-
1
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and Cloud Computing: InterCloud Identity Management Infrastructure", In 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010, pp. 263-265.
-
(2010)
19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
2
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities" IEEE Security & Privacy, Vol. 9, 2011, pp. 50-57.
-
(2011)
IEEE Security & Privacy
, vol.9
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
3
-
-
84894149309
-
Trusting the cloud
-
C. Cachin, I. Keider, and A. Shraer, "Trusting The Cloud", IBM Research, Zurich Research laboratory, 2009.
-
(2009)
IBM Research, Zurich Research Laboratory
-
-
Cachin, C.1
Keider, I.2
Shraer, A.3
-
4
-
-
84894212214
-
-
Cloud Security Alliance, Cloud Audit, Available from: https://cloudsecurityalliance.org/research/cloudaudit/
-
Cloud Audit
-
-
-
5
-
-
84878890730
-
-
Cloud Security Alliance, Cloud Controls Matrix, Available from: https://cloudsecurityalliance.org/research/ccm/
-
Cloud Controls Matrix
-
-
-
7
-
-
84894172176
-
-
COBIT, http://wwwisaca.org
-
COBIT
-
-
-
8
-
-
84894109265
-
-
CUMULUS project, http://www.cumulus-project.eu/
-
-
-
-
10
-
-
85055232535
-
Using the common criteria for IT security evaluation
-
D. S. Herrmann, "Using the Common Criteria for IT security evaluation", Auerbach Publications, 2002.
-
(2002)
Auerbach Publications
-
-
Herrmann, D.S.1
-
12
-
-
78650558794
-
Secure virtualization for cloud computing
-
July
-
F Lombardi and R. Di Pietro, "Secure virtualization for cloud computing", J. Netw. Comput. Appl. 34, 4, July 2011, pp. 1113-1122.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
13
-
-
84885931616
-
Incident detection for cloud environments
-
F. Doelitzscher, C. Reich, M. H. Knahl, and N. L. Clarke, "Incident detection for cloud environments", Proc. of the Third International Conference on Emerging Network Intelligence, 2011, pp. 100-105.
-
(2011)
Proc. of the Third International Conference on Emerging Network Intelligence
, pp. 100-105
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.H.3
Clarke, N.L.4
-
14
-
-
84926426274
-
An agent based business aware incident detection system for cloud environments
-
F. Doelitzscher, C. Reich, M. Knahl, A. Passfall, and N. Clarke, "An agent based business aware incident detection system for cloud environments", Journal of Cloud Computing: Advances, Systems and Applications Vol. 1:9, 2012.
-
(2012)
Journal of Cloud Computing: Advances, Systems and Applications
, vol.1
, Issue.9
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Passfall, A.4
Clarke, N.5
-
15
-
-
84882736228
-
The SERENITY runtime monitoring framework
-
Springer
-
G. Spanoudakis, C. Kloukinas, and K. Mahbub, "The SERENITY Runtime Monitoring Framework", In Security and Dependability for Ambient Intelligence, Springer, 2009, pp. 213-238.
-
(2009)
Security and Dependability for Ambient Intelligence
, pp. 213-238
-
-
Spanoudakis, G.1
Kloukinas, C.2
Mahbub, K.3
-
17
-
-
84894209248
-
Identity-based cryptography for cloud security
-
H. Li, Y. Dai, and B. Yang, "Identity-Based Cryptography for Cloud Security", IACR Cryptology ePrint Archive, 2011, pp. 169-169.
-
(2011)
IACR Cryptology EPrint Archive
, pp. 169-169
-
-
Li, H.1
Dai, Y.2
Yang, B.3
-
20
-
-
84867360144
-
Translation of SLAs into monitoring specifications
-
R. Yahyapour, P. Weider (Eds), Springer-verlag
-
K. Mahbub, G. Spanoudakis, and T. Tsigkritis, "Translation of SLAs into Monitoring Specifications", In Service Level Agreements for Cloud Computing, R. Yahyapour, P. Weider (Eds), Springer-verlag, 2011.
-
(2011)
Service Level Agreements for Cloud Computing
-
-
Mahbub, K.1
Spanoudakis, G.2
Tsigkritis, T.3
-
22
-
-
78649499377
-
ASSERT4SOA: Toward security certification of service-oriented applications
-
M. Anisetti et al., "ASSERT4SOA: Toward Security Certification of Service-Oriented Applications", OTM 2010 Woekshops, 2010, pp. 38-40.
-
(2010)
OTM 2010 Woekshops
, pp. 38-40
-
-
Anisetti, M.1
-
24
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing", In Proc. of the IEEE International Conference on Cloud Computing, 2009, pp. 109-116.
-
(2009)
Proc. of the IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
25
-
-
3342966061
-
The ganglia distributed monitoring system: Design, implementation, and experience
-
M. L. Massie, B. N. Chun, and D. E. Culler, "The ganglia distributed monitoring system: design, implementation, and experience", Parallel Computing, Vol. 30, 2004, pp. 817-840.
-
(2004)
Parallel Computing
, vol.30
, pp. 817-840
-
-
Massie, M.L.1
Chun, B.N.2
Culler, D.E.3
-
26
-
-
84963504867
-
-
[retrieved: June, 2013]
-
Microsoft, The Economics of Cloud for the EU Public Sector, Paper, 2010:http://www.microsoft.eu/Portals/0/Document/EU-Public-Sector-Cloud- Economics-A4.pdf [retrieved: June, 2013].
-
(2010)
The Economics of Cloud for the EU Public Sector, Paper
-
-
-
27
-
-
84894219290
-
-
Nagios, 2011. http://www.nagios.org/
-
(2011)
-
-
-
29
-
-
84894117999
-
-
Ovum, http://www.computing.co.uk/ctg/news/2113323/ovum-public-cloud- services-market-explode
-
Ovum
-
-
-
32
-
-
84870821959
-
DeSVi: An architecture for detecting SLA violations in cloud computing infrastructures
-
V. C. Emeakaroha, R.N. Calheiros, M.A.S. Netto, I. Brandic, and C.A.F. De Rose, "DeSVi: An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures" 2nd International ICST Conference on Cloud Computing, 2010.
-
(2010)
2nd International ICST Conference on Cloud Computing
-
-
Emeakaroha, V.C.1
Calheiros, R.N.2
Netto, M.A.S.3
Brandic, I.4
De Rose, C.A.F.5
|