메뉴 건너뛰기




Volumn 68 LNICST, Issue , 2011, Pages 298-313

Challenges for cloud networking security

Author keywords

Cloud Computing; Cloud Networking; Network Virtualisation; Security

Indexed keywords

NETWORKING SECURITY; POSITION PAPERS; SECURITY; SECURITY CHALLENGES; SERVICE MODEL;

EID: 84885886559     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-21444-8_26     Document Type: Conference Paper
Times cited : (19)

References (34)
  • 1
    • 84885890817 scopus 로고    scopus 로고
    • website
    • SAIL project website (2010), http://www.sail-project.eu/
    • (2010)
  • 2
    • 78650593419 scopus 로고    scopus 로고
    • Cybercrime 2.0: When the cloud turns dark
    • Provos, N., Rajab, M.A., Mavrommatis, P.: Cybercrime 2.0: When the cloud turns dark. Queue 7(2), 46-47 (2009)
    • (2009) Queue , vol.7 , Issue.2 , pp. 46-47
    • Provos, N.1    Rajab, M.A.2    Mavrommatis, P.3
  • 3
    • 34547501234 scopus 로고    scopus 로고
    • MIT Centennial Speech of 1961 cited in Architects of the Information Society
    • Garfinkel, S.L. (ed.) MIT, Cambridge
    • McCarthy, J.: MIT Centennial Speech of 1961 cited in Architects of the Information Society. In: Garfinkel, S.L. (ed.) Thirty-five Years of the Laboratory for Computer Science. MIT, Cambridge (1999)
    • (1999) Thirty-five Years of the Laboratory for Computer Science
    • McCarthy, J.1
  • 6
    • 84885888104 scopus 로고    scopus 로고
    • VMware (2010), http://www.vmware.com
    • (2010)
  • 9
    • 78650612154 scopus 로고    scopus 로고
    • Intel virtualization (2010), http://www.intel.com/technology/ virtualization/
    • (2010) Intel Virtualization
  • 11
    • 34948877584 scopus 로고    scopus 로고
    • The canadian response to the USA Patriot Act
    • Fraser, D.: The canadian response to the USA Patriot Act. IEEE Security Privacy 5(5), 66-68 (2007)
    • (2007) IEEE Security Privacy , vol.5 , Issue.5 , pp. 66-68
    • Fraser, D.1
  • 12
    • 24944574585 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications)
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). Official Journal of the European Union, L201, 0037-0047 (2002)
    • (2002) Official Journal of the European Union , vol.L201 , pp. 0037-0047
  • 14
    • 33745196858 scopus 로고    scopus 로고
    • Insight and perspectives for content delivery networks
    • Pallis, G., Vakali, A.: Insight and perspectives for content delivery networks. Commun. ACM 49(1), 101-106 (2006)
    • (2006) Commun. ACM , vol.49 , Issue.1 , pp. 101-106
    • Pallis, G.1    Vakali, A.2
  • 15
    • 77249132188 scopus 로고    scopus 로고
    • A survey of network virtualization
    • Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Computer Networks 54(5), 862-876 (2010)
    • (2010) Computer Networks , vol.54 , Issue.5 , pp. 862-876
    • Chowdhury, N.M.K.1    Boutaba, R.2
  • 19
    • 84885886430 scopus 로고    scopus 로고
    • Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures
    • FEDERICA: Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures (2010), http://www.fp7-federica. eu/
    • (2010)
  • 20
  • 26
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 28
    • 84885894118 scopus 로고    scopus 로고
    • XEN networking blog (2010), http://wiki.xensource.com/xenwiki/ XenNetworking
    • (2010) XEN Networking Blog
  • 32
    • 56649115709 scopus 로고    scopus 로고
    • The Paradox of Security in Virtual Environments
    • Price, M., Partners, A.: The Paradox of Security in Virtual Environments. Computer 41(11), 22-28 (2008)
    • (2008) Computer , vol.41 , Issue.11 , pp. 22-28
    • Price, M.1    Partners, A.2
  • 34
    • 84885890136 scopus 로고    scopus 로고
    • CA Community Blog: Zeus "in-the-cloud" (2009), http://community.ca.com/ blogs/securityadvisor/archive/2009/12/09/zeus-in-the- cloud.aspx
    • (2009) CA Community Blog: Zeus "In-the-cloud"


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.