-
3
-
-
56349150824
-
-
R. Buyya, C.S. Yeo, S. Venugopal, Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities, 2008.
-
(2008)
Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering It Services As Computing Utilities
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
4
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 25 6 2009 599 616
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
10
-
-
84858156668
-
-
Press release retrieved 20 May 2011, 2009
-
S. Covert, Press release retrieved 20 May 2011, 2009 from http://cloud-standards.org/wiki/index.php?title=PressRelease.
-
-
-
Covert, S.1
-
11
-
-
84858156667
-
-
Cloud standards wiki retrieved 20 May 2011, from
-
M. Rutkowski, A. Sill, M. Edwards, L. Vreck, C. harding, P. Lipton, et al., 2011, Cloud standards wiki retrieved 20 May 2011, from http://cloud- standards.org/wiki/index.php?title=MainPage.
-
(2011)
-
-
Rutkowski, M.1
Sill, A.2
Edwards, M.3
Vreck, L.4
Harding, C.5
Lipton, P.6
-
12
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
J. Archer, and A. Boehm Security guidance for critical areas of focus in cloud computing Cloud Security Alliance 2009
-
(2009)
Cloud Security Alliance
-
-
Archer, J.1
Boehm, A.2
-
13
-
-
79952065844
-
-
cloud security alliance retrieved 7 May 2011
-
J. Archer, A. Boehme, D. Cullinane, P. Kurtz, N. Puhlmann, J. Reavis, 2010, Top threats to cloud computing, version 1.0. cloud security alliance retrieved 7 May 2011, from http://www.cloudsecurityalliance.org/topthreats/ csathreats.v1.0.pdf.
-
(2010)
Top Threats to Cloud Computing, Version 1.0
-
-
Archer, J.1
Boehme, A.2
Cullinane, D.3
Kurtz, P.4
Puhlmann, N.5
Reavis, J.6
-
14
-
-
77956387185
-
-
CSA (cloud security alliance), USA, Disponible en:, v2.1, 1
-
G. Brunette, R. Mogull, Security guidance for critical areas of focus in cloud computing V2. 1. 2009 CSA (cloud security alliance), USA, Disponible en: http://www.cloudsecurityalliance.org/guidance/csaguide, v2.1, 1.
-
(2009)
Security Guidance for Critical Areas of Focus in Cloud Computing V2. 1
-
-
Brunette, G.1
Mogull, R.2
-
15
-
-
84858148905
-
-
CloudAudit, CloudAudit (codename: A6) retrieved 8 May 2011, from
-
CloudAudit, 2010, CloudAudit (codename: A6) retrieved 8 May 2011, from http://www.cloudaudit.org/index.html.
-
(2010)
-
-
-
16
-
-
84858148909
-
-
DMTF, Cloud management retrieved 21 May 2011, from
-
DMTF, 2011, Cloud management retrieved 21 May 2011, from http://www.dmtf.org/standards/cloud.
-
(2011)
-
-
-
17
-
-
84858156671
-
-
ETSI, Grid and cloud computing retrieved 21 May 2011, from.
-
ETSI, 2011, Grid and cloud computing retrieved 21 May 2011, from http://www.etsi.org/WebSite/Technologies/GRIDCLOUD.aspx.
-
(2011)
-
-
-
18
-
-
84858148906
-
-
NIST, NIST cloud computing program retrieved 21 May 2011, from
-
NIST, 2011, NIST cloud computing program retrieved 21 May 2011, from http://www.nist.gov/itl/cloud/.
-
(2011)
-
-
-
19
-
-
84858154029
-
-
OCCI, Open cloud computing interface retrieved 21 May 2011, from.
-
OCCI, 2011, Open cloud computing interface retrieved 21 May 2011, from http://occi-wg.org/.
-
(2011)
-
-
-
20
-
-
84858154026
-
-
OCCI, Open cloud consortium retrieved 21 May 2011, from.
-
OCCI, 2011, Open cloud consortium retrieved 21 May 2011, from http://opencloudconsortium.org/working-groups/.
-
(2011)
-
-
-
21
-
-
84858154028
-
-
SNIA Cloud storage initiative retrieved 21 May 2011, from.
-
SNIA 2011, Cloud storage initiative retrieved 21 May 2011, from http://www.snia.org/forums/csi.
