메뉴 건너뛰기




Volumn 38, Issue , 2013, Pages 3-13

Selecting a Cloud Service Provider in the age of cybercrime

Author keywords

Cyber insecurity; Metrics; Security; Security assurance; Trusted Cloud services

Indexed keywords

DISTRIBUTED DATABASE SYSTEMS; NETWORK SECURITY; RISK ASSESSMENT;

EID: 84885175490     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.01.007     Document Type: Article
Times cited : (28)

References (32)
  • 1
    • 85012229582 scopus 로고    scopus 로고
    • Security in the cloud
    • Anthes G. Security in the cloud. Communication of the ACM 2010; 53(11):16-8.
    • (2010) Communication of the ACM , vol.53 , Issue.11 , pp. 16-18
    • Anthes, G.1
  • 4
    • 77954327465 scopus 로고    scopus 로고
    • Report EECS Department Berkeley: University of California. [Last accessed: 10.10.12]
    • Chen Y, Paxson V, Katz RH. What's new about cloud computing security?. Report EECS Department Berkeley: University of California. Available at:, http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html; 2010 [Last accessed: 10.10.12].
    • (2010) What's New about Cloud Computing Security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 5
    • 84885183419 scopus 로고    scopus 로고
    • Cloud Security Alliance-CSA. [Last accessed 10.10.12]
    • Cloud Security Alliance -CSA. Cloud controls matrix v.1.3. Available at: https://cloudsecurityalliance.org/; 2011 [Last accessed 10.10.12].
    • (2011) Cloud Controls Matrix v.1.3
  • 6
    • 85030487465 scopus 로고    scopus 로고
    • Cloud Security Alliance eCSA. [Last accessed: 10.10.12]
    • Cloud Security Alliance eCSA. Consensus assessments initiative questionnaire 1.1. Available at: https://cloudsecurityalliance.org/; 2012 [Last accessed: 10.10.12].
    • (2012) Consensus Assessments Initiative Questionnaire 1.1
  • 7
    • 77956387185 scopus 로고    scopus 로고
    • Cloud Security Alliance-CSA. [Last accessed: 10.10.12]
    • Cloud Security Alliance-CSA. Security guidance for critical areas of focus in cloud computing V2.1. Available at: http://www.cloudsecurityalliance. org/guidance/csaguide.v2.1.pdf; 2009 [Last accessed: 10.10.12].
    • (2009) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1
  • 8
    • 79952275571 scopus 로고    scopus 로고
    • ENISA. [Last accessed: 21.12.12]
    • ENISA. Cloud computing information assurance framework. Available at: http://www.enisa.europa.eu/activities/riskmanagement/files/deliverables/ cloud-computing-informationassurance-framework; 2009 [Last accessed: 21.12.12].
    • (2009) Cloud Computing Information Assurance Framework
  • 10
    • 84885185050 scopus 로고    scopus 로고
    • [Last accessed 21.12.12]
    • Garfinkel S. The criminal cloud-technology review. Available at: http://www.technologyreview.com/news/425770/thecriminal-cloud/; 2011 [Last accessed 21.12.12].
    • (2011) The Criminal Cloud-technology Review
    • Garfinkel, S.1
  • 16
    • 84875980858 scopus 로고    scopus 로고
    • Private virtual infrastructure for cloud computing
    • In: ACM
    • Krautheim FJ. Private virtual infrastructure for cloud computing. In: Proceedings of the HotCloud 2009. ACM; 2009.
    • (2009) Proceedings of the HotCloud 2009
    • Krautheim, F.J.1
  • 17
    • 84883300516 scopus 로고    scopus 로고
    • McAfee and Guardian Analytics. Report, [Last accessed: 10.11.12]
    • McAfee and Guardian Analytics. Dissecting operation high roller. Report, Available at: http://www.mcafee.com/us/resources/reports/rp-operation-high- roller.pdf; 2012 [Last accessed: 10.11.12].
    • (2012) Dissecting Operation High Roller
  • 19
    • 79953033529 scopus 로고    scopus 로고
    • Secure software systems engineering: The secure Tropos approach
    • Mouratidis H. Secure software systems engineering: the secure Tropos approach. International Journal of Software 2011;6(3): 331-9.
    • (2011) International Journal of Software , vol.6 , Issue.3 , pp. 331-339
    • Mouratidis, H.1
  • 22
    • 79952483316 scopus 로고    scopus 로고
    • User experience and security in the cloud - An empirical study in the finnish cloud consortium
    • In: IEEE
    • Oza NV, Karppinen K, Savola R. User experience and security in the cloud - an empirical study in the finnish cloud consortium. In: Proceeding of CloudCom 2010. IEEE; 2010. p. 621-8.
    • (2010) Proceeding of CloudCom 2010 , pp. 621-628
    • Oza, N.V.1    Karppinen, K.2    Savola, R.3
  • 23
    • 77956353411 scopus 로고    scopus 로고
    • Cloud computing security issues and challenges
    • IEEE
    • Popovič K, Hocenski Z. Cloud computing security issues and challenges. Computer Issue 2010;3:344-9 [IEEE].
    • (2010) Computer Issue , vol.3 , pp. 344-349
    • Popovič, K.1    Hocenski, Z.2
  • 24
    • 84856682192 scopus 로고    scopus 로고
    • A SLA-based interface for security management in cloud and GRID integrations
    • In: IEEE
    • Rak M, Liccardo L, Aversa R. A SLA-based interface for security management in cloud and GRID integrations. In: proceedings of IAS 2011. IEEE; 2011. p. 378-83.
    • (2011) Proceedings of IAS 2011 , pp. 378-383
    • Rak, M.1    Liccardo, L.2    Aversa, R.3
  • 26
    • 84857359528 scopus 로고    scopus 로고
    • Internet cloud security: The illusion of inclusion
    • Elsevier
    • Teneyuca D. Internet cloud security: the illusion of inclusion. Information Security Technical Report 2011;16(3-4):102-7 [Elsevier].
    • (2011) Information Security Technical Report , vol.16 , Issue.3-4 , pp. 102-107
    • Teneyuca, D.1
  • 27
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • Springer
    • Vaquero LM, Rodero-Merino L, Morán D. Locking the sky: a survey on IaaS cloud security. Computing 2011;91(1):93-118 [Springer].
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Morán, D.3
  • 28
    • 79960839401 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    • Elsevier
    • Wang G, Liu Q, Wu J, Guo M. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 2011;30(5):320-31 [Elsevier].
    • (2011) Computers & Security , vol.30 , Issue.5 , pp. 320-331
    • Wang, G.1    Liu, Q.2    Wu, J.3    Guo, M.4
  • 31
    • 79952934355 scopus 로고    scopus 로고
    • FBI defends disruptive raids on texas data centers
    • [Last accessed: 10.10.12]
    • Zetter K. FBI defends disruptive raids on texas data centers. Wired Magazine. Available at: http://www.wired.com/threatlevel/2009/04/data-centers- ra/; 2009 [Last accessed: 10.10.12].
    • (2009) Wired Magazine
    • Zetter, K.1
  • 32
    • 84863498079 scopus 로고    scopus 로고
    • Efficient audit service outsourcing for data integrity in clouds
    • Elsevier
    • Zhu Y, Hu H, Ahn GJ, Yau SS. Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software 2012;85(5):1083-95 [Elsevier].
    • (2012) Journal of Systems and Software , vol.85 , Issue.5 , pp. 1083-1095
    • Zhu, Y.1    Hu, H.2    Ahn, G.J.3    Yau, S.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.