-
1
-
-
77954051808
-
-
National Institute of Standards and Technology (NIST). Accessed 15 June 2012
-
Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf (2009). Accessed 15 June 2012
-
(2009)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
2
-
-
74349113474
-
On technical security issues in cloud computing
-
Bangalore India
-
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: Proceedings of the IEEE International Conference on Cloud Computing, pp. 109-116. Bangalore, India (2009)
-
(2009)
Proceedings of the IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
3
-
-
70349309706
-
Data security in the world of cloud computing
-
Harauz, J., Kaufman, L.M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61-64 (2009)
-
(2009)
IEEE Secur. Priv.
, vol.7
, Issue.4
, pp. 61-64
-
-
Harauz, J.1
Kaufman, L.M.2
Potter, B.3
-
4
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1-11 (2011)
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
5
-
-
78650573573
-
Cloud computing identity management
-
Gopalakrishnan, A.: Cloud computing identity management. SETLabs Brief 7(7), 45-55 (2009)
-
(2009)
SETLabs Brief
, vol.7
, Issue.7
, pp. 45-55
-
-
Gopalakrishnan, A.1
-
9
-
-
77957962695
-
-
Accessed 15 June 2012
-
Open Cloud Manifesto: Open Cloud Manifesto. http://www. opencloudmanifesto.org/(2009). Accessed 15 June 2012
-
(2009)
Open Cloud Manifesto
-
-
-
10
-
-
80052340091
-
Enabling SAML for dynamic identity federation management
-
Gdansk Poland
-
Arias, P., Almenárez, F., Marín, A., Díaz., D.: Enabling SAML for dynamic identity federation management. In.: Proceedings of Wireless and Mobile Networking Conference, pp. 173-184. Gdansk, Poland (2009)
-
(2009)
Proceedings of Wireless and Mobile Networking Conference
, pp. 173-184
-
-
Arias, P.1
Almenárez, F.2
Marín, A.3
Díaz, D.4
-
12
-
-
84891585028
-
-
Wiley, New York, NY, USA
-
Buyya, R., Broberg, J., Goscinski, A.: Cloud Computing: Principles and Paradigms. Wiley, New York, NY, USA (2011)
-
(2011)
Cloud Computing: Principles and Paradigms
-
-
Buyya, R.1
Broberg, J.2
Goscinski, A.3
-
13
-
-
0025791156
-
Software risk management: Principles and practices
-
Boehm, B.W.: Software risk management: principles and practices. IEEE Softw. 8(1), 32-42 (1991)
-
(1991)
IEEE Softw
, vol.8
, Issue.1
, pp. 32-42
-
-
Boehm, B.W.1
-
15
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
Maler, E., Reed, D.: The venn of identity: options and issues in federated identity management. IEEE Secur. Priv. 6(2), 16-23 (2008)
-
(2008)
IEEE Secur. Priv.
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
16
-
-
41949093741
-
-
Accessed 15 June 2012
-
OpenID: OpenID Authentication 2.0. http://openid.net/specs/openid- authentication-2-0.html (2007). Accessed 15 June 2012
-
(2007)
OpenID Authentication 2.0.
-
-
-
17
-
-
44949218700
-
-
V2.0. OASIS Standard March
-
Cantor, S., Kemp, J., Philpott, R., Maler, E.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, March 2005
-
(2005)
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML)
-
-
Cantor, S.1
Kemp, J.2
Philpott, R.3
Maler, E.4
-
19
-
-
44949218700
-
-
March
-
Cantor, S., Moreh, J., Philpott, R. Maler, E. (eds.): Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, March 2005
-
(2005)
Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard
-
-
Cantor, S.1
Moreh, J.2
Philpott, R.3
Maler, E.4
-
20
-
-
84867256224
-
-
Accessed 15 June 2012
-
Kantara Initiative. http://kantarainitiative.org/. Accessed 15 June 2012
-
-
-
-
21
-
-
84867242447
-
-
Accessed 15 June 2012
-
Terena TF-EMC2: REFEDs Federation Survey. https://refeds.terena.org/ index.php/Federations. Accessed 15 June 2012
-
REFEDs Federation Survey.
