-
1
-
-
77950347409
-
A view of cloud computing
-
Apr
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing, " Commun. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Y. Tang, P. P. Lee, J. C. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion, " IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.2
Lui, J.C.3
Perlman, R.4
-
3
-
-
77249143925
-
Can a trusted environment provide security?
-
Jan [Online]
-
L. M. Kaufman, "Can a trusted environment provide security?" IEEE Security and Privacy, vol. 8, no. 1, pp. 50-52, Jan. 2010. [Online]. Available: http://dx.doi.org/10.1109/MSP.2010.33
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 50-52
-
-
Kaufman, L.M.1
-
4
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
Jan
-
T. Jaeger and J. Schiffman, "Outlook: Cloudy with a chance of security challenges and improvements, " IEEE Security and Privacy, vol. 8, no. 1, pp. 77-80, Jan. 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
5
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
dec.
-
R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing, " in Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on, dec. 2012, pp. 170-177.
-
(2012)
Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on
, pp. 170-177
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
6
-
-
84872093523
-
An architecture for overlaying private clouds on public providers
-
Las Vegas, USA
-
M. Shtern, B. Simmons, M. Smit, and M. Litoiu, "An architecture for overlaying private clouds on public providers, " in 8th Int. Conf. on Network and Service Management, CNSM 2012, Las Vegas, USA, 2012.
-
(2012)
8th Int. Conf. on Network and Service Management, CNSM 2012
-
-
Shtern, M.1
Simmons, B.2
Smit, M.3
Litoiu, M.4
-
7
-
-
84881184011
-
-
OpenStack Jan [Online].
-
OpenStack. (2013, Jan.) Openstack cloud software. [Online]. Available: http://openstack.org
-
(2013)
Openstack Cloud Software
-
-
-
8
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
IEEE, march-april
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities, " Security Privacy, IEEE, vol. 9, no. 2, pp. 50-57, march-april 2011.
-
(2011)
Security Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
9
-
-
84886910637
-
Article: Security issues in cloud computing: A survey
-
April foundation of Computer Science, USA
-
R. Shaikh and M. Sasikumar, "Article: Security issues in cloud computing: A survey, " International Journal of Computer Applications, vol. 44, no. 19, pp. 4-10, April 2012, foundation of Computer Science, USA.
-
(2012)
International Journal of Computer Applications
, vol.44
, Issue.19
, pp. 4-10
-
-
Shaikh, R.1
Sasikumar, M.2
-
10
-
-
77955131289
-
Can public-cloud security meet its unique challenges?
-
Jul
-
L. M. Kaufman, "Can public-cloud security meet its unique challenges?" IEEE Security and Privacy, vol. 8, no. 4, pp. 55-57, Jul. 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.4
, pp. 55-57
-
-
Kaufman, L.M.1
-
11
-
-
84870839918
-
Multitenancy-security risks and countermeasures
-
sept.
-
W. Brown, V. Anderson, and Q. Tan, "Multitenancy-security risks and countermeasures, " in Network-Based Information Systems (NBiS), 2012 15th International Conference on, sept. 2012, pp. 7-13.
-
(2012)
Network-Based Information Systems (NBiS), 2012 15th International Conference on
, pp. 7-13
-
-
Brown, W.1
Anderson, V.2
Tan, Q.3
-
12
-
-
78249248669
-
Information security risk management framework for the cloud computing environments
-
Washington, DC, USA: IEEE Computer Society
-
X. Zhang, N. Wuwong, H. Li, and X. Zhang, "Information security risk management framework for the cloud computing environments, " in Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology, ser. CIT '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 1328-1334.
-
(2010)
Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology, Ser. CIT '10
, pp. 1328-1334
-
-
Zhang, X.1
Wuwong, N.2
Li, H.3
Zhang, X.4
-
13
-
-
84865104045
-
A new methodology for security evaluation in cloud computing
-
IEEE Conference Publications, Opatija, Croatia
-
S. Ristov, M. Gusev, and M. Kostoska, "A new methodology for security evaluation in cloud computing, " in MIPRO, 2012 Proc. of the 35th Int. Convention, IEEE Conference Publications, Opatija, Croatia, 2012, pp. 1808-1813.
-
(2012)
MIPRO, 2012 Proc. of the 35th Int. Convention
, pp. 1808-1813
-
-
Ristov, S.1
Gusev, M.2
Kostoska, M.3
-
14
-
-
78049340512
-
It auditing to assure a secure cloud computing
-
Washington, DC, USA: IEEE Computer Society
-
Z. Chen and J. Yoon, "It auditing to assure a secure cloud computing, " in Proceedings of the 2010 6th World Congress on Services, ser. SERVICES '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 253-259.
