (2011) Securityand Privacy
  • 8
    • 80052885873 scopus 로고    scopus 로고
    • Retrieved from
    • Google Inc. (2011b). The JRE class white list. Retrieved from http://code.google.com/appengine/docs/java/jrewhitelist.html
    • (2011) The JRE Class White List
  • 13
    • 77249130262 scopus 로고    scopus 로고
    • Outlook: Cloudy with a chance of security challenges and improvements
    • doi:10.1109/MSP.2010.45
    • Jaeger, T., & Schiffman, J. (2010). Outlook: Cloudy with a chance of security challenges and improvements. IEEE Security & Privacy, 8(1), 77-80. doi:10.1109/MSP.2010.45
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1 , pp. 77-80
    • Jaeger, T.1    Schiffman, J.2
  • 15
    • 80052907398 scopus 로고    scopus 로고
    • n. d., Retrieved from
    • Koppe, N. (n. d.). Ektosym. Retrieved from http://www.ektosym.com
    • Ektosym
    • Koppe, N.1
  • 16
    • 77958138195 scopus 로고    scopus 로고
    • Cloud computing in developing economies
    • Kshetri, N. (2010). Cloud computing in developing economies. IEEE Computer, 43(10), 47-55.
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 47-55
    • Kshetri, N.1
  • 21
    • 80052898482 scopus 로고    scopus 로고
    • Retrieved from
    • OWASP (2010) Top (Madrid), 10, Retrieved from http://www.owasp.org/index. php/Top-10-2010-Main.
    • (2010) Top (Madrid) , vol.10
  • 22
    • 58849126641 scopus 로고    scopus 로고
    • Engineering rural development
    • doi:10.1145/1435417.1435433
    • Parikh, T. S. (2009). Engineering rural development. Communications of the ACM, 52(1), 54-63. doi:10.1145/1435417.1435433
    • (2009) Communications of the ACM , vol.52 , Issue.1 , pp. 54-63
    • Parikh, T.S.1
  • 24
    • 77949861819 scopus 로고    scopus 로고
    • Retrieved from
    • Sun Microsystems Inc. (2009). Introduction to cloud computing architecture. Retrieved from http://webobjects.cdw.com/webobjects/media/pdf/Sun- CloudComputing.pdf
    • (2009) Introduction to Cloud Computing Architecture
  • 25
    • 80052897778 scopus 로고    scopus 로고
    • T-Systems, Frankfurt, Germany: T-Systems International GmbH
    • T-Systems. (2010). White paper security inthe cloud. Frankfurt, Germany: T-Sy stems International GmbH.
    • (2010) White Paper Security Inthe Cloud


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.