메뉴 건너뛰기




Volumn , Issue , 2011, Pages

SECaaS: Security as a service for cloud-based applications

Author keywords

Cloud computing; Security; Security as a Service

Indexed keywords

SECURITY; SECURITY AS A SERVICE; SECURITY ISSUES; SECURITY MEASURE; USER-CENTRIC;

EID: 84857977072     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2107556.2107564     Document Type: Conference Paper
Times cited : (39)

References (18)
  • 2
    • 74049122943 scopus 로고    scopus 로고
    • Privacy-preserving digital identity management for cloud computing
    • E. Bertino, F. Paci, R. Ferrini, and N. Shang. Privacy-preserving digital identity management for cloud computing. IEEE Data Engineering Bulletin, 32(1):21-27, 2009.
    • (2009) IEEE Data Engineering Bulletin , vol.32 , Issue.1 , pp. 21-27
    • Bertino, E.1    Paci, F.2    Ferrini, R.3    Shang, N.4
  • 3
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599-616, 2009.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 12
    • 84857990384 scopus 로고    scopus 로고
    • Microsoft, May Retrieved December 2010
    • Securing MicrosoftŠs Cloud Infrastructure. Microsoft, May 2009. Retrieved December 2010, from www.globalfoundationservices.com/security.
    • (2009) Securing MicrosoftŠs Cloud Infrastructure
  • 18
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Springer-Verlag
    • L. Yan, C. Rong, and G. Zhao. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. In Proceedings of the first International Conference on Cloud Computing, pages 167-177. Springer-Verlag, 2009.
    • (2009) Proceedings of the First International Conference on Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.