메뉴 건너뛰기




Volumn 61, Issue 2, 2012, Pages 337-352

Reference deployment models for eliminating user concerns on cloud security

Author keywords

Cloud computing; Cloud security; Reference deployment model; Security concerns

Indexed keywords

MAKING DECISION; REFERENCE MODELS; SECURITY CONCERNS; SERVICE DEPLOYMENT;

EID: 84864579259     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-010-0460-9     Document Type: Conference Paper
Times cited : (19)

References (48)
  • 1
    • 84864632235 scopus 로고    scopus 로고
    • Amazon Elastic Compute Cloud (EC2)
    • Amazon Elastic Compute Cloud (EC2) (2009) http://www.amazon.com/ec2/
    • (2009)
  • 2
    • 84864633989 scopus 로고    scopus 로고
    • Amazon Simple Storage Service
    • Amazon Simple Storage Service (2009) http://aws.amazon.com/s3
    • (2009)
  • 3
    • 33646514514 scopus 로고    scopus 로고
    • Bank outsources security to the cloud
    • Anonymous
    • Anonymous (2005) Bank outsources security to the cloud. Commun News 42(12)
    • (2005) Commun News , vol.42 , pp. 12
  • 4
    • 33748948241 scopus 로고    scopus 로고
    • Bank trusts security to 'the cloud'
    • Anonymous
    • Anonymous (2006) Bank trusts security to 'the cloud'. Commun News 43(9)
    • (2006) Commun News , vol.43 , pp. 9
  • 5
    • 84864633988 scopus 로고    scopus 로고
    • Apache Hadoop
    • Apache Hadoop (2009) http://hadoop.apache.org/
    • (2009)
  • 10
    • 84864589306 scopus 로고    scopus 로고
    • CARMEN
    • CARMEN (2009) http://www.carmen.org.uk/
    • (2009)
  • 12
    • 84864613220 scopus 로고    scopus 로고
    • Cloud CIE Computing Expert Committee Technical report, Chinese Institute of Electronics
    • Cloud CIE Computing Expert Committee (2010) Cloud computing white paper. Technical report, Chinese Institute of Electronics
    • (2010) Cloud Computing White Paper
  • 13
    • 84864589307 scopus 로고    scopus 로고
    • Condor DAGman
    • Condor DAGman (2009) http://www.cs.wisc.edu/condor/dagman/
    • (2009)
  • 15
    • 37549003336 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51(1):107-113
    • (2008) Commun ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 16
    • 84864589304 scopus 로고    scopus 로고
    • Eucalyptus
    • Eucalyptus (2009) http://eucalyptus.cs.ucsb.edu/
    • (2009)
  • 18
    • 21644437974 scopus 로고    scopus 로고
    • The google file system
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Ghemawat S, Gobioff H, Leung S-T (2003) The Google File System. SIGOPS Oper Syst Rev 37(5): 29-43 (Pubitemid 40929686)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 29-43
    • Ghemawat, S.1    Gobioff, H.2    Leung, S.-T.3
  • 19
    • 84864633992 scopus 로고    scopus 로고
    • Google App Engine
    • Google App Engine (2009) http://appengine.google.com
    • (2009)
  • 23
    • 34548041192 scopus 로고    scopus 로고
    • Dryad: Distributed data-parallel programs from sequential building blocks
    • DOI 10.1145/1272996.1273005, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
    • Isard M, Budiu M, Yu Y, Birrell A, Fetterly D (2007) Dryad: distributed data-parallel programs from sequential building blocks. In: EuroSys '07: proceedings of the 2nd ACM SIGOPS/EuroSys European conference on computer systems. ACM Press, New York, pp 59-72 (Pubitemid 47281575)
    • (2007) Operating Systems Review (ACM) , pp. 59-72
    • Isard, M.1    Budiu, M.2    Yu, Y.3    Birrell, A.4    Fetterly, D.5
  • 24
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Kaufman LM (2009) Data security in the world of cloud computing. IEEE Secur Priv 7(4): 61-64
    • (2009) IEEE Secur Priv , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 26
    • 38549102227 scopus 로고    scopus 로고
    • Aplrac: A pattern language for designing and implementing role-based access control
