메뉴 건너뛰기




Volumn 7482 LNCS, Issue , 2012, Pages 162-175

Towards trustworthy health platform cloud

Author keywords

data protection; Health Platform as a Service; resilience; security; trustworthy cloud architecture

Indexed keywords

CLOUD LAYERS; DATA PROTECTION; HEALTH SERVICES; HEALTHCARE SERVICES; RESILIENCE; SECURITY; SECURITY AND PRIVACY;

EID: 84865622142     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32873-2_12     Document Type: Conference Paper
Times cited : (14)

References (20)
  • 8
    • 79957455464 scopus 로고    scopus 로고
    • Fail-aware untrusted storage
    • Cachin, C., Keidar, I., Shraer, A.: Fail-aware untrusted storage. SIAM J. Comput. 40(2), 493-533 (2011)
    • (2011) SIAM J. Comput. , vol.40 , Issue.2 , pp. 493-533
    • Cachin, C.1    Keidar, I.2    Shraer, A.3
  • 11
    • 78649245892 scopus 로고    scopus 로고
    • ENISA. Cloud computing risk assessment (2009), http://www.enisa.europa. eu/act/rm/files/deliverables/cloud-computingrisk-assessment
    • (2009) Cloud Computing Risk Assessment
  • 14
    • 65849178422 scopus 로고    scopus 로고
    • A new approach to secure logging
    • Ma, D., Tsudik, G.: A new approach to secure logging. TOS 5(1) (2009)
    • (2009) TOS , vol.5 , Issue.1
    • Ma, D.1    Tsudik, G.2
  • 15
    • 84865627943 scopus 로고    scopus 로고
    • Microsoft.
    • Microsoft. Windows azure service disruption update (2012), http://blogs.msdn.com/b/windowsazure/archive/2012/03/01/windows-azureservice- disruption-update.aspx
    • (2012) Windows Azure Service Disruption Update
  • 16
    • 80052567038 scopus 로고    scopus 로고
    • E-health drivers and barriers for cloud computing adoption
    • Nalin, M., Baroni, I., Sanna, A.: E-health drivers and barriers for cloud computing adoption. In: CLOSER 2011, pp. 385-390 (2011)
    • (2011) CLOSER 2011 , pp. 385-390
    • Nalin, M.1    Baroni, I.2    Sanna, A.3
  • 18
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2(2), 159-176 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.