-
2
-
-
80051920007
-
Service delivery framework - An architectural strategy for next-generation service delivery in business network
-
Barros, A. and Kylau, U., "Service Delivery Framework - An Architectural Strategy for Next-Generation Service Delivery in Business Network, Proceedings of the 2011 Annual SRII Global Conference, pp. 47-37, 2011.
-
(2011)
Proceedings of the 2011 Annual SRII Global Conference
, pp. 37-47
-
-
Barros, A.1
Kylau, U.2
-
3
-
-
80053577353
-
A service oriented web application framework
-
Demirkan, H., Harmon, R.R., Goul, M., "A Service Oriented Web Application Framework, " IEEE IT Professional, Vol. 13, no. 5, 15- 21, 2011.
-
(2011)
IEEE IT Professional
, vol.13
, Issue.5
, pp. 15-21
-
-
Demirkan, H.1
Harmon, R.R.2
Goul, M.3
-
6
-
-
84870851113
-
CSA-GRC Stack
-
Cloud Security Alliance Group, Retrieved January 2012 from
-
Cloud Security Alliance Group, "CSA-GRC Stack, " Tool kit and whitepaper, 2010. Retrieved January 2012 from: www.cloudsecurityalliance.org/ grcstack.html.
-
(2010)
Tool Kit and Whitepaper
-
-
-
7
-
-
84870796843
-
-
Intel Press
-
Castro-Leon, E., Golden, B., Yeluri, R., Gomez, M., Sheridan, C., Creating the Infrastructure for Cloud Computing, Intel Press, 2011.
-
(2011)
Creating the Infrastructure for Cloud Computing
-
-
Castro-Leon, E.1
Golden, B.2
Yeluri, R.3
Gomez, M.4
Sheridan, C.5
-
8
-
-
84870797508
-
-
FTC news release, June 1, Retrieved February 15, 2012 from
-
Federal Trade Commission, "FACTA Disposal Rule goes into Effect June 1, 2005", FTC news release, June 1, 2005. Retrieved February 15, 2012 from: www.ftc.gov/opa/2005/06/disposal.shtm.
-
(2005)
FACTA Disposal Rule Goes into Effect June 1, 2005
-
-
-
9
-
-
84870846446
-
-
white paper, Retrieved February 17, 2012 from
-
Intel Corporation. "Intel TXT, " white paper, 2012, Retrieved February 17, 2012 from: http://www.intel.com/technology/security/downloads/ archoverview.pdf.
-
(2012)
Intel TXT
-
-
-
10
-
-
78649543654
-
Cloud computing: An auditor's perspective
-
Retrieved February 20, 2012 from
-
Gadia, S., "Cloud Computing: An Auditor's Perspective, " ISACA Journal, Vol. 6, 2009. Retrieved February 20, 2012 from: www.isaca.org/Journal/ Past-Issues/2009/Volume-6/Pages/Cloud-Computing-An-Auditor-s-Perspective1.aspx.
-
(2009)
ISACA Journal
, vol.6
-
-
Gadia, S.1
-
11
-
-
80051947218
-
Complex service management in a hybrid cloud
-
Kang, K., Strong, R., Fang, H., Chen, T., Rhodes, J., Zhou, R., "Complex service management in a hybrid cloud, " Proceedings of the 2011 Annual SRII Global Conference, 34-46, 2011.
-
(2011)
Proceedings of the 2011 Annual SRII Global Conference
, pp. 34-46
-
-
Kang, K.1
Strong, R.2
Fang, H.3
Chen, T.4
Rhodes, J.5
Zhou, R.6
-
12
-
-
77957700442
-
Establishing trust in cloud computing
-
September/October
-
Khan, K.M, Malluhi, Q., Establishing Trust in Cloud Computing, IEEE IT Professional, Vol. 12-5, 20-27, September/October 2010.
