-
1
-
-
84882285740
-
-
http://www-900.ibm.com/ibm/ideasfromibm/cn/cloud/solutions/index.shtml
-
-
-
-
3
-
-
84882284476
-
National Institute of Standards and Technology (NIST)
-
The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, (October
-
The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, National Institute of Standards and Technology (NIST), Information Technology Laboratory (October 7, 2009), http://www.csrc.nist.gov
-
(2009)
Information Technology Laboratory
, vol.7
-
-
-
4
-
-
73849137124
-
-
International Data Corporation (2009), http://blogs.idc.com/ie/wpcontent/uploads/2009/12/idc_cloud_challenges_2009.jpg
-
(2009)
International Data Corporation
-
-
-
5
-
-
79951999348
-
Research on Cloud Computing Security
-
Feng, D.-G., Zhang, M., Zhang, Y., Xu, Z.: Research on Cloud Computing Security. Journal of Software 22(1), 71-82 (2011)
-
(2011)
Journal of Software
, vol.22
, Issue.1
, pp. 71-82
-
-
Feng, D.G.1
Zhang, M.2
Zhang, Y.3
Xu, Z.4
-
6
-
-
84870184014
-
Security Issues to Cloud Computing
-
Gillam, L. (eds.) doi:10.1007/978-1-84996-241-4_1
-
Onwubiko, C.: Security Issues to Cloud Computing. In: Antonopoulos, N., Gillam, L. (eds.) Cloud Computing: Principles, Systems and Applications, Computer Communications and Networks, doi:10.1007/978-1-84996-241-4_1
-
Cloud Computing: Principles, Systems and Applications, Computer Communications and Networks
-
-
Onwubiko, C.1
-
7
-
-
74049152241
-
Browser interfaces and extended validation ssl certificates: An empirical study
-
CCSW 2009
-
Biddle, R., van Oorschot, P.C., Patrick, A.S., Sobey, J., Whalen, T.: Browser interfaces and extended validation ssl certificates: an empirical study. In: Proceedings of the ACM Workshop on Cloud Computing Security, CCSW 2009 (2009)
-
(2009)
In: Proceedings of the ACM Workshop On Cloud Computing Security
-
-
Biddle, R.1
van Oorschot, P.C.2
Patrick, A.S.3
Sobey, J.4
Whalen, T.5
-
9
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
CCSW 2009
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the ACM Workshop on Cloud Computing Security, CCSW 2009 (2009)
-
(2009)
In: Proceedings of the ACM Workshop On Cloud Computing Security
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
14
-
-
77955131289
-
Can Public-Cloud Security Meet Its Unique Challenges
-
July/August
-
Kaufman, L.M.: Can Public-Cloud Security Meet Its Unique Challenges? IEEE Security & Privacy (July/August 2010)
-
(2010)
IEEE Security & Privacy
-
-
Kaufman, L.M.1
-
15
-
-
78649302229
-
Cloud computing: State-of-the-art and research challenges
-
doi:10.1007/s13174-010-0007-6
-
Zhang, Q., Cheng, L., Boutab, R.: Cloud computing: state-of-the-art and research challenges. Internet Serv. Appl. 1, 7-18 (2010), doi:10.1007/s13174-010-0007-6
-
(2010)
Internet Serv. Appl
, vol.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutab, R.3
-
16
-
-
79960511333
-
-
Cloud Security, Wiley Publishing, Inc., Canada, ISBN: 978-0-470-58987-8
-
Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing, Inc., Canada, ISBN: 978-0-470-58987-8
-
A Comprehensive Guide to Secure Cloud Computing
-
-
Krutz, R.L.1
Vines, R.D.2
-
17
-
-
84882239410
-
-
http://www.daoliproject.org
-
-
-
|