-
(2011)
-
-
-
22
-
-
84858156669
-
-
Security for the cloud and SOA retrieved 8 May 2011
-
O. Arasatnam, S. Boardman, 2010, Security for the cloud and SOA retrieved 8 May 2011, from http://www.opengroup.org/soa/projects/security.htm.
-
(2010)
-
-
Arasatnam, O.1
Boardman, S.2
-
25
-
-
79955732000
-
Resources and services of the EGEE production infrastructure
-
T. Ferrari, and L. Gaido Resources and services of the EGEE production infrastructure Journal of Grid Computing 2011 1 15
-
(2011)
Journal of Grid Computing
, pp. 1-15
-
-
Ferrari, T.1
Gaido, L.2
-
26
-
-
79955704918
-
Development of grid e-Infrastructure in SouthEastern Europe
-
A. Balaz, O. Prnjat, D. Vudragovi, V. Slavni, I. Liabotis, and E. Atanassov Development of grid e-Infrastructure in SouthEastern Europe Journal of Grid Computing 2011 1 20
-
(2011)
Journal of Grid Computing
, pp. 1-20
-
-
Balaz, A.1
Prnjat, O.2
Vudragovi, D.3
Slavni, V.4
Liabotis, I.5
Atanassov, E.6
-
27
-
-
79955706905
-
Using a simple prioritisation mechanism to effectively interoperate service and opportunistic grids in the EELA-2 e-Infrastructure
-
F. Brasileiro, M. Gaudencio, R. Silva, A. Duarte, D. Carvalho, and D. Scardaci Using a simple prioritisation mechanism to effectively interoperate service and opportunistic grids in the EELA-2 e-Infrastructure Journal of Grid Computing 9 2 2011 241 257
-
(2011)
Journal of Grid Computing
, vol.9
, Issue.2
, pp. 241-257
-
-
Brasileiro, F.1
Gaudencio, M.2
Silva, R.3
Duarte, A.4
Carvalho, D.5
Scardaci, D.6
-
28
-
-
78349257582
-
The future of cloud computing opportunities for European cloud computing beyond 2010
-
public version, 1
-
K. Jeffery, H. Schubert, B. Neidecker-Lutz, The future of cloud computing opportunities for European cloud computing beyond 2010, Expert Group Report, public version, 1 2010.
-
(2010)
Expert Group Report
-
-
Jeffery, K.1
Schubert, H.2
Neidecker-Lutz, B.3
-
29
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, et al., Above the clouds: a berkeley view of cloud computing, EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
-
30
-
-
84856142134
-
Monitoring insiders activities in cloud computing using rule based learning
-
Nov. 1618, Changsha, China
-
M.T. Khorshed, A.B.M.S. Ali, S.A. Wasimi, Monitoring insiders activities in cloud computing using rule based learning, Paper presented at the Proceedings of IEEE TrustCom-11, Nov. 1618, Changsha, China, 2011.
-
(2011)
Proceedings of IEEE TrustCom-11
-
-
Khorshed, M.T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
31
-
-
84856619555
-
Trust issues that create threats for cyber attacks in cloud computing
-
December 79, Tainan, Taiwan
-
M.T. Khorshed, A.B.M.S. Ali, S.A. Wasimi, Trust issues that create threats for cyber attacks in cloud computing, Paper presented at the Proceedings of IEEE ICPADS, December 79, Tainan, Taiwan, 2011.
-
(2011)
Proceedings of IEEE ICPADS
-
-
Khorshed, M.T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
34
-
-
80052387522
-
Is cloud computing really ready for prime time?
-
N. Leavitt Is cloud computing really ready for prime time? Growth 27 2009 5
-
(2009)
Growth
, vol.27
, pp. 5
-
-
Leavitt, N.1
-
35
-
-
77949840689
-
Gartner: Seven cloud-computing security risks
-
J. Brodkin Gartner: seven cloud-computing security risks Infoworld 2008 1 3
-
(2008)
Infoworld
, pp. 1-3
-
-
Brodkin, J.1
-
38
-
-
67649425263
-
Cloud computing-a question of trust
-
C. Everett Cloud computing-a question of trust Computer Fraud & Security 6 2009 5 7
-
(2009)
Computer Fraud & Security
, Issue.6
, pp. 5-7
-
-
Everett, C.1
-
41
-
-
70350660781
-
A survey of cloud platforms and their future
-
M. Pastaki Rad, A. Sajedi Badashian, G. Meydanipour, M. Ashurzad Delcheh, M. Alipour, and H. Afzali A survey of cloud platforms and their future Computational Science and Its ApplicationsICCSA 2009 2009 788 796
-
(2009)
