메뉴 건너뛰기




Volumn , Issue , 2012, Pages 83-84

Secure cloud maintenance: Protecting workloads against insider attacks

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTION LEVEL; AMAZON EC2; COMPUTING RESOURCE; COST ADVANTAGES; INSIDER ATTACK; IT INFRASTRUCTURES; VIRTUAL MACHINES;

EID: 84871942309     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2414456.2414505     Document Type: Conference Paper
Times cited : (23)

References (8)
  • 1
    • 70450281317 scopus 로고    scopus 로고
    • last Accessed March 2010
    • AMAZON. The Amazon Elastic Compute Cloud (EC2). Available at http://aws.amazon.com/ec2/, last accessed March 2010, 2010.
    • (2010) The Amazon Elastic Compute Cloud (EC2)
  • 3
    • 78649245892 scopus 로고    scopus 로고
    • Cloud computing risk assessment
    • ENISA
    • ENISA. Cloud Computing Risk Assessment. Tech. rep., ENISA, 2009.
    • (2009) Tech. Rep., ENISA
  • 6
    • 0016555241 scopus 로고
    • The protection of information in computer system
    • SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer system. Proceedings of the IEEE 63, 9 (1975), 1278-1308.
    • (1975) Proceedings of the IEEE 63 , vol.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 8
    • 84871950275 scopus 로고    scopus 로고
    • Dark data center design
    • Sep
    • WEISMAN, R. Dark Data Center Design. Processor Vol.28 Issue 35, Sep 2006.
    • (2006) Processor , vol.28 , Issue.35
    • Weisman, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.