메뉴 건너뛰기




Volumn , Issue , 2012, Pages 377-384

Validating cloud infrastructure changes by cloud audits

Author keywords

cloud audit; cloud computing; cloud security

Indexed keywords

AUDIT REPORTS; AUDIT SYSTEMS; CLOUD PROVIDERS; COMPUTING INFRASTRUCTURES; OR-NETWORKS; SECURITY AUDIT; VIRTUAL INFRASTRUCTURES; VIRTUAL MACHINES;

EID: 84867276671     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERVICES.2012.12     Document Type: Conference Paper
Times cited : (29)

References (22)
  • 1
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on iaas cloud security
    • L. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011.
    • (2011) Computing , vol.91 , pp. 93-118
    • Vaquero, L.1    Rodero-Merino, L.2    Moran, D.3
  • 2
    • 84867276590 scopus 로고    scopus 로고
    • 04
    • Business Insider, "Inside Amazon's Cloud Disaster," http://www.businessinsider.com/amazon-outage-enters-its-second-day-lots-of- sites-still-down-2011-4, 04 2011.
    • (2011) Inside Amazon's Cloud Disaster
  • 6
    • 84861681567 scopus 로고    scopus 로고
    • Federal Office for Information Security (BSI). IT-Grundschutz Catalogues. https://www.bsi.bund.de/EN/Topics/ITGrundschutz/itgrundschutz node.html.
    • IT-Grundschutz Catalogues
  • 11
    • 74049145625 scopus 로고    scopus 로고
    • Managing security of virtual machine images in a cloud environment
    • Proceedings of the 2009 ACM workshop on Cloud computing security, ser. New York, NY, USA: ACM, [Online]. Available
    • J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning, "Managing security of virtual machine images in a cloud environment," in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW '09. New York, NY, USA: ACM, 2009, pp. 91-96. [Online]. Available: http://doi.acm.org/10.1145/ 1655008.1655021
    • (2009) CCSW '09 , pp. 91-96
    • Wei, J.1    Zhang, X.2    Ammons, G.3    Bala, V.4    Ning, P.5
  • 15
    • 24344493979 scopus 로고    scopus 로고
    • Cids: An agent-based intrusion detection system
    • [Online]. Available
    • D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii, "Cids: An agent-based intrusion detection system," Computers & Security, vol. 24, no. 5, pp. 387-398, 2005. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404805000179
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 387-398
    • Dasgupta, D.1    Gonzalez, F.2    Yallapu, K.3    Gomez, J.4    Yarramsettii, R.5
  • 18
    • 78249269487 scopus 로고    scopus 로고
    • Designing cloud services adhering to government privacy laws
    • F. Dölitzscher, C. Reich, and A. Sulistio, "Designing cloud services adhering to government privacy laws," in CIT, 2010, pp. 930-935.
    • (2010) CIT , pp. 930-935
    • Dölitzscher, F.1    Reich, C.2    Sulistio, A.3
  • 19
    • 84867248465 scopus 로고    scopus 로고
    • Proceedings, no. 978-1-61208-174-8, iSBN: 978-1-61208-174-8. [Online]. Available
    • F. Doelitzscher, C. Reich, M. Knahl, and N. Clarke, "Incident detection for cloud environments," in Proceedings, no. 978-1-61208-174-8, 2011, pp. 100-105, iSBN: 978-1-61208-174-8. [Online]. Available: http://www.thinkmind.org/index.php?view=article&articleid= emerging-2011-5-30-40134
    • (2011) Incident Detection for Cloud Environments , pp. 100-105
    • Doelitzscher, F.1    Reich, C.2    Knahl, M.3    Clarke, N.4
  • 20
    • 79952065844 scopus 로고    scopus 로고
    • [Online]. Available
    • Cloud Security Alliance, "Top Threats to Cloud Computing V1.0," 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats.html
    • (2010) Top Threats to Cloud Computing V1.0
  • 21
    • 84857161828 scopus 로고    scopus 로고
    • An autonomous agent based incident detection system for cloud environments
    • F. Dölitzscher, C. Reich, M. Knahl, and N. Clarke, "An autonomous agent based incident detection system for cloud environments," in CloudCom, 2011, pp. 197-204.
    • (2011) CloudCom , pp. 197-204
    • Dölitzscher, F.1    Reich, C.2    Knahl, M.3    Clarke, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.