메뉴 건너뛰기




Volumn , Issue , 2011, Pages 772-777

Monitoring intrusions and security breaches in highly distributed cloud environments

Author keywords

Cloud architecture; Experiences and lessons; Interoperable and federated cloud security and trust

Indexed keywords

COMPUTING MODEL; EXPERIENCES AND LESSONS; NEW MODEL; SECURITY BREACHES; SECURITY MONITORING;

EID: 84857187859     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2011.119     Document Type: Conference Paper
Times cited : (13)

References (33)
  • 6
    • 84857155594 scopus 로고    scopus 로고
    • May, amazon WebServices
    • "Amazon CloudWatch Developer Guide," http://aws.amazon.com/ cloudwatch/, May 2009, amazon WebServices.
    • (2009) Amazon CloudWatch Developer Guide
  • 7
    • 84857167491 scopus 로고    scopus 로고
    • October
    • "AWS Security Center," http://aws.amazon.com/security/, October 2010.
    • (2010)
  • 12
    • 84857149187 scopus 로고    scopus 로고
    • exploring Microsoft Azure and the Cloud Security Space
    • J. Meier and P. Enfield, "Azure security notes," exploring Microsoft Azure and the Cloud Security Space.
    • Azure Security Notes
    • Meier, J.1    Enfield, P.2
  • 15
    • 84857167493 scopus 로고    scopus 로고
    • Nov
    • "Cloud security alliance," http://www.cloudsecurityalliance. org/, Nov 2010.
    • (2010)
  • 19
    • 84857149191 scopus 로고    scopus 로고
    • Nov
    • "Eucalyptus," http://www.eucalyptus.com/, Nov 2010.
    • (2010)
  • 21
    • 84857167492 scopus 로고    scopus 로고
    • Nov
    • "Zenoss," http://www.zenoss.com/, Nov 2010.
    • (2010)
  • 25
    • 77955959213 scopus 로고    scopus 로고
    • Cloud computing - Benefits, risks and recommendations for information security
    • November
    • P. Balboni, K. Mccorry, and P. W. David Snead, "Cloud computing - benefits, risks and recommendations for information security," European Network and Information Security Agency, Tech. Rep., November 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- assessment/.
    • (2009) European Network and Information Security Agency, Tech. Rep.
    • Balboni, P.1    McCorry, K.2    David Snead, P.W.3
  • 26
    • 84857167494 scopus 로고    scopus 로고
    • Usa patriot act
    • FinCEN, "Usa patriot act," http://www.fincen.gov/statutes regs/patriot/index.html.
  • 27
    • 84857149193 scopus 로고    scopus 로고
    • Personal information protection and electronic documents act
    • "Personal information protection and electronic documents act," http://laws.justice.gc.ca/en/P-8.6/.
  • 31
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM. [Online]
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds." in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 199-212. [Online]. Available:http://dblp.uni-trier.de/db/conf/ccs/ccs2009.html#RistenpartTSS09
    • (2009) ACM Conference on Computer and Communications Security , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.