Computational Science and Its ApplicationsICCSA 2009
, pp. 788-796
-
-
Pastaki Rad, M.1
Sajedi Badashian, A.2
Meydanipour, G.3
Ashurzad Delcheh, M.4
Alipour, M.5
Afzali, H.6
-
44
-
-
71749105371
-
Assessing the security risks of cloud computing
-
J. Heiser, M. Nicolett, Assessing the security risks of cloud computing, Gartner Report, 2009.
-
(2009)
Gartner Report
-
-
Heiser, J.1
Nicolett, M.2
-
45
-
-
79952065844
-
-
Retrieved 21 May 2011
-
D. Lacey, 2010, Top threats to cloud computing? Retrieved 21 May 2011, from http://www.computerweekly.com/blogs/davidlacey/2010/03/ topthreatstocloudcomputing.html.
-
(2010)
Top Threats to Cloud Computing?
-
-
Lacey, D.1
-
47
-
-
77955641901
-
Privacy and consumer risks in cloud computing
-
D. Svantesson, and R. Clarke Privacy and consumer risks in cloud computing Computer Law & Security Review 26 4 2010 391 397
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.4
, pp. 391-397
-
-
Svantesson, D.1
Clarke, R.2
-
48
-
-
78650039008
-
Cloud computing roundtable
-
E. Grosse, J. Howie, J. Ransome, J. Reavis, and S. Schmidt Cloud computing roundtable Security & Privacy, IEEE 8 6 2010 17 23
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.6
, pp. 17-23
-
-
Grosse, E.1
Howie, J.2
Ransome, J.3
Reavis, J.4
Schmidt, S.5
-
52
-
-
79953653695
-
Monitoring cloud computing by layer, part 1
-
J. Spring Monitoring cloud computing by layer, part 1 Security & Privacy, IEEE 9 2 2011 66 68
-
(2011)
Security & Privacy, IEEE
, vol.9
, Issue.2
, pp. 66-68
-
-
Spring, J.1
-
55
-
-
74049093526
-
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, et al., Controlling data in the cloud: outsourcing computation without outsourcing control, 2009.
-
(2009)
Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
-
59
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
L. Yan, C. Rong, and G. Zhao Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography Cloud Computing 2009 167 177
-
(2009)
Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
60
-
-
77955193464
-
-
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, 2009.
-
(2009)
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
66
-
-
84858154022
-
Cross-site scripting worms and viruses
-
J. Grossman Cross-site scripting worms and viruses Whitehat Security 2006
-
(2006)
Whitehat Security
-
-
Grossman, J.1
-
68
-
-
84870705926
-
-
VMware, retrieved 16 July 2011
-
VMware, VMware vSphere hypervisor retrieved 16 July 2011, from https://www.vmware.com/tryvmware/?p=esxi&ie=utf-8&oe=utf-8&aq= t&rls=org.mozilla:en-US:official&client=firefox-a.
-
VMware vSphere Hypervisor
-
-
-
72
-
-
84858151329
-
-
US-CERT retrieved 22 June 2011
-
US-CERT, 2011, What is phishing? retrieved 22 June 2011, from http://www.us-cert.gov/nav/reportphishing.html.
-
(2011)
What Is Phishing?
-
-
-
78
-
-
0020083498
-
The meaning and use of the area under a receiver operating characteristic (ROC) curve
-
A. James, and J. Barbara The meaning and use of the area under a receiver operating characteristic (ROC) curve Radiology 143 1982 29 36
-
(1982)
Radiology
, vol.143
, pp. 29-36
-
-
James, A.1
Barbara, J.2
-
79
-
-
0020524559
-
A method of comparing the areas under receiver operating characteristic curves derived from the same cases
-
J.A. Hanley, and B.J. McNeil A method of comparing the areas under receiver operating characteristic curves derived from the same cases Radiology 148 1983 839 843 (Pubitemid 13033817)
-
(1983)
Radiology
, vol.148
, Issue.3
, pp. 839-843
-
-
Hanley, J.A.1
McNeil, B.J.2
|