메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1094-1099

Security assessment of virtual machines in open source clouds

Author keywords

Cloud Computing; OpenStack Cloud; Security Assessment; Virtualization

Indexed keywords

CLOUD SERVICE PROVIDERS; MULTI TENANCIES; SECURITY ASSESSMENT; SECURITY CHALLENGES; SECURITY LEVEL; SECURITY THREATS; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 84886902973     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 3
    • 77249143925 scopus 로고    scopus 로고
    • Can a trusted environment provide security?
    • Jan [Online]
    • L. M. Kaufman, "Can a trusted environment provide security?" IEEE Security and Privacy, vol. 8, no. 1, pp. 50-52, Jan. 2010. [Online]. Available: http://dx.doi.org/10.1109/MSP.2010.33
    • (2010) IEEE Security and Privacy , vol.8 , Issue.1 , pp. 50-52
    • Kaufman, L.M.1
  • 4
    • 77249130262 scopus 로고    scopus 로고
    • Outlook: Cloudy with a chance of security challenges and improvements
    • Jan
    • T. Jaeger and J. Schiffman, "Outlook: Cloudy with a chance of security challenges and improvements, " IEEE Security and Privacy, vol. 8, no. 1, pp. 77-80, Jan. 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.1 , pp. 77-80
    • Jaeger, T.1    Schiffman, J.2
  • 7
    • 84881184011 scopus 로고    scopus 로고
    • OpenStack Jan [Online].
    • OpenStack. (2013, Jan.) Openstack cloud software. [Online]. Available: http://openstack.org
    • (2013) Openstack Cloud Software
  • 8
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • IEEE, march-april
    • B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities, " Security Privacy, IEEE, vol. 9, no. 2, pp. 50-57, march-april 2011.
    • (2011) Security Privacy , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 9
    • 84886910637 scopus 로고    scopus 로고
    • Article: Security issues in cloud computing: A survey
    • April foundation of Computer Science, USA
    • R. Shaikh and M. Sasikumar, "Article: Security issues in cloud computing: A survey, " International Journal of Computer Applications, vol. 44, no. 19, pp. 4-10, April 2012, foundation of Computer Science, USA.
    • (2012) International Journal of Computer Applications , vol.44 , Issue.19 , pp. 4-10
    • Shaikh, R.1    Sasikumar, M.2
  • 10
    • 77955131289 scopus 로고    scopus 로고
    • Can public-cloud security meet its unique challenges?
    • Jul
    • L. M. Kaufman, "Can public-cloud security meet its unique challenges?" IEEE Security and Privacy, vol. 8, no. 4, pp. 55-57, Jul. 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.4 , pp. 55-57
    • Kaufman, L.M.1
  • 13
    • 84865104045 scopus 로고    scopus 로고
    • A new methodology for security evaluation in cloud computing
    • IEEE Conference Publications, Opatija, Croatia
    • S. Ristov, M. Gusev, and M. Kostoska, "A new methodology for security evaluation in cloud computing, " in MIPRO, 2012 Proc. of the 35th Int. Convention, IEEE Conference Publications, Opatija, Croatia, 2012, pp. 1808-1813.
    • (2012) MIPRO, 2012 Proc. of the 35th Int. Convention , pp. 1808-1813
    • Ristov, S.1    Gusev, M.2    Kostoska, M.3
  • 15
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • feb
    • C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage, " Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362-375, feb. 2013.
    • (2013) Computers, IEEE Transactions on , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 17
    • 84886940515 scopus 로고    scopus 로고
    • ISO/IEC ISO/IEC 27001:2005, Information Security Management Systems-Requirements [Online]
    • ISO/IEC, "ISO/IEC 27001:2005, Information Security Management Systems-Requirements, " 2012. [Online]. Available: http://www.iso.org/ iso/iso catalogue/catalogue tc/catalogue detail.htm?csnumber=42103
    • (2012)
  • 22
    • 77949635694 scopus 로고    scopus 로고
    • KVM, Jan. [Online]
    • KVM, "Kernel based virtual machine, " Jan. 2013. [Online]. Available: http://www.linux-kvm.org/page/Main Page
    • (2013) Kernel Based Virtual Machine
  • 23
    • 84870761134 scopus 로고    scopus 로고
    • Jan. [Online]
    • C. Systems, "Xen hypervisor, " Jan. 2013. [Online]. Available: http://www.xen.org/
    • (2013) Xen Hypervisor
    • Systems, C.1
  • 24
    • 51149110886 scopus 로고    scopus 로고
    • UML, Jan. [Online]
    • UML, "User-mode linux kernel, " Jan. 2013. [Online]. Available: http://user-mode-linux.sourceforge.net/
    • (2013) User-mode Linux Kernel
  • 25
    • 84886905822 scopus 로고    scopus 로고
    • Microsoft, Microsoft hyper-v server 2012 Jan. [Online]
    • Microsoft, "Microsoft hyper-v server 2012, " Jan. 2013. [Online]. Available: www.microsoft.com/hyper-v-server/
    • (2013)
  • 26
    • 84886875126 scopus 로고    scopus 로고
    • Tenable, Nessus 5 Jan. [Online]
    • Tenable, "Nessus 5, " Jan. 2013. [Online]. Available: http://www.tenable. com/products/nessus
    • (2013)
  • 27
    • 84883392894 scopus 로고    scopus 로고
    • N. V. Database Jan. [Online]
    • N. V. Database, "Common vulnerability scoring system, " Jan. 2013. [Online]. Available: http://nvd.nist.gov/cvss.cfm
    • (2013) Common Vulnerability Scoring System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.