메뉴 건너뛰기




Volumn , Issue , 2012, Pages 26-31

Cloud computing: Security challenges

Author keywords

cloud computing; cloud computing security; cloud computing security management

Indexed keywords

BUSINESS MODELS; CLOUD MODELS; CLOUD SERVICES; COMPUTING PARADIGM; COMPUTING SECURITY; IT INFRASTRUCTURES; KEY FEATURE; MODEL ARCHITECTURE; MODEL SECURITY; NEW DIMENSIONS; SECURITY CHALLENGES; SECURITY PROBLEMS; SECURITY SOLUTIONS; SECURITY THREATS;

EID: 84872558353     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIST.2012.6388058     Document Type: Conference Paper
Times cited : (50)

References (21)
  • 6
    • 84872504953 scopus 로고    scopus 로고
    • Cloud Security Alliance (CSA). (2010). Available: http://www. cloudsecurityalliance.org/
    • (2010)
  • 9
    • 74349113474 scopus 로고    scopus 로고
    • On technical security issues in cloud computing
    • Bangalore
    • Meiko Jensen, Jörg Schwenk, Nils Gruschka and Luigi Lo Iacono, "On Technical Security Issues in Cloud Computing," in IEEE iCCC, Bangalore 2009, pp. 109-116.
    • (2009) IEEE ICCC , pp. 109-116
    • Jensen, M.1    Schwenk, J.2    Gruschka, N.3    Lo Iacono, L.4
  • 11
    • 83355177548 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • In Press, Corrected Proof
    • S. Subashini, ,Kavitha, V., "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. In Press, Corrected Proof.
    • Journal of Network and Computer Applications
    • Subashini, S.1    Kavitha, V.2
  • 13
    • 49949097790 scopus 로고    scopus 로고
    • October
    • Microsoft. (2006, October, 2010). Multi-Tenant Data Architecture. Available: http://msdn.microsoft.comien-us/library/aa479086.aspx.
    • (2006) Multi-Tenant Data Architecture
  • 14
    • 84872505337 scopus 로고    scopus 로고
    • October
    • Amazon. October, 2010). Amazon EC2 SLA. Available: http://aws.amazon. comlec2-slal
    • (2010) Amazon EC2 SLA
  • 15
    • 77951712050 scopus 로고    scopus 로고
    • Trust but verify critical infrastructure cyber security solutions
    • D. K. Holstein, Stouffer, K., "Trust but Verify Critical Infrastructure Cyber Security Solutions," in HICSS 2010, pp. 18.
    • (2010) HICSS , pp. 18
    • Holstein, D.K.1    Stouffer, K.2
  • 17
    • 77952687447 scopus 로고    scopus 로고
    • Integrated security framework for secure web services
    • Z. Wenjun, "Integrated Security Framework for Secure Web Services," in IITSI 2010, pp. 178-183.
    • (2010) IITSI , pp. 178-183
    • Wenjun, Z.1
  • 18
    • 77950965416 scopus 로고    scopus 로고
    • Open identity management framework for SaaS ecosystem
    • B. Wang, Huang He, Yuan, Liu Xiao, Xi, Xu Jing, Min, "Open Identity Management Framework for SaaS Ecosystem," in ICEBE '09. pp. 512-517.
    • ICEBE '09 , pp. 512-517
    • Wang, B.1    He, H.2    Yuan3    Xiao, L.4    Xu, X.5    Min, J.6
  • 19
    • 39749125095 scopus 로고    scopus 로고
    • Web application scanners: Definitions and functions
    • F. Elizabeth" Vadim, Okun, "Web Application Scanners: Definitions and Functions," in HICSS 2007, pp. 280b-280b.
    • HICSS 2007
    • Elizabeth, F.1    Okun, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.