-
1
-
-
84877898482
-
Heads in the cloud
-
Ankeny, J. (2011). Heads in the cloud. Entrepreneur, 39(10), 50-51.
-
(2011)
Entrepreneur
, vol.39
, Issue.10
, pp. 50-51
-
-
Ankeny, J.1
-
2
-
-
77950330985
-
Towards security goals in summative e-assessment security
-
November 9-12, London, UK
-
Apampa, K. M, Wills, G. B, & Argles, D. (2009). Towards security goals in summative e-assessment security. In Proceedings of International Conference for Internet Technology and Secured Transactions, November 9-12, London, UK, 1-5.
-
(2009)
Proceedings of International Conference for Internet Technology and Secured Transactions
, pp. 1-5
-
-
Apampa, K.M.1
Wills, G.B.2
Argles, D.3
-
3
-
-
68249129760
-
-
(Technical Report No. UCB/EECS-2009-28). Retrieved from
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing (Technical Report No. UCB/EECS-2009-28). Retrieved from http://digitalassets.lib.berkeley.edu/techreports/ucb/text/EECS-2009-28.pdf.
-
(2009)
Above the clouds: A Berkeley view of cloud computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
84891585028
-
-
Hoboken, N.J.: Wiley
-
Buyya, R., Broberg, J., and Goscinski, A. (2011). Cloud computing: principles and paradigms. Hoboken, N.J.: Wiley.
-
(2011)
Cloud computing: Principles and paradigms
-
-
Buyya, R.1
Broberg, J.2
Goscinski, A.3
-
7
-
-
84866410521
-
Cloudsourcing: Managing cloud adoption
-
Géczy, P., Izumi, N., and Hasida, K. (2012). Cloudsourcing: managing cloud adoption. Global Journal of Business Research, 6(2), 57-70.
-
(2012)
Global Journal of Business Research
, vol.6
, Issue.2
, pp. 57-70
-
-
Géczy, P.1
Izumi, N.2
Hasida, K.3
-
8
-
-
84856198914
-
-
Retrieved from Microsoft
-
Harm, R., & Yamartin, M. (2010). The economics of the cloud. Retrieved from Microsoft http://www.microsoft.com/presspass/presskits/cloud/docs/The-Economics-of-the-Cloud.pdf.
-
(2010)
The economics of the cloud.
-
-
Harm, R.1
Yamartin, M.2
-
9
-
-
79959433819
-
-
(NIST Special Publication 800-144). Retrieved from National Institutes of Standards and Technology
-
Jansen, W., and Grance, T. (2011). Guidelines on security and privacy in public cloud computing (NIST Special Publication 800-144). Retrieved from National Institutes of Standards and Technology http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909494.
-
(2011)
Guidelines on security and privacy in public cloud computing
-
-
Jansen, W.1
Grance, T.2
-
10
-
-
84867827368
-
-
(December 1). Retrieved January 20, 2012, from The Guardian
-
MacAskill, E. (2010, December 1). WikiLeaks website pulled by Amazon after US political pressure. Retrieved January 20, 2012, from The Guardian: http://www.guardian.co.uk/media/2010/dec/01/wikileaks-website-cables-servers-amazon
-
(2010)
WikiLeaks website pulled by Amazon after US political pressure.
-
-
McAskill, E.1
-
11
-
-
77954051808
-
-
(NIST Special Publication 800-145). Retrieved from National Institutes of Standards and Technology
-
Mell, P., and Grance, T. (2010). The NIST definition of cloud computing (NIST Special Publication 800-145). Retrieved from National Institutes of Standards and Technology http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
-
(2010)
The NIST definition of cloud computing
-
-
Mell, P.1
Grance, T.2
-
12
-
-
84877894328
-
-
(April 22). Retrieved October 14, 2011, from CNN MONEY
-
Mitchell, D. (2011, April 22). Amazon's cloud nightmare. Retrieved October 14, 2011, from CNN MONEY: http://tech.fortune.cnn.com/2011/04/22/amazons-cloud-nightmare/
-
(2011)
Amazon's cloud nightmare.
-
-
Mitchell, D.1
-
14
-
-
80052173864
-
A cross section of the issues and research activities related to both information security and cloud computing
-
Sehgal, N. K., Sohoni, S., Xiong, Y., Fritz, D., Mulia, W., and Acken, J. M. (2011). A cross section of the issues and research activities related to both information security and cloud computing. IETE Tech Rev IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 28(4), 279-291.
-
(2011)
IETE Tech Rev IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India)
, vol.28
, Issue.4
, pp. 279-291
-
-
Sehgal, N.K.1
Sohoni, S.2
Xiong, Y.3
Fritz, D.4
Mulia, W.5
Acken, J.M.6
-
15
-
-
84877889415
-
-
(October 2). Retrieved January 20, 2012, from Internet Evolution
-
Shacklett, M. E. (2011, October 2). Cloud computing still calls for caution. Retrieved January 20, 2012, from Internet Evolution: http://www.internetevolution.com/author.asp?section_id=562&doc_id=203826
-
(2011)
Cloud computing still calls for caution.
-
-
Shacklett, M.E.1
-
16
-
-
78650420060
-
-
(April 18). Retrieved October 14, 2011, from The New York Times
-
Stone, B., & Vance, A. (2010, April 18). Companies slowly join cloud-computing. Retrieved October 14, 2011, from The New York Times: http://www.nytimes.com/2010/04/19/technology/19cloud.html.
-
(2010)
Companies slowly join cloud-computing.
-
-
Stone, B.1
Vance, A.2
-
17
-
-
84962098266
-
Cloud Nine? An Integrative Risk Management Framework for Cloud Computing
-
June 12-15, Bled, Slovenia, paper 38
-
th BLED eConference, June 12-15, Bled, Slovenia, paper 38.
-
(2011)
th BLED eConference
-
-
Troshani, I.1
Rampersad, G.2
Wickramasinghe, N.3
-
18
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|