메뉴 건너뛰기




Volumn , Issue , 2012, Pages 49-54

A methodology for management of cloud computing using security criteria

Author keywords

[No Author keywords available]

Indexed keywords

ALLOCATION ALGORITHM; CLOUD COMPUTING ENVIRONMENTS; CLOUD COMPUTING SECURITIES; ENERGY EFFICIENT; SECURITY CRITERION; SECURITY INDICES; SECURITY LEVEL; SECURITY METRICS;

EID: 84880293922     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LatinCloud.2012.6508157     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 4
    • 78650096628 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • G. B., W. T., and S. E., "Understanding cloud computing vulnerabilities," IEEE Security and Privacy, 2010.
    • (2010) IEEE Security and Privacy
  • 5
    • 84861525002 scopus 로고    scopus 로고
    • Efficient resource management for cloud computing environments
    • 978-1-4244-7614-5/10
    • A. J. Younge, G. von Laszewski, L. Wang, S. Lopez-Alarcon, and W. Carithers, "Efficient resource management for cloud computing environments," IEEE, no. 978-1-4244-7614-5/10, 2010.
    • (2010) IEEE
    • Younge, A.J.1    Von Laszewski, G.2    Wang, L.3    Lopez-Alarcon, S.4    Carithers, W.5
  • 7
    • 84890069861 scopus 로고    scopus 로고
    • Iso/iec 27000-information technology-security techniques-information security management systems-requirements
    • ISO/IEC.
    • ISO/IEC. (2009) Iso/iec 27000-information technology-security techniques-information security management systems-requirements. international organization for standartization.
    • (2009) International Organization for Standartization
  • 10
    • 62949225623 scopus 로고    scopus 로고
    • Cloud computing and grid computing 360-degree compared
    • ser. GCE '08, November 2008
    • I. Foster, Y. Zhao, I. Raicu, and L. Shiyong, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008, ser. GCE '08, November 2008, pp. 1-10.
    • (2008) Grid Computing Environments Workshop , pp. 1-10
    • Foster, I.1    Zhao, Y.2    Raicu, I.3    Shiyong, L.4
  • 13
  • 19
    • 78149392355 scopus 로고    scopus 로고
    • A security metrics taxonomization model for software-intensive systems
    • -, "A security metrics taxonomization model for software-intensive systems," Journal of Information Processing Systems, vol. 5, p. 197, 2009.
    • (2009) Journal of Information Processing Systems , vol.5 , pp. 197
  • 21
    • 84862676002 scopus 로고    scopus 로고
    • A systematic review of information security governance frameworks in the cloud computing environment
    • O. Rebollo, D. Mellado, and E. Fernndez-Medina, "A systematic review of information security governance frameworks in the cloud computing environment," Journal of Universal Computer Science, vol. 18, pp. 798-815, 2012.
    • (2012) Journal of Universal Computer Science , vol.18 , pp. 798-815
    • Rebollo, O.1    Mellado, D.2    Fernndez-Medina, E.3
  • 24
    • 84880275672 scopus 로고    scopus 로고
    • Utility functions in autonomic systems in icac 04 proceedings of the first international conference on autonomic computing
    • W. E. Walsh, G. Tesauro, J. O. Kephart, and R. Das, "Utility functions in autonomic systems in icac 04," Proceedings of the first international conference on autonomic computing, IEEE Computer Society, p. 7077, 2004.
    • (2004) IEEE Computer Society , pp. 7077
    • Walsh, W.E.1    Tesauro, G.2    Kephart, J.O.3    Das, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.