-
(2010)
IEEE IT Professional
, vol.12-15
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
13
-
-
24944551836
-
-
NIST, NIST Special Publication 800-31-1, National Institute of Standards and Technology
-
NIST, "Recommended Security Controls for Information Systems, " NIST Special Publication 800-31-1, National Institute of Standards and Technology, 2005.
-
(2005)
Recommended Security Controls for Information Systems
-
-
-
18
-
-
84864868892
-
-
whitepaper, April, Retrieved February 24, 2012 from
-
Trusted Computing Group, "Cloud Computing and Security - A Natural Match, " whitepaper, April 2010. Retrieved February 24, 2012 from: www.trustedcomputinggroup.org/resources/cloud-computing-and-security-a-natural- match.
-
(2010)
Cloud Computing and Security - A Natural Match
-
-
-
19
-
-
84870769378
-
-
research paper, Retrieved from
-
Halton, W., "Security Issues and Solutions in Cloud Computing, " research paper, 2010. Retrieved from: http://wolfhalton.info/2010/06/25/ security-issues-and-solutionsincloud-computing/.
-
(2010)
Security Issues and Solutions in Cloud Computing
-
-
Halton, W.1
-
20
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, Illinois
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, " CCS'09, Chicago, Illinois, 2009.
-
(2009)
CCS'09
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
22
-
-
78649669091
-
-
Retrieved February 2012 from
-
Valeri, L., Somers, G., Robinson, R., Graux, H., Dumortier, J., Handbook of Legal Procedures of Computer and Network Misuse in EU Countries, RAND Corporation, 2006. Retrieved February 2012 from: http://www.rand.org/pubs/ technical-reports/2006/RAND-TR337.pdf.
-
(2006)
Handbook of Legal Procedures of Computer and Network Misuse in EU Countries, RAND Corporation
-
-
Valeri, L.1
Somers, G.2
Robinson, R.3
Graux, H.4
Dumortier, J.5
-
23
-
-
77953172125
-
Infrastructure as a service security: Challenges and solutions
-
Wesam, D., Takouna, I., Meinel, C., "Infrastructure as a Service Security: Challenges and solutions, " 7th International Conference on Informatics and Systems, 1-8, 2010.
-
(2010)
7th International Conference on Informatics and Systems
, pp. 1-8
-
-
Wesam, D.1
Takouna, I.2
Meinel, C.3
-
24
-
-
84870815460
-
-
Retrieved February 2012 from
-
Wikipedia, "Cloud computing security" Retrieved February 2012 from: http://en.wikipedia.org/wiki/Cloud-computing-security.
-
Cloud Computing Security
-
-
-
25
-
-
84870786439
-
Building trust and compliance in the cloud
-
Yeluri, R, and Moreau, D., "Building Trust and Compliance in the Cloud", VMworld, 201l.
-
(2011)
VMworld
-
-
Yeluri, R.1
Moreau, D.2
-
26
-
-
77955131289
-
Can public-cloud security meet its unique challenges?
-
July/August
-
Kaufman, L.M., Potter, B., "Can Public-Cloud Security Meet Its Unique Challenges?" IEEE Security & Privacy, July/August 2010.
-
(2010)
IEEE Security & Privacy
-
-
Kaufman, L.M.1
Potter, B.2
-
27
-
-
84870837160
-
-
October 19, Retrieved February 25, 2012 from
-
Weinberg, N, "Gartner: Private Clouds are a Last Resort, " Network World, October 19, 2011. Retrieved February 25, 2012 from: http://www.networkworld.com/news/2011/101911-gartner-privatecloud-252151.html.
-
(2011)
Gartner: Private clouds are a last resort
-
-
Weinberg, N.1
-
30
-
-
84870803398
-
Services security in the cloud
-
Yeluri R, and Greene J., "Services Security in the Cloud", Intel Technology Journal, End to End Mobile Cloud, Volume 16, Issue 3, 2012.
-
(2012)
Intel Technology Journal, End to End Mobile Cloud
, vol.16
, Issue.3
-
-
Yeluri, R.1
Greene, J.2
|