    • Kodituwakku SR, Bertok P, Zhao L (2001) Aplrac: a pattern language for designing and implementing role-based access control. In: EuroPLoP'01, 2001
    • (2001) EuroPLoP'01, 2001
    • Kodituwakku, S.R.1    Bertok, P.2    Zhao, L.3
  • 27
    • 84864589305 scopus 로고    scopus 로고
    • Kupa
    • Kupa (2009) http://meta.cesnet.cz/cms/opencms/en/docs/clouds/
    • (2009)
  • 29
    • 84864632234 scopus 로고    scopus 로고
    • Microsoft Live Mesh
    • Microsoft Live Mesh (2009) http://www.mesh.com/
    • (2009)
  • 30
    • 42449139876 scopus 로고    scopus 로고
    • A survey on security patterns
    • DOI 10.2201/NiiPi.2008.5.5
    • Maruyama N. Yoshioka K, Washizaki H (2008) A survey on security patterns. Prog Inform (5):35-47. doi:10.2201/NiiPi.2008.5.5 (Pubitemid 351560737)
    • (2008) Progress in Informatics , Issue.5 , pp. 35-48
    • Yoshioka, N.1    Washizaki, H.2    Maruyama, K.3
  • 31
    • 84864613209 scopus 로고    scopus 로고
    • Nimbus
    • Nimbus (2009) http://workspace.globus.org/
    • (2009)
  • 34
    • 71749102261 scopus 로고    scopus 로고
    • A privacy manager for cloud computing
    • Pearson S, Shen Y, Mowbray M
    • Pearson S, Shen Y, Mowbray M (2009) A privacy manager for cloud computing. In: The first international conference on cloud computing, 2009, pp 90-106
    • (2009) The First International Conference on Cloud Computing , vol.2009 , pp. 90-106
  • 35
    • 33750938846 scopus 로고    scopus 로고
    • Towards a security architecture for vehicular ad hoc networks
    • DOI 10.1109/ARES.2006.136, 1625333, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
    • Plobl K, Nowey T, Mletzko C (2006) Towards a security architecture for vehicular ad hoc networks. In: ARES '06: proceedings of the first international conference on availability, reliability and security. IEEE Computer Society, Washington, pp 374-381 (Pubitemid 44732667)
    • (2006) Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006 , vol.2006 , pp. 374-381
    • Plossl, K.1    Nowey, T.2    Mletzko, C.3
  • 37
    • 84864613206 scopus 로고    scopus 로고
    • Salesforce
    • Salesforce (2009) http://www.salesforce.com/
    • (2009)
  • 40
    • 84925452156 scopus 로고    scopus 로고
    • Search-as-a-service: Outsourced search over outsourced storage
    • doi:10.1145/1594173.1594175
    • Singh A, Srivatsa M, Liu L (2009) Search-as-a-service: outsourced search over outsourced storage. ACM Trans Web 3(4). doi:10.1145/1594173.1594175
    • (2009) ACM Trans Web , vol.3 , pp. 4
    • Singh, A.1    Srivatsa, M.2    Liu, L.3
  • 41
    • 71749117758 scopus 로고    scopus 로고
    • Availability analysis of a scalable intrusion tolerant architecture with two detection modes
    • Uemura T, Dohi T, Kaio N (2009) Availability analysis of a scalable intrusion tolerant architecture with two detection modes. In: The first international conference on cloud computing, 2009, pp 178-189
    • (2009) The First International Conference on Cloud Computing , vol.2009 , pp. 178-189
    • Uemura, T.1    Dohi, T.2    Kaio, N.3
  • 42
    • 84864633987 scopus 로고    scopus 로고
    • Wispy
    • Wispy (2009) A cloud computing testbed, http://www.rcac.purdue.edu/ teragrid/resources/#wispy
    • (2009) A Cloud Computing Testbed
  • 43
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: The first international conference on cloud computing, 2009, pp 167-177
    • (2009) The First International Conference on Cloud Computing , vol.2009 , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 44
    • 34548122074 scopus 로고    scopus 로고
    • Architectural patterns for enabling application security
    • Yoder J, Barcalow J (1997) Architectural patterns for enabling application security. In: PLo P, 1997
    • (1997) PLo P , vol.1997
    • Yoder, J.1    Barcalow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.