-
1
-
-
84857284184
-
The five pillars of information security
-
Ameri, A. (2004) 'The five pillars of information security', Risk Management, Vol. 51, No. 7, p.48.
-
(2004)
Risk Management
, vol.51
, Issue.7
, pp. 48
-
-
Ameri, A.1
-
2
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G. et al. (2010) 'A view of cloud computing', Commun. ACM, Vol. 53, No. 4, pp.50-58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
-
3
-
-
77951046207
-
Open cirrus: A global cloud computing testbed'
-
Avetisyan, A., Campbell, R., Gupta, I., Heath, M., Ko, S., Ganger, G., Kozuch, M. et al. (2010) 'Open cirrus: a global cloud computing testbed', IEEE Computer, Vol. 43, No. 4, pp.42-50.
-
(2010)
IEEE Computer
, vol.43
, Issue.4
, pp. 42-50
-
-
Avetisyan, A.1
Campbell, R.2
Gupta, I.3
Heath, M.4
Ko, S.5
Ganger, G.6
Kozuch, M.7
-
4
-
-
11244308946
-
MobiDesk: Mobile virtual desktop computing
-
MobiCom 2004 - Proceedings of the Tenth Annual International Conference on Mobile Computing and Networking
-
Baratto, R.A., Potter, S., Su, G. and Nieh, J. (2004) 'MobiDesk: mobile virtual desktop computing', in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, ACM, Philadelphia, PA, USA, pp.1-15. (Pubitemid 40061927)
-
(2004)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 1-15
-
-
Baratto, R.A.1
Potter, S.2
Su, G.3
Nieh, J.4
-
5
-
-
72249084183
-
Towards best practices in designing for the cloud
-
ACM, Orlando, Florida, USA
-
Berre, A.J., Roman, D., Landre, E., Heuvel, W.V.D., Skår, L.A., Udnæs, M., Lennon, R. et al. (2009) 'Towards best practices in designing for the cloud', in Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, ACM, Orlando, Florida, USA, pp.697-698.
-
(2009)
Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications
, pp. 697-698
-
-
Berre, A.J.1
Roman, D.2
Landre, E.3
Heuvel, W.V.D.4
Skår, L.A.5
Udnæs, M.6
Lennon, R.7
-
7
-
-
56349150824
-
-
Department of Computer Science and Software Engineering, The University of Melbourne, Australia
-
Buyya, R., Yeo, C.S. and Venugopal, S. (2008) Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. Department of Computer Science and Software Engineering, The University of Melbourne, Australia, available at http://www.gridbus.org/~raj/ papers/hpcc2008-keynote-cloudcomputing.pdf.
-
(2008)
Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
8
-
-
84857350681
-
-
(accessed on 10 May 2010)
-
Category: OWASP Cloud-10 Project - OWASP (2010) Available at http://www.owasp.org/index.php/Category:OWASP-Cloud-%E2%80%90-10-Project (accessed on 10 May 2010).
-
(2010)
Category: OWASP Cloud-10 Project - OWASP
-
-
-
9
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
ACM, Chicago, Illinois, USA
-
Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D. and Zamboni, D. (2009) 'Cloud security is not (just) virtualization security: a short paper', in Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM, Chicago, Illinois, USA, pp.97-102.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
10
-
-
84857340284
-
-
Citrix Systems - Citrix XenServer: Efficient Server Virtualization Software ,(accessed on 6 June 2010)
-
Citrix Systems - Citrix XenServer: Efficient Server Virtualization Software (2010) Citrix Systems, available at http://www.citrix.com/english/ps2/ products/product.asp?contentID=683148 (accessed on 6 June 2010).
-
(2010)
Citrix Systems
-
-
-
11
-
-
84857240789
-
-
Cloud Security Alliance (CSA), accessed on 18 April 2010
-
Cloud Security Alliance (CSA) Security Best Practices for Cloud Computing (2009) Available at http://www.cloudsecurityalliance.org/ (accessed on 18 April 2010).
-
(2009)
Security Best Practices for Cloud Computing
-
-
-
12
-
-
84857246616
-
-
(accessed on 10 May 2010)
-
CloudStandards (2010) Available at http://cloud-standards.org/wiki/index. php?title=Main-Page (accessed on 10 May 2010).
