메뉴 건너뛰기




Volumn , Issue , 2012, Pages 573-577

Security issues and solutions in cloud computing

Author keywords

application; cloud computing; data; security; virtualization

Indexed keywords

COMPUTING SYSTEM; DATA; IT COMPANIES; MICROSOFT; RELATED PRODUCTS; SECURITY; SECURITY ISSUES; SECURITY REQUIREMENTS; VIRTUALIZATIONS;

EID: 84866348681     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2012.20     Document Type: Conference Paper
Times cited : (34)

References (32)
  • 2
    • 84866417060 scopus 로고
    • Information processing systems-Open Systems Interconnection
    • ISO and ISO 7498-2:1989, "Information processing systems-Open Systems Interconnection," 1989.
    • (1989) ISO and ISO 7498-2:1989
  • 7
    • 84866414525 scopus 로고    scopus 로고
    • GoGrid API, http://www.gogrid.com/company/press-releases/gogrid-moves- api-specification-to-creativecommons.php, 2011.
    • (2011)
  • 9
    • 84866414526 scopus 로고    scopus 로고
    • Storage Network Industry Alliance, http://www.snia.org, 2011.
    • (2011)
  • 17
    • 78650558794 scopus 로고    scopus 로고
    • Secure Virtualization for Cloud Computing
    • Academic Press Ltd. London
    • F. Lombardi and R. D. Pietro, "Secure Virtualization for Cloud Computing," Journal of Network and Computer Applications, vol. 34, issue. 4, pp. 1113-1122, Academic Press Ltd. London, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.4 , pp. 1113-1122
    • Lombardi, F.1    Pietro, R.D.2
  • 20
  • 23
    • 84866414532 scopus 로고    scopus 로고
    • Hacker4Lease, "Backdoor and Debug Options," http://www.hacker4lease.com/attack-methods/backdoor/, 2011.
    • (2011) Backdoor and Debug Options
  • 24
    • 43049179369 scopus 로고    scopus 로고
    • Securing Web Applications
    • Elsevier Advanced Technology Publications Oxford
    • D. Gollmann, "Securing Web Applications," Information Security Technical Report, vol. 13, issue. 1, Elsevier Advanced Technology Publications Oxford, 2008.
    • (2008) Information Security Technical Report , vol.13 , Issue.1
    • Gollmann, D.1
  • 26
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in Proc. of IEEE INFOCOM, 2010.
    • Proc. of IEEE INFOCOM, 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 27
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data," in Proc. of IEEE INFOCOM, 2011.
    • Proc. of IEEE INFOCOM, 2011
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 29
    • 79953294892 scopus 로고    scopus 로고
    • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 31
    • 84921683893 scopus 로고    scopus 로고
    • Authorized private keyword search over encrypted personal health records in cloud computing
    • M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," in Proc. of ICDCS, 2011.
    • Proc. of ICDCS, 2011
    • Li, M.1    Yu, S.2    Cao, N.3    Lou, W.4
  • 32
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.