-
-
-
23
-
-
77958473007
-
TRIMS, a privacy-aware trust and reputation model for identity management systems
-
Gómez, F., Girao, J., Martínez, G.: TRIMS, a Privacy-aware Trust and Reputation Model for Identity Management Systems. Comput. Netw. Special Issue Manag. Emerg. Comput. Environ. 54(16), 2899-2912 (2010)
-
(2010)
Comput. Netw. Special Issue Manag. Emerg. Comput. Environ.
, vol.54
, Issue.16
, pp. 2899-2912
-
-
Gómez, F.1
Girao, J.2
Martínez, G.3
-
24
-
-
38549135113
-
Context awareness in network selection for dynamic environments
-
Díaz-Sánchez, D., Marín López, A., Almenárez Mendoza, F., Campo Vázquez, C., García-Rubio, C.: Context awareness in network selection for dynamic environments. Telecommun. Syst. 36(1), 49-60 (2007)
-
(2007)
Telecommun. Syst.
, vol.36
, Issue.1
, pp. 49-60
-
-
Díaz-Sánchez, D.1
Marín López, A.2
Almenárez Mendoza, F.3
Campo Vázquez, C.4
García-Rubio, C.5
-
25
-
-
45849116070
-
-
National Institute of Standards and Technology (NIST)
-
Burr, W.E., Dodson, D.F., Polk, W.T.: NIST Special Publication 800-63 Version 1.0.2, Electronic Authentication Guidelines. National Institute of Standards and Technology (NIST) (2006)
-
(2006)
NIST Special Publication 800-63 Version 1.0.2, Electronic Authentication Guidelines
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
27
-
-
77952361484
-
-
Kemp, J., Cantor, S., Mishra, P., Philpott, R., Maler, E. (eds.): Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard (2005)
-
(2005)
Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard
-
-
Kemp, J.1
Cantor, S.2
Mishra, P.3
Philpott, R.4
Maler, E.5
-
28
-
-
0025700933
-
How to make a decision: The analytic hierarchy process
-
Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48(1), 9-26 (1990)
-
(1990)
Eur. J. Oper. Res.
, vol.48
, Issue.1
, pp. 9-26
-
-
Saaty, T.L.1
-
29
-
-
0012719654
-
Aggregation operators: Properties, classes and construction methods
-
Calvo, T., Mayor, G., Mesiar, R. (eds.). Physica-Verlag, Heidelberg
-
Calvo, T., Kolesárová, A., Komorníková, M., Mesiar, R.: Aggregation operators: properties, classes and construction methods. In: Calvo, T., Mayor, G., Mesiar, R. (eds.) Aggregation Operators. New Trends and Applications, pp. 3-104. Physica-Verlag, Heidelberg (2001)
-
(2001)
Aggregation Operators. New Trends and Applications
, pp. 3-104
-
-
Calvo, T.1
Kolesárová, A.2
Komorníková, M.3
Mesiar, R.4
-
30
-
-
34248666540
-
Fuzzy sets
-
Zadeh, L.A.: Fuzzy sets. Inform. Control 8(3), 338-353 (1965)
-
(1965)
Inform. Control
, vol.8
, Issue.3
, pp. 338-353
-
-
Zadeh, L.A.1
-
31
-
-
0003471143
-
-
Prentice-Hall Inc., Englewood Cliffs, NJ, USA
-
Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic - Theory and Applications. Prentice-Hall, Inc., Englewood Cliffs, NJ, USA (1995)
-
(1995)
Fuzzy Sets and Fuzzy Logic - Theory and Applications
-
-
Klir, G.J.1
Yuan, B.2
-
35
-
-
79952440250
-
Architectural requirements for cloud computing systems: An enterprise cloud approach
-
Rimal, B.P., Jukan, A., Katsaros, D., Goeleven, Y.: Architectural requirements for cloud computing systems: an enterprise cloud approach. J. Comput. 9(1), 3-26 (2011)
-
(2011)
J. Comput.
, vol.9
, Issue.1
, pp. 3-26
-
-
Rimal, B.P.1
Jukan, A.2
Katsaros, D.3
Goeleven, Y.4
-
37
-
-
77954595043
-
-
Accessed 15 June 2012
-
Hammer-Lahav, E. (ed.): The OAuth 1.0 Protocol. http://tools.ietf.org/ html/draft-hammer-oauth-10 (2010). Accessed 15 June 2012
-
(2010)
The OAuth 1.0 Protocol.
