메뉴 건너뛰기




Volumn , Issue , 2011, Pages 364-371

Collaboration-based cloud computing security management framework

Author keywords

Cloud computing; Cloud computing security; Cloud computing security management

Indexed keywords

CLOUD COMPUTING SECURITY; CLOUD COMPUTING SECURITY MANAGEMENT; CLOUD PROVIDERS; COMPUTING PLATFORM; COMPUTING SECURITY; ENTERPRISE IT; INTERNET BASED COMPUTING; MULTI TENANTS; PROOF OF CONCEPT; SECURITY CERTIFICATE; SECURITY CONSTRAINT; SECURITY CONTROLS; SECURITY MANAGEMENT; SECURITY MANAGEMENT PROCESS; SECURITY STANDARDS; SERVICE LEVEL AGREEMENTS; SERVICE PROVIDER;

EID: 80053151113     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2011.9     Document Type: Conference Paper
Times cited : (153)

References (22)
  • 1
    • 80053154308 scopus 로고    scopus 로고
    • International Data Corporate (IDC) Accessed Dec 2010
    • International Data Corporate (IDC), "Ranking of issues of Cloud Computing model," 2010. Accessed Dec 2010.
    • (2010) Ranking of Issues of Cloud Computing Model
  • 3
    • 80053150031 scopus 로고    scopus 로고
    • Accessed Dec'10
    • Cloud Security Alliance Group, "CSA-GRC Stack," , Accessed Dec'10
    • CSA-GRC Stack
  • 7
    • 78049341379 scopus 로고    scopus 로고
    • The service security lab: A model-driven platform to compose and explore service security in the cloud
    • SERVICES2010
    • M. Menzel, R. Warschofsky, et al, "The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud," 6th World Congress, SERVICES2010, pp.115-122.
    • 6th World Congress , pp. 115-122
    • Menzel, M.1    Warschofsky, R.2
  • 14
    • 4143084933 scopus 로고    scopus 로고
    • The CORAS framework for a model-based risk management process
    • Springer
    • R. Fredriksen, M. Kristiansen, et al, "The CORAS Framework for a Model-Based Risk Management Process," in Computer Safety, Reliability and Security. vol. 2434, Springer, 2002, pp. 39-53.
    • (2002) Computer Safety, Reliability and Security , vol.2434 , pp. 39-53
    • Fredriksen, R.1    Kristiansen, M.2
  • 16
    • 52449118530 scopus 로고    scopus 로고
    • Towards automation for pervasive network security management using an integration of ontology-based and policy-based approach
    • Dalian
    • H. Xu, X. Xia, et al "Towards Automation for Pervasive Network Security Management Using an Integration of Ontology-Based and Policy-Based Approach," 3rd International Conference Innovative Computing Information and Control, 2008, pp. 87-87, Dalian.
    • (2008) 3rd International Conference Innovative Computing Information and Control , pp. 87-87
    • Xu, H.1    Xia, X.2
  • 21
    • 80053142535 scopus 로고    scopus 로고
    • Mitre Corporation Accessed on Jan 2011
    • Mitre Corporation. (2010), Making Security Measurable, http://measurablesecurity.mitre.org/, Accessed on Jan 2011
    • (2010) Making Security Measurable
  • 22
    • 80053169933 scopus 로고    scopus 로고
    • Accessed in Dec 2010
    • NIST. National Vulnerabilities Database Home. http://nvd.nist.gov/, Accessed in Dec 2010.
    • NIST


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.