메뉴 건너뛰기




Volumn 8, Issue 1-2, 2012, Pages 70-84

The top ten cloud-security practices in next-generation networking

Author keywords

Best cloud computing practices; Cloud adopters; Next generation networks; Open source

Indexed keywords

INFRASTRUCTURE AS A SERVICE (IAAS); OPEN SYSTEMS; PLATFORM AS A SERVICE (PAAS);

EID: 84857264879     PISSN: 17543916     EISSN: 17543924     Source Type: Journal    
DOI: 10.1504/IJCNDS.2012.044323     Document Type: Article
Times cited : (17)

References (34)
  • 1
    • 84857284184 scopus 로고    scopus 로고
    • The five pillars of information security
    • Ameri, A. (2004) 'The five pillars of information security', Risk Management, Vol. 51, No. 7, p.48.
    • (2004) Risk Management , vol.51 , Issue.7 , pp. 48
    • Ameri, A.1
  • 8
    • 84857350681 scopus 로고    scopus 로고
    • (accessed on 10 May 2010)
    • Category: OWASP Cloud-10 Project - OWASP (2010) Available at http://www.owasp.org/index.php/Category:OWASP-Cloud-%E2%80%90-10-Project (accessed on 10 May 2010).
    • (2010) Category: OWASP Cloud-10 Project - OWASP
  • 10
    • 84857340284 scopus 로고    scopus 로고
    • Citrix Systems - Citrix XenServer: Efficient Server Virtualization Software ,(accessed on 6 June 2010)
    • Citrix Systems - Citrix XenServer: Efficient Server Virtualization Software (2010) Citrix Systems, available at http://www.citrix.com/english/ps2/ products/product.asp?contentID=683148 (accessed on 6 June 2010).
    • (2010) Citrix Systems
  • 11
    • 84857240789 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA), accessed on 18 April 2010
    • Cloud Security Alliance (CSA) Security Best Practices for Cloud Computing (2009) Available at http://www.cloudsecurityalliance.org/ (accessed on 18 April 2010).
    • (2009) Security Best Practices for Cloud Computing
  • 12
    • 84857246616 scopus 로고    scopus 로고
    • (accessed on 10 May 2010)
    • CloudStandards (2010) Available at http://cloud-standards.org/wiki/index. php?title=Main-Page (accessed on 10 May 2010).
    • (2010) CloudStandards
  • 15
    • 0005224217 scopus 로고    scopus 로고
    • HIPAA Security Series: 4 Security Standards: Technical Safeguards
    • HIPAA Security Series: 4 Security Standards: Technical Safeguards. (2007) Department of Health and Human Services, available at http://www.hhs.gov/ocr/ privacy/hipaa/administrative/securityrule/techsafeguards.pdf.
    • (2007) Department of Health and Human Services
  • 16
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • Krügel, C., Toth, T. and Kirda, E. (2002) 'Service specific anomaly detection for network intrusion detection', in Proceedings of the 2002 ACM Symposium on Applied Computing, ACM, Madrid, Spain ACM, pp.201-208. (Pubitemid 35009592)
    • (2002) Proceedings of the ACM Symposium on Applied Computing , pp. 201-208
    • Krugel, C.1    Toth, T.2    Kirda, E.3
  • 23
    • 78650399565 scopus 로고    scopus 로고
    • Provenance as first class cloud data
    • Muniswamy-Reddy, K. and Seltzer, M. (2010) 'Provenance as first class cloud data', SIGOPS Oper. Syst. Rev., Vol. 43, No. 4, pp.11-16.
    • (2010) SIGOPS Oper. Syst. Rev. , vol.43 , Issue.4 , pp. 11-16
    • Muniswamy-Reddy, K.1    Seltzer, M.2
  • 25
    • 84857287830 scopus 로고    scopus 로고
    • (accessed on 5 July 2010)
    • Open Cirrus (TM) (n.d.) Available at https://opencirrus.org/ (accessed on 5 July 2010).
    • Open Cirrus (TM) (n.d.)
  • 26
    • 84857348845 scopus 로고    scopus 로고
    • accessed on 9 April 2010
    • PCI DSS Download - PCI Security Standards Council (2009) Available at https://www.pcisecuritystandards.org/security-standards/pci-dss-download.html (accessed on 9 April 2010).
    • (2009) PCI DSS Download - PCI Security Standards Council
  • 29
    • 84857258167 scopus 로고    scopus 로고
    • (accessed on 6 June 2010)
    • Ubuntu One: Home (2010) Available at https://one.ubuntu.com/ (accessed on 6 June 2010).
    • (2010) Ubuntu One: Home
  • 30
    • 84857345326 scopus 로고    scopus 로고
    • IT asset management: It's all about trade-offs enterprise wide solutions; cost, performance and application compatibility are some of the interlocking issues impacting hardware replacement decisions
    • Violino, B. (2010) 'IT asset management: it's all about trade-offs enterprise wide solutions; cost, performance and application compatibility are some of the interlocking issues impacting hardware replacement decisions', Insurance Networking News.
    • (2010) Insurance Networking News
    • Violino, B.1
  • 32
    • 84857258169 scopus 로고    scopus 로고
    • (accessed on 18 April 2010)
    • Wheeler, D. (2003) Is Open Source Good for Security?, available at http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/ open-source-security.html (accessed on 18 April 2010).
    • (2003) Is Open Source Good for Security?
    • Wheeler, D.1
  • 34
    • 84857333635 scopus 로고    scopus 로고
    • EMC bets its future on private cloud (IDEAS insights)
    • (accessed on 6 June 2010)
    • Zhou, J. (2010) 'EMC bets its future on private cloud (IDEAS insights)', IDEAS Insights, available at http://ideasint.blogs.com/ideasinsights/2010/05/ emc-bets-its-future-on-private-cloud.html (accessed on 6 June 2010).
    • (2010) IDEAS Insights
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.