-
1
-
-
84865267404
-
Combining model-driven engineering and cloud computing
-
Bruneliere, H., Cabot, J. and Jouault, F. (2010) 'Combining model-driven engineering and cloud computing', INRIA Report.
-
(2010)
INRIA Report
-
-
Bruneliere, H.1
Cabot, J.2
Jouault, F.3
-
2
-
-
72749089553
-
Trusting the cloud
-
Cachin, C., Keidar, I. and Shraer, A. (2009) 'Trusting the cloud', SIGACT News, Vol. 40, No. 2, pp.81-86.
-
(2009)
SIGACT News
, vol.40
, Issue.2
, pp. 81-86
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
3
-
-
78649245892
-
-
accessed on 4 May 2012
-
ENISA (European Network Information Security Agency) (2009) Cloud Computing Risk Assessment, available at http://www.enisa.europa.eu/activities/ risk-management/files/deliverables/cloud-computing-risk-assessment (accessed on 4 May 2012).
-
(2009)
Cloud Computing Risk Assessment
-
-
-
4
-
-
84865214004
-
The future of cloud computing - Opportunities for European cloud beyond
-
European Commission
-
European Commission (2010) 'The future of cloud computing - opportunities for European cloud beyond', European Commission Public Report.
-
(2010)
European Commission Public Report
-
-
-
5
-
-
84865214367
-
-
Software Engineering Institute, Carnegie Mellon University, USA, (accessed on 4 May 2012)
-
Grace, L. (2010) Basics about Cloud Computing, Software Engineering Institute, Carnegie Mellon University, USA, available at http://www.sei.cmu.edu/ library/assets/whitepapers/Cloudcomputingbasics.pdf (accessed on 4 May 2012).
-
(2010)
Basics about Cloud Computing
-
-
Grace, L.1
-
6
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Grobauer, B., Walloschek, T. and Stöcker, E. (2011) 'Understanding cloud computing vulnerabilities', IEEE Security and Privacy, Special Issue on Cloud Computing, Vol. 9, No. 2, pp.50-57.
-
(2011)
IEEE Security and Privacy Special Issue on Cloud Computing
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stöcker, E.3
-
7
-
-
72249114479
-
Constructing and testing privacy-aware services in a cloud computing environment: Challenges and opportunities
-
ACM New York, NY, USA
-
Guand, L. and Cheung, S-C. (2009) 'Constructing and testing privacy-aware services in a cloud computing environment: challenges and opportunities', Internetware '09: Proceedings of the First Asia-Pacific Symposium on Internetware, pp.1-10, ACM New York, NY, USA.
-
(2009)
Internetware '09: Proceedings of the First Asia-Pacific Symposium on Internetware
, pp. 1-10
-
-
Guand, L.1
Cheung, S.-C.2
-
8
-
-
84865227395
-
Leveraging the benefits of cloud computing with specialized security
-
IDC
-
IDC (2010) 'Leveraging the benefits of cloud computing with specialized security', IDC White Paper.
-
(2010)
IDC White Paper
-
-
-
12
-
-
69949171348
-
Cloud computing and information policy: Computing in a policy cloud?
-
Publisher Routledge
-
Jaeger, P.T., Lin, J. and Grimes, J.M. (2008) 'Cloud computing and information policy: computing in a policy cloud?', Journal of Information Technology & Politics, Vol. 5, No. 3, pp.269-283, Publisher Routledge.
-
(2008)
Journal of Information Technology & Politics
, vol.5
, Issue.3
, pp. 269-283
-
-
Jaeger, P.T.1
Lin, J.2
Grimes, J.M.3
-
13
-
-
74049112206
-
Cloud security issues
-
Kandukuri, B.R., Paturiand, V.R. and Rakshi, A. (2009) 'Cloud security issues', IEEE International Conference on Services Computing, pp.517-520.
-
(2009)
IEEE International Conference on Services Computing
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturiand, V.R.2
Rakshi, A.3
-
14
-
-
78650558794
-
Secure virtualization for cloud computing
-
July, Elsevier Ltd
-
Lombardi, F. and Di Pietro, R. (2011) 'Secure virtualization for cloud computing', Journal of Network and Computer Applications, Special Issue on Advanced Topics in Cloud Computing, July, Vol. 34, No. 4, pp.1113-1122, Elsevier Ltd.
-
(2011)
Journal of Network and Computer Applications, Special Issue on Advanced Topics in Cloud Computing
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
16
-
-
77954051808
-
-
Version 15. (accessed on 4 May 2012)
-
Mell, P. and Grance, T. (2009b) The NIST Definition of Cloud Computing, Version 15, available at http://www.nist.gov/manuscript-publication-search.cfm? pub-id=909616 (accessed on 4 May 2012).
-
(2009)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
19
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
IEEE Computer Society, Washington DC, USA
-
Pearson, S. (2009) 'Taking account of privacy when designing cloud computing services', Cloud'09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, IEEE Computer Society, pp.44-52, Washington DC, USA.
-
(2009)
Cloud'09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
, pp. 44-52
-
-
Pearson, S.1
-
20
-
-
77954836346
-
-
CRC Press Taylor and Francis, Boca Raton, FL, USA
-
Rittinghouse, J.W. and Ransome, J.F. (2010) Cloud Computing Implementation, Management and Security, CRC Press Taylor and Francis, Boca Raton, FL, USA.
-
(2010)
Cloud Computing Implementation, Management and Security
-
-
Rittinghouse, J.W.1
Ransome, J.F.2
-
21
-
-
77954693382
-
Challenges and opportunities for virtualized security in the clouds
-
ACM, New York, NY, USA
-
Siebenlist, F. (2009) 'Challenges and opportunities for virtualized security in the clouds', SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp.1-2, ACM, New York, NY, USA.
-
(2009)
SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 1-2
-
-
Siebenlist, F.1
-
23
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
Vaquero, L.M., Rodero-Merino, L., Caceres, J., and Lindner, M. (2009) 'A break in the clouds: towards a cloud definition', SIGCOMM Computer Communication. Rev., Vol. 39, No. 1, pp.50-55.
-
(2009)
SIGCOMM Computer Communication. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
24
-
-
77949776507
-
A 'cloud free' security model for cloud computing'
-
Yunis, M.M. (2009) 'A 'cloud free' security model for cloud computing', Int. J. of Services and Standards, Vol. 5, No. 4, pp.354-375, Inderscience.
-
(2009)
Int. J. of Services and Standards
, vol.5
, Issue.4
, pp. 354-375
-
-
Yunis, M.M.1
|