-
(2010)
CloudStandards
-
-
-
13
-
-
74249095734
-
Towards secure dataflow processing in open distributed systems
-
ACM, Chicago, Illinois, USA
-
Du, J., Wei, W., Gu, X. and Yu, T. (2009) 'Towards secure dataflow processing in open distributed systems', in Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, ACM, Chicago, Illinois, USA, pp.67-72.
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 67-72
-
-
Du, J.1
Wei, W.2
Gu, X.3
Yu, T.4
-
14
-
-
72249112993
-
Cloud computing beyond objects: Seeding the cloud
-
ACM, Orlando, Florida, USA
-
Fraser, S., Biddle, R., Jordan, S., Keahey, K., Marcus, B., Maximilien, E.M. and Thomas, D. (2009) 'Cloud computing beyond objects: seeding the cloud', in Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, ACM, Orlando, Florida, USA, pp.847-850.
-
(2009)
Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications
, pp. 847-850
-
-
Fraser, S.1
Biddle, R.2
Jordan, S.3
Keahey, K.4
Marcus, B.5
Maximilien, E.M.6
Thomas, D.7
-
15
-
-
0005224217
-
-
HIPAA Security Series: 4 Security Standards: Technical Safeguards
-
HIPAA Security Series: 4 Security Standards: Technical Safeguards. (2007) Department of Health and Human Services, available at http://www.hhs.gov/ocr/ privacy/hipaa/administrative/securityrule/techsafeguards.pdf.
-
(2007)
Department of Health and Human Services
-
-
-
16
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Krügel, C., Toth, T. and Kirda, E. (2002) 'Service specific anomaly detection for network intrusion detection', in Proceedings of the 2002 ACM Symposium on Applied Computing, ACM, Madrid, Spain ACM, pp.201-208. (Pubitemid 35009592)
-
(2002)
Proceedings of the ACM Symposium on Applied Computing
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
17
-
-
77954723309
-
A business driven cloud optimization architecture
-
ACM, Sierre, Switzerland
-
Litoiu, M., Woodside, M., Wong, J., Ng, J. and Iszlai, G. (2010) 'A business driven cloud optimization architecture', in Proceedings of the 2010 ACM Symposium on Applied Computing, ACM, Sierre, Switzerland, pp.380-385.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 380-385
-
-
Litoiu, M.1
Woodside, M.2
Wong, J.3
Ng, J.4
Iszlai, G.5
-
18
-
-
84857336933
-
Multiscale not multicore: Efficient heterogeneous cloud computing
-
British Computer Society, Edinburgh, UK
-
Madhavapeddy, A., Mortier, R., Crowcroft, J. and Hand, S. (2010) 'Multiscale not multicore: efficient heterogeneous cloud computing', in Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference, British Computer Society, Edinburgh, UK, pp.1-12.
-
(2010)
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
, pp. 1-12
-
-
Madhavapeddy, A.1
Mortier, R.2
Crowcroft, J.3
Hand, S.4
-
20
-
-
70350597865
-
Towards concurrency refactoring for X10
-
Markstrum, S.A., Fuhrer, R.M. and Millstein, T.D. (2009) 'Towards concurrency refactoring for X10', SIGPLAN: ACM Special Interest Group on Programming Languages, pp.303-304.
-
(2009)
SIGPLAN: ACM Special Interest Group on Programming Languages
, pp. 303-304
-
-
Markstrum, S.A.1
Fuhrer, R.M.2
Millstein, T.D.3
-
21
-
-
72249094420
-
Toward cloud-agnostic middlewares
-
ACM, Orlando, Florida, USA
-
Maximilien, E.M., Ranabahu, A., Engehausen, R. and Anderson, L.C. (2009) 'Toward cloud-agnostic middlewares', in Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, ACM, Orlando, Florida, USA, pp.619-626.