-
-
Hammer-Lahav, E.1
-
38
-
-
80053414558
-
Cloud computing security - Trends and research directions
-
Washington DC USA
-
Sengupta, S., Kaulgud, V., Sharma, V.S.: Cloud computing security - trends and research directions. In: Proceedings of the 7th IEEE World Congress on Services, pp. 524-531. Washington DC, USA (2011)
-
(2011)
Proceedings of the 7th IEEE World Congress on Services
, pp. 524-531
-
-
Sengupta, S.1
Kaulgud, V.2
Sharma, V.S.3
-
40
-
-
79959433819
-
-
Information Technology Laboratory. National Institute of Standards and Technology (NIST). Accessed 15 June 2012
-
Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. Information Technology Laboratory. National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications (2011). Accessed 15 June 2012
-
(2011)
Guidelines on Security and Privacy in Public Cloud Computing
-
-
Jansen, W.1
Grance, T.2
-
42
-
-
78651463159
-
Cloud computing landscape and research challenges regarding trust and reputation
-
Xi'an China
-
Habib, S.M., Ries, S., Muhlhauser, M.: Cloud computing landscape and research challenges regarding trust and reputation. In: Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 410-415. Xi'an, China (2010)
-
(2010)
Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
, pp. 410-415
-
-
Habib, S.M.1
Ries, S.2
Muhlhauser, M.3
-
44
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
Indianapolis USA
-
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science, pp. 693-702. Indianapolis, USA (2010)
-
(2010)
Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
45
-
-
78349301289
-
Identity federation in cloud computing
-
Atlanta USA
-
Casola, V., Rak, M., Villano, U.: Identity federation in cloud computing. In: Proceedings of the IEEE 6th International Conference on Information Assurance and Security, pp. 253-259. Atlanta, USA (2010)
-
(2010)
Proceedings of the IEEE 6th International Conference on Information Assurance and Security
, pp. 253-259
-
-
Casola, V.1
Rak, M.2
Villano, U.3
-
46
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
Larissa Greece
-
Celesti, A., Tusa, F., Villari, F.M., Puliafito, A.: Security and cloud computing: intercloud identity management infrastructure. In: Proceedings of the 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp. 253-259. Larissa, Greece (2010)
-
(2010)
Proceedings of the 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises
, pp. 253-259
-
-
Celesti, A.1
Tusa, F.2
Villari, F.M.3
Puliafito, A.4
-
47
-
-
80455140339
-
An identity-centric internet: Identity in the cloud, identity as a service and other delights
-
Vienna Austria
-
Ates, M., Ravet, S., Ahmat, A.M., Fayolle, J.: An identity-centric internet: identity in the cloud, identity as a service and other delights. In: Proceedings of the 6th International Conference on Availability, Reliability and Security, pp. 555-560. Vienna, Austria (2011)
-
(2011)
Proceedings of the 6th International Conference on Availability, Reliability and Security
, pp. 555-560
-
-
Ates, M.1
Ravet, S.2
Ahmat, A.M.3
Fayolle, J.4
-
49
-
-
79951680628
-
Trust management for multimedia P2P applications in autonomic networking
-
Almenarez, F., Marín, A., Díaz, D., Cortés, A., Campo, C., García, C.: Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Netw. 9(4), 687-697 (2011)
-
(2011)
Ad Hoc Netw
, vol.9
, Issue.4
, pp. 687-697
-
-
Almenarez, F.1
Marín, A.2
Díaz, D.3
Cortés, A.4
Campo, C.5
García, C.6
|