-
1
-
-
78649290366
-
The nist definition of cloud computing versiong 15 technical report
-
Mell, P; Grance, T. The NIST Definition of cloud computing Versiong 15 Technical Report. Computer and Information Sci-ences. 53(6), pp. 1-10. 2009.
-
(2009)
Computer and Information Sci-ences.
, vol.53
, Issue.6
, pp. 1-10
-
-
Mell, P.1
Grance, T.2
-
2
-
-
68649100902
-
A break in the clouds: Toward a cloud definition
-
Vaquero, L., Rodero-Merino, L., Caceres, J, & Lindner, M. (2009). A break in the clouds: Toward a cloud definition. ACM SIGCOMM Computer Communication Review, 39, 50-55.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 50-55
-
-
Vaquero, L.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
3
-
-
84892733308
-
Useful information for cloud adopters
-
Lee Badger, Robert Bohn, Shilong Chu, Mike Hogan, Fang Liu, Viktor Kaufmann, Jian. Useful Information for Cloud Adopters. NIST Cloud Computing Program, 2(1), pp. 1-73, 2011.
-
(2011)
NIST Cloud Computing Program
, vol.2
, Issue.1
, pp. 1-73
-
-
Badger, L.1
Bohn, R.2
Chu, S.3
Hogan, M.4
Liu, F.5
Jian, V.K.6
-
4
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for de-livering IT Services as computing utilities
-
Buyya, R., Yeo, C. S. and Venugopal, S. (2008), Market-oriented cloud computing: Vision, hype, and reality for de-livering IT Services as computing utilities, Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, pp. 5-13
-
(2008)
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
5
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya, R., Yeo, C., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25, 599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
6
-
-
76649142802
-
Its written in the cloud: The hype and promise of cloud computing
-
Sharif, A. M. (2010), Its written in the cloud: The hype and promise of cloud computing, Journal of Enterprise Information Management, Vol. 23 No. 2, pp. 131-4.
-
(2010)
Journal of Enterprise Information Management
, vol.23
, Issue.2
, pp. 131-134
-
-
Sharif, A.M.1
-
7
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
Foster, I., Zhao, Y., Raicu, I., Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In Proceedings grid computing environments workshop: GCE 2008 (pp. 1-10
-
(2008)
Proceedings Grid Computing Environments Workshop: GCE 2008
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
9
-
-
69349098776
-
Cloud computing and the common man
-
Viega J (2009) Cloud computing and the common man, Com-puter 42(8):106-08.
-
(2009)
Com-puter
, vol.42
, Issue.8
, pp. 106-108
-
-
Viega, J.1
-
11
-
-
84856514139
-
Two factor authentication for cloud computing
-
S. Lee, I. Ong, H. T. Lim, H. J. Lee, Two factor authentication for cloud computing, International Journal of KIMICS, vol 8, Pp. 427-432-33
-
International Journal of KIMICS
, vol.8
, pp. 427-433
-
-
Lee, S.1
Ong, I.2
Lim, H.T.3
Lee, H.J.4
-
13
-
-
1242265154
-
Whitman in defense of the realm: Understanding the threats to information security
-
Michael E. Whitman In defense of the realm: Understanding the threats to information security International Journal of Information Management 24 (2004) 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 43-57
-
-
Michael, E.1
-
15
-
-
78649334744
-
Security guidance for critical areas of focus in cloud computing
-
Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. (2009) Security guidance for critical areas of focus in cloud computing, Cloud Security Alliance 25:1-177.
-
(2009)
Cloud Security Alliance
, vol.25
, pp. 1-177
-
-
Seccombe, A.1
Hutton, A.2
Meisel, A.3
Windel, A.4
Mohammed, A.5
Licciardi, A.6
-
17
-
-
84976834054
-
Authen-Ticationin distributed systems: Theory and practice
-
B. Lampson, Abadi, M., Burrows, M., Wobber, E., "Authen-Ticationin Distributed Systems: Theory and Practice, " ACM Transactions Computer Systems, vol. 10, pp. 265-310, 1992.
-
(1992)
ACM Transactions Computer Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication, " Communications of the ACM, vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
19
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C. Lin, Hwang, T., "A password authentication scheme with secure password updating, " Computers & Security, vol. 22, pp. 68-72, 2003.
-
(2003)
Computers & Security
, vol.22
, pp. 68-72
-
-
Lin, C.1
Hwang, T.2
-
20
-
-
0033704170
-
Methods for protecting password transmission
-
M. Peyravian, Zunic, N., "Methods for Protecting Password Transmission, " Computers & Security, vol. 19, pp. 466-469, 2000.
-
(2000)
Computers & Security
, vol.19
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
21
-
-
0033704170
-
-
Computers & Security
-
[M. Peyravian, Zunic, N., "Methods for Protecting Password Transmission, " Computers & Security, vol. 19, pp. 466-469, 2000.
-
(2000)
Methods for Protecting Password Transmission
, vol.19
, pp. 466-469
-
-
Peyravian, M.1
Zunic, N.2
-
22
-
-
12444270608
-
Strong user authentication
-
Daniel Mouly (2002): Strong User Authentication, Informa-Tion Systems Security, 11:2, 47-53.
-
(2002)
Informa-Tion Systems Security
, vol.11
, Issue.2
, pp. 47-53
-
-
Mouly, D.1
-
23
-
-
0034140374
-
A new remote user authen-Tication scheme using smart cards
-
M. S. Hwang, and L. H. Li, "A New Remote User Authen-Tication Scheme using Smart Cards", IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
24
-
-
0036302680
-
-
H. Y. Chien, J. K. Jan, Y. M. Tseng, An efficient and prac-Tical solution to remote authentication: Smart card, Comput. Secur. 21 (4) (2002) 372-375.
-
(2002)
An Efficient and Prac-Tical Solution to Remote Authentication: Smart Card Comput. Secur.
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
25
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, A password authentication scheme over insecure networks, J. Comput. System Sci. 72 (4) (2006) 727-740.
-
(2006)
J. Comput. System Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
26
-
-
4043072876
-
Efficient remote user au-Thentication scheme based on generalized ElGamal signature scheme
-
E. J. Yoon, E. K. Ryu, K. Y. Yoo, Efficient remote user au-Thentication scheme based on generalized ElGamal signature scheme, IEEE Trans. Consum. Electron. 50 (2) 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, pp. 2
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
27
-
-
33744828520
-
New authentication scheme based on a one-way hash function and Diffie Hellman key exchange
-
LNCS, Springer- Verlag
-
E. J. Yoon, K. Y. Yoo, New authentication scheme based on a one-way hash function and DiffieHellman key exchange, 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS vol. 3810, Springer-Verlag, pp. 147-160.
-
(2005)
4th International Conference of Cryptology and Network Security, CANS
, vol.3810
, pp. 147-160
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
28
-
-
84947904235
-
-
Proc. EUROCRYPT 96, in: LNCS., Springer-Verlag
-
V. Shoup, A. Rubin, Session key distribution using smart-cards, in: Proc. EUROCRYPT 96, in: LNCS., vol 1070, Springer-Verlag, 1996, pp 321-333.
-
(1996)
Session Key Distribution Using Smart-cards
, vol.1070
, pp. 321-333
-
-
Shoup, V.1
Rubin, A.2
-
29
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, A password authentication scheme over insecure networks, J. Comput. System Sci. 72 (4) (2006) 727-740.
-
(2006)
J. Comput. System Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
30
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang, D. S. Wong, H. Wang, X. Deng, Two-factor mutual authentication based on smart cards and passwords, Journal of Computer and System Sciences, vol 74, 2008, Pp. 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
|