메뉴 건너뛰기




Volumn , Issue , 2012, Pages 379-390

Building trust and compliance in the cloud for services

Author keywords

Cloud computing; Hardware root of trust; Security; Trusted computing chain

Indexed keywords

ANTI VIRUS; IT ORGANIZATIONS; KEY SYSTEM COMPONENTS; MALWARES; MULTI TENANTS; MULTIPLE APPLICATIONS; PERCEIVED RISK; PHYSICAL BARRIERS; PHYSICAL ISOLATION; RESOURCE UTILIZATIONS; SECURITY; SECURITY CONTROLS; SOFTWARE VENDORS; TRUSTED COMPUTING;

EID: 84870806304     PISSN: 21660778     EISSN: 21660786     Source Type: Conference Proceeding    
DOI: 10.1109/SRII.2012.49     Document Type: Conference Paper
Times cited : (5)

References (30)
  • 2
    • 80051920007 scopus 로고    scopus 로고
    • Service delivery framework - An architectural strategy for next-generation service delivery in business network
    • Barros, A. and Kylau, U., "Service Delivery Framework - An Architectural Strategy for Next-Generation Service Delivery in Business Network, Proceedings of the 2011 Annual SRII Global Conference, pp. 47-37, 2011.
    • (2011) Proceedings of the 2011 Annual SRII Global Conference , pp. 37-47
    • Barros, A.1    Kylau, U.2
  • 3
    • 80053577353 scopus 로고    scopus 로고
    • A service oriented web application framework
    • Demirkan, H., Harmon, R.R., Goul, M., "A Service Oriented Web Application Framework, " IEEE IT Professional, Vol. 13, no. 5, 15- 21, 2011.
    • (2011) IEEE IT Professional , vol.13 , Issue.5 , pp. 15-21
    • Demirkan, H.1    Harmon, R.R.2    Goul, M.3
  • 6
    • 84870851113 scopus 로고    scopus 로고
    • CSA-GRC Stack
    • Cloud Security Alliance Group, Retrieved January 2012 from
    • Cloud Security Alliance Group, "CSA-GRC Stack, " Tool kit and whitepaper, 2010. Retrieved January 2012 from: www.cloudsecurityalliance.org/ grcstack.html.
    • (2010) Tool Kit and Whitepaper
  • 8
    • 84870797508 scopus 로고    scopus 로고
    • FTC news release, June 1, Retrieved February 15, 2012 from
    • Federal Trade Commission, "FACTA Disposal Rule goes into Effect June 1, 2005", FTC news release, June 1, 2005. Retrieved February 15, 2012 from: www.ftc.gov/opa/2005/06/disposal.shtm.
    • (2005) FACTA Disposal Rule Goes into Effect June 1, 2005
  • 9
    • 84870846446 scopus 로고    scopus 로고
    • white paper, Retrieved February 17, 2012 from
    • Intel Corporation. "Intel TXT, " white paper, 2012, Retrieved February 17, 2012 from: http://www.intel.com/technology/security/downloads/ archoverview.pdf.
    • (2012) Intel TXT
  • 10
    • 78649543654 scopus 로고    scopus 로고
    • Cloud computing: An auditor's perspective
    • Retrieved February 20, 2012 from
    • Gadia, S., "Cloud Computing: An Auditor's Perspective, " ISACA Journal, Vol. 6, 2009. Retrieved February 20, 2012 from: www.isaca.org/Journal/ Past-Issues/2009/Volume-6/Pages/Cloud-Computing-An-Auditor-s-Perspective1.aspx.
    • (2009) ISACA Journal , vol.6
    • Gadia, S.1
  • 12
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • September/October
    • Khan, K.M, Malluhi, Q., Establishing Trust in Cloud Computing, IEEE IT Professional, Vol. 12-5, 20-27, September/October 2010.
    • (2010) IEEE IT Professional , vol.12-15 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 13
    • 24944551836 scopus 로고    scopus 로고
    • NIST, NIST Special Publication 800-31-1, National Institute of Standards and Technology
    • NIST, "Recommended Security Controls for Information Systems, " NIST Special Publication 800-31-1, National Institute of Standards and Technology, 2005.
    • (2005) Recommended Security Controls for Information Systems
  • 18
    • 84864868892 scopus 로고    scopus 로고
    • whitepaper, April, Retrieved February 24, 2012 from
    • Trusted Computing Group, "Cloud Computing and Security - A Natural Match, " whitepaper, April 2010. Retrieved February 24, 2012 from: www.trustedcomputinggroup.org/resources/cloud-computing-and-security-a-natural- match.
    • (2010) Cloud Computing and Security - A Natural Match
  • 19
    • 84870769378 scopus 로고    scopus 로고
    • research paper, Retrieved from
    • Halton, W., "Security Issues and Solutions in Cloud Computing, " research paper, 2010. Retrieved from: http://wolfhalton.info/2010/06/25/ security-issues-and-solutionsincloud-computing/.
    • (2010) Security Issues and Solutions in Cloud Computing
    • Halton, W.1
  • 20
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • Chicago, Illinois
    • Ristenpart, T., Tromer, E., Shacham, H., Savage, S., "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, " CCS'09, Chicago, Illinois, 2009.
    • (2009) CCS'09
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 24
    • 84870815460 scopus 로고    scopus 로고
    • Retrieved February 2012 from
    • Wikipedia, "Cloud computing security" Retrieved February 2012 from: http://en.wikipedia.org/wiki/Cloud-computing-security.
    • Cloud Computing Security
  • 25
    • 84870786439 scopus 로고    scopus 로고
    • Building trust and compliance in the cloud
    • Yeluri, R, and Moreau, D., "Building Trust and Compliance in the Cloud", VMworld, 201l.
    • (2011) VMworld
    • Yeluri, R.1    Moreau, D.2
  • 26
    • 77955131289 scopus 로고    scopus 로고
    • Can public-cloud security meet its unique challenges?
    • July/August
    • Kaufman, L.M., Potter, B., "Can Public-Cloud Security Meet Its Unique Challenges?" IEEE Security & Privacy, July/August 2010.
    • (2010) IEEE Security & Privacy
    • Kaufman, L.M.1    Potter, B.2
  • 27
    • 84870837160 scopus 로고    scopus 로고
    • October 19, Retrieved February 25, 2012 from
    • Weinberg, N, "Gartner: Private Clouds are a Last Resort, " Network World, October 19, 2011. Retrieved February 25, 2012 from: http://www.networkworld.com/news/2011/101911-gartner-privatecloud-252151.html.
    • (2011) Gartner: Private clouds are a last resort
    • Weinberg, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.