-
(2010)
Proceedings of the 2010 6th World Congress on Services, Ser. SERVICES '10
, pp. 253-259
-
-
Chen, Z.1
Yoon, J.2
-
15
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
feb
-
C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage, " Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362-375, feb. 2013.
-
(2013)
Computers, IEEE Transactions on
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
16
-
-
84865101228
-
Cloud computing security in business information systems
-
S. Ristov, M. Gusev, and M. Kostoska, "Cloud computing security in business information systems, " International Journal of Network Security & Its Applications (IJNSA), vol. 4, no. 2, pp. 75-93, 2012.
-
(2012)
International Journal of Network Security & Its Applications (IJNSA)
, vol.4
, Issue.2
, pp. 75-93
-
-
Ristov, S.1
Gusev, M.2
Kostoska, M.3
-
17
-
-
84886940515
-
-
ISO/IEC ISO/IEC 27001:2005, Information Security Management Systems-Requirements [Online]
-
ISO/IEC, "ISO/IEC 27001:2005, Information Security Management Systems-Requirements, " 2012. [Online]. Available: http://www.iso.org/ iso/iso catalogue/catalogue tc/catalogue detail.htm?csnumber=42103
-
(2012)
-
-
-
19
-
-
84886937533
-
Security assessment of openstack open source cloud solution
-
Thessaloniki, Greece
-
S. Ristov, M. Gusev, and M. Kostoska, "Security assessment of openstack open source cloud solution, " in Proceedings of the 7th South East European Doctoral Student Conference (DSC2012), Thessaloniki, Greece, 2012, pp. 577-587.
-
(2012)
Proceedings of the 7th South East European Doctoral Student Conference (DSC2012)
, pp. 577-587
-
-
Ristov, S.1
Gusev, M.2
Kostoska, M.3
-
20
-
-
84886919567
-
-
University Ss Cyril and Methodius, Skopje, Macedonia, FCSE, Tech. Rep. IIT: 01-13, Jan.
-
M. Gusev, S. Ristov, and A. Donevski, "Security vulnerabilities from inside and outside the cloud, " University Ss Cyril and Methodius, Skopje, Macedonia, FCSE, Tech. Rep. IIT:01-13, Jan. 2013.
-
(2013)
Security Vulnerabilities from Inside and Outside the Cloud
-
-
Gusev, M.1
Ristov, S.2
Donevski, A.3
-
21
-
-
84886903547
-
Openstack cloud security vulnerabilities from inside and outside
-
to be published Valencia, Spain, May
-
S. Ristov, M. Gusev, and A. Donevski, "Openstack cloud security vulnerabilities from inside and outside, " in to be published in Proceedings of The 4th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2013), Valencia, Spain, May 2013.
-
(2013)
Proceedings of the 4th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2013)
-
-
Ristov, S.1
Gusev, M.2
Donevski, A.3
-
22
-
-
77949635694
-
-
KVM, Jan. [Online]
-
KVM, "Kernel based virtual machine, " Jan. 2013. [Online]. Available: http://www.linux-kvm.org/page/Main Page
-
(2013)
Kernel Based Virtual Machine
-
-
-
23
-
-
84870761134
-
-
Jan. [Online]
-
C. Systems, "Xen hypervisor, " Jan. 2013. [Online]. Available: http://www.xen.org/
-
(2013)
Xen Hypervisor
-
-
Systems, C.1
-
24
-
-
51149110886
-
-
UML, Jan. [Online]
-
UML, "User-mode linux kernel, " Jan. 2013. [Online]. Available: http://user-mode-linux.sourceforge.net/
-
(2013)
User-mode Linux Kernel
-
-
-
25
-
-
84886905822
-
-
Microsoft, Microsoft hyper-v server 2012 Jan. [Online]
-
Microsoft, "Microsoft hyper-v server 2012, " Jan. 2013. [Online]. Available: www.microsoft.com/hyper-v-server/
-
(2013)
-
-
-
26
-
-
84886875126
-
-
Tenable, Nessus 5 Jan. [Online]
-
Tenable, "Nessus 5, " Jan. 2013. [Online]. Available: http://www.tenable. com/products/nessus
-
(2013)
-
-
-
27
-
-
84883392894
-
-
N. V. Database Jan. [Online]
-
N. V. Database, "Common vulnerability scoring system, " Jan. 2013. [Online]. Available: http://nvd.nist.gov/cvss.cfm
-
(2013)
Common Vulnerability Scoring System
-
-
|