메뉴 건너뛰기




Volumn , Issue , 2011, Pages 379-384

Application of a distributed security method to end-2-end services security in independent heterogeneous cloud computing environments

Author keywords

End to end security; Heterogeneous clouds; Interoperable clouds

Indexed keywords

COMPUTING ENVIRONMENTS; CONTROL MECHANISM; DISTRIBUTED SECURITY; END-TO-END SECURITY; HETEROGENEOUS CLOUDS; SERVICE PERFORMANCE; SERVICE PROVIDER; SERVICE REQUESTORS; SERVICE SPECIFICATIONS; SERVICE USAGE; SINGLE SOURCE; THREAT SCENARIOS; TRUST AND SECURITY;

EID: 80053402847     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERVICES.2011.34     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 5
    • 80053420594 scopus 로고    scopus 로고
    • ENSIA Report on Cloud Computing Security Risk Assessment, http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing- risk-assessment
  • 6
    • 80053419608 scopus 로고    scopus 로고
    • March 30
    • Epsilon Breach March 30, 2010, http://www.businessweek.com/news/2011-04- 05/citigroupwalgreen- new-york-co-warn-of-e-mail-breaches.html
    • (2010)
  • 7
    • 80052161993 scopus 로고    scopus 로고
    • An interoperability enabling framework: Services, processes and clouds
    • P. Goyal, "An Interoperability Enabling Framework: Services, Processes and Clouds," 2009 IEEE Asia-Pacific Services Computing Conference, 174-179, 2009.
    • (2009) 2009 IEEE Asia-Pacific Services Computing Conference , pp. 174-179
    • Goyal, P.1
  • 8
    • 77950618211 scopus 로고    scopus 로고
    • What you need to know about Cloud computing security and compliance
    • July 13
    • J. Heiser, "What you need to know about Cloud computing security and compliance," Gartner Report, July 13, 2009.
    • (2009) Gartner Report
    • Heiser, J.1
  • 12
    • 77953350247 scopus 로고    scopus 로고
    • Adding attributes to rolebased access control
    • D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Rolebased Access Control," IEEE Computer, vol. 43, 79-81, 2010.
    • (2010) IEEE Computer , vol.43 , pp. 79-81
    • Kuhn, D.R.1    Coyne, E.J.2    Weil, T.R.3
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest A. Shamir, L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21(2), 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest A Shamir, R.L.1    Adleman, L.M.2
  • 20
    • 78650065157 scopus 로고    scopus 로고
    • Security privacy challenges in cloud computing environments
    • H. Takabi, J. B.D. Joshi, G.-J. Ahn, "Security privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, 24-31, 2010.
    • (2010) IEEE Security & Privacy , vol.8 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.