-
1
-
-
84864855504
-
-
Center Of The Protection Of National Infrastructure CPNI by Deloitte Published March
-
Center Of The Protection Of National Infrastructure CPNI by Deloitte "Information Security Briefing 0112010 Cloud Computing", p.71 Published March 2010.
-
(2010)
Information Security Briefing 0112010 Cloud Computing
, pp. 71
-
-
-
2
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
published 16 Nov
-
Ian Foster, Yong Zhao, loan Raicu, Shiyong Lu," Cloud Computing and Grid Computing 360-Degree Compared " Grid Computing Environments Workshop, 2008. GCE '08 p.l0, published 16 Nov 2008.
-
(2008)
Grid Computing Environments Workshop, 2008. GCE '08
-
-
Foster, I.1
Zhao, Y.2
Raicu, L.3
Lu, S.4
-
3
-
-
79955885572
-
Twenty-one experts define cloud computing
-
published JANUARY 24
-
Jeremy Geelan, "Twenty-One Experts Define Cloud Computing", cloud computing journal, published JANUARY 24,2009.
-
(2009)
Cloud Computing Journal
-
-
Geelan, J.1
-
4
-
-
77954051808
-
-
National Institute of Science and Technology. Retrieved July 24
-
National Institute of Science and Technology. "The NIST Definition of Cloud Computing".p.7. Retrieved July 24 2011.
-
(2011)
The NIST Definition of Cloud Computing
, pp. 7
-
-
-
5
-
-
84864855622
-
-
Thesis,p. 34 + 2 appendices Published April 11
-
Ngongang Guy Mollet, "Cloud Computing Security" Thesis, p. 34 + 2 appendices Published April 11, 2011.
-
(2011)
Cloud Computing Security
-
-
Mollet, N.G.1
-
6
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities
-
University of Melbourne, Australia. Retrieved July 31
-
Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal, " Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities" Department of Computer Science and Software Engineering, University of Melbourne, Australia. p. 9. Retrieved July 31 2008.
-
(2008)
Department of Computer Science and Software Engineering
, pp. 9
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
8
-
-
79958712357
-
Data security model for cloud computing
-
China, November 21-22
-
Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing"Data Security Model for Cloud Computing"Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, November 21-22,2009.
-
(2009)
Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao
-
-
Yuefa, D.1
Bo, W.2
Yaqiang, G.3
Quan, Z.4
Chaojing, T.5
-
9
-
-
84864863650
-
-
Amazon EC2 API Amazon Elastic Compute Cloud Developer Guide, IAmazon Elastic Compute Cloud Developer Guide' published 2006-10-01
-
Amazon EC2 API ," Amazon Elastic Compute Cloud Developer Guide http://docs.amazonwebservices.com/AWSEC2/2oo6-10-oIlDeveloperGuide IAmazon Elastic Compute Cloud Developer Guide' published 2006-10-01
-
-
-
-
10
-
-
85012969134
-
-
Amazon Web Services, Amazon Simple Storage Service Developer Guide, published 2006-03-01
-
Amazon Web Services, "Amazon Simple Storage Service Developer Guide ", http://docs.amazonwebservices.com/AmazonS3/2006-03-0II Amazon Simple Storage Service Developer Guide , published 2006-03-01
-
Amazon Simple Storage Service Developer Guide
-
-
-
11
-
-
84864835158
-
-
Amazon Web Services, September
-
Amazon Web Services," Overview of Security Processes" http://aws.typepad.com/aws/2oo9/08/introducing-amazon-virtualprivate-cloud-vpc. html, September 2009.
-
(2009)
Overview of Security Processes
-
-
-
15
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
published January
-
Luis M. Vaquero1, Luis Rodero-Merino1 , Juan Caceres1, Maik Lindner2 "A Break in the Clouds: Towards a Cloud Definition ", ACM SIGCOMM Computer Communication Review, Volume 39, Number 1, published January 2009
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 1
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
20
-
-
84864830518
-
-
Affiliation Juan Soto National Institute of Standards and Technology 100 Bureau Drive Stop 8930 Gaithersburg
-
Affiliation Juan Soto, National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg "Randomness Testing of the Advanced Encryption Standard Candidate Algorithms".\
-
Randomness Testing of the Advanced Encryption Standard Candidate Algorithms
-
-
-
22
-
-
84864829861
-
-
July 31
-
Dawson, Helen Gustafson, Matt Henricksen, Bill Millan. " Evaluation of RC4 Stream Cipher , Information Security Research Centre Queensland University of Technology", July 31, 2002
-
(2002)
Evaluation of RC4 Stream Cipher , Information Security Research Centre Queensland University of Technology
-
-
Dawson, H.G.1
Henricksen, M.2
Millan, B.3
-
24
-
-
0028428941
-
The data encryption standard (des) and its strength against attacks
-
May
-
Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks."I BM Journal of Research and Development, May 1994,pp. 243-250.
-
(1994)
IBM Journal of Research and Development
, pp. 243-250
-
-
Coppersmith, D.1
-
25
-
-
0013017020
-
Rijndael: The advanced encryption standard."d r
-
March
-
Daemen, J. , and Rijmen, V. "Rijndael: The Advanced Encryption Standard."D r. Dobb's Journal, March 2001,PP. 137-139.
-
(2001)
Dobb's Journal
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
28
-
-
84864829537
-
-
http://www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-computingv26. Pdf
-
-
-
|