-
(2009)
Proceeding of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications
, pp. 619-626
-
-
Maximilien, E.M.1
Ranabahu, A.2
Engehausen, R.3
Anderson, L.C.4
-
23
-
-
78650399565
-
Provenance as first class cloud data
-
Muniswamy-Reddy, K. and Seltzer, M. (2010) 'Provenance as first class cloud data', SIGOPS Oper. Syst. Rev., Vol. 43, No. 4, pp.11-16.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.43
, Issue.4
, pp. 11-16
-
-
Muniswamy-Reddy, K.1
Seltzer, M.2
-
24
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
IEEE Computer Society
-
Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L. and Zagorodnov, D. (2009) 'The eucalyptus open-source cloud-computing system', in Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, IEEE Computer Society, pp.124-131.
-
(2009)
Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
25
-
-
84857287830
-
-
(accessed on 5 July 2010)
-
Open Cirrus (TM) (n.d.) Available at https://opencirrus.org/ (accessed on 5 July 2010).
-
Open Cirrus (TM) (n.d.)
-
-
-
26
-
-
84857348845
-
-
accessed on 9 April 2010
-
PCI DSS Download - PCI Security Standards Council (2009) Available at https://www.pcisecuritystandards.org/security-standards/pci-dss-download.html (accessed on 9 April 2010).
-
(2009)
PCI DSS Download - PCI Security Standards Council
-
-
-
27
-
-
74049085844
-
Cloud technologies for bioinformatics applications
-
ACM, Portland, Oregon
-
Qiu, X., Ekanayake, J., Beason, S., Gunarathne, T., Fox, G., Barga, R. and Gannon, D. (2009) 'Cloud technologies for bioinformatics applications', in Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers, ACM, Portland, Oregon, pp.1-10.
-
(2009)
Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers
, pp. 1-10
-
-
Qiu, X.1
Ekanayake, J.2
Beason, S.3
Gunarathne, T.4
Fox, G.5
Barga, R.6
Gannon, D.7
-
29
-
-
84857258167
-
-
(accessed on 6 June 2010)
-
Ubuntu One: Home (2010) Available at https://one.ubuntu.com/ (accessed on 6 June 2010).
-
(2010)
Ubuntu One: Home
-
-
-
30
-
-
84857345326
-
IT asset management: It's all about trade-offs enterprise wide solutions; cost, performance and application compatibility are some of the interlocking issues impacting hardware replacement decisions
-
Violino, B. (2010) 'IT asset management: it's all about trade-offs enterprise wide solutions; cost, performance and application compatibility are some of the interlocking issues impacting hardware replacement decisions', Insurance Networking News.
-
(2010)
Insurance Networking News
-
-
Violino, B.1
-
31
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
ACM, Chicago, Illinois, USA
-
Wei, J., Zhang, X., Ammons, G., Bala, V. and Ning, P. (2009) 'Managing security of virtual machine images in a cloud environment', in Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM, Chicago, Illinois, USA, pp.91-96.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
32
-
-
84857258169
-
-
(accessed on 18 April 2010)
-
Wheeler, D. (2003) Is Open Source Good for Security?, available at http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/ open-source-security.html (accessed on 18 April 2010).
-
(2003)
Is Open Source Good for Security?
-
-
Wheeler, D.1
-
33
-
-
84857258166
-
Inform IT: The advantages of adopting open source software > open source advantages
-
SAMS
-
Williams, J., Clegg, P. and Dulaney, E. (2005) 'Inform IT: the advantages of adopting open source software > open source advantages, in Expanding Choice: Moving to Linux and Open Source with Novell Open Enterprise Server, SAMS, available at http://www.informit.com/articles/article.aspx?p=376255.
-
(2005)
Expanding Choice: Moving to Linux and Open Source with Novell Open Enterprise Server
-
-
Williams, J.1
Clegg, P.2
Dulaney, E.3
-
34
-
-
84857333635
-
EMC bets its future on private cloud (IDEAS insights)
-
(accessed on 6 June 2010)
-
Zhou, J. (2010) 'EMC bets its future on private cloud (IDEAS insights)', IDEAS Insights, available at http://ideasint.blogs.com/ideasinsights/2010/05/ emc-bets-its-future-on-private-cloud.html (accessed on 6 June 2010).
-
(2010)
IDEAS Insights
-
-
Zhou, J.1
|