메뉴 건너뛰기




Volumn , Issue , 2011, Pages 217-222

Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation

Author keywords

Cloud; cloud computing; complex distributed computing; security; security challenges; security concerns; security strategy

Indexed keywords

ACCESSIBLE INFORMATION; CLOUD PROVIDERS; IT INFRASTRUCTURES; RESEARCH CHALLENGES; SECURITY; SECURITY APPROACH; SECURITY CHALLENGES; SECURITY CONCERNS; SECURITY ISSUES; SECURITY SOLUTIONS; SECURITY STRATEGIES; SECURITY THREATS;

EID: 84857170570     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICT.2011.6141247     Document Type: Conference Paper
Times cited : (137)

References (13)
  • 2
    • 78149348401 scopus 로고    scopus 로고
    • Microsoft Research, White Paper
    • Microsoft Research, "Securing Microsoft's Cloud Infrastructure, " in White Paper, 2009, http://www.globalfoundationservices.com/security/ documents/SecuringtheMSCloudMay09.pdf.
    • (2009) Securing Microsoft's Cloud Infrastructure
  • 5
    • 80054118170 scopus 로고    scopus 로고
    • Wiley Publishing Inc. (ISBN-13: 978-0470903568)
    • "Cloud Computing Bible" by Barrie Sosinsky, Wiley Publishing Inc. (ISBN-13: 978-0470903568)
    • Cloud Computing Bible
    • Sosinsky, B.1
  • 7
    • 84857165469 scopus 로고    scopus 로고
    • ISACA (auditor's perspective journal) http://www.isaca.org/Journal/Past- Issues/2009/Volume-6/Pages/Cloud-Computing-An-Auditor-s-Perspective1.aspx
    • ISACA (Auditor's Perspective Journal)
  • 8
  • 9
    • 84857165470 scopus 로고    scopus 로고
    • Private Virtual Infrastructure (PVI) Model for Cloud Computing
    • Research paper Jan
    • Research paper - "Private Virtual Infrastructure (PVI) Model for Cloud Computing" International Journal of Software Engineering Research & Practices Vol.1, Issue 1, Jan, 2011
    • (2011) International Journal of Software Engineering Research & Practices , vol.1 , Issue.1
  • 11
    • 84857169410 scopus 로고    scopus 로고
    • Cloud and Telecom security article http://sbin.cn/blog/2009/11/10/true- or-false-70-of-security-incidents-are-due-to-insider-threats/
    • Cloud and Telecom Security Article


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.