메뉴 건너뛰기




Volumn , Issue , 2013, Pages 72-80

Incremental certification of cloud services

Author keywords

Cloud services; Continuous monitoring; Security certification

Indexed keywords


EID: 84894222450     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (32)
  • 4
    • 84894212214 scopus 로고    scopus 로고
    • Cloud Security Alliance, Cloud Audit, Available from: https://cloudsecurityalliance.org/research/cloudaudit/
    • Cloud Audit
  • 5
    • 84878890730 scopus 로고    scopus 로고
    • Cloud Security Alliance, Cloud Controls Matrix, Available from: https://cloudsecurityalliance.org/research/ccm/
    • Cloud Controls Matrix
  • 7
    • 84894172176 scopus 로고    scopus 로고
    • COBIT, http://wwwisaca.org
    • COBIT
  • 8
    • 84894109265 scopus 로고    scopus 로고
    • CUMULUS project, http://www.cumulus-project.eu/
  • 10
    • 85055232535 scopus 로고    scopus 로고
    • Using the common criteria for IT security evaluation
    • D. S. Herrmann, "Using the Common Criteria for IT security evaluation", Auerbach Publications, 2002.
    • (2002) Auerbach Publications
    • Herrmann, D.S.1
  • 12
    • 78650558794 scopus 로고    scopus 로고
    • Secure virtualization for cloud computing
    • July
    • F Lombardi and R. Di Pietro, "Secure virtualization for cloud computing", J. Netw. Comput. Appl. 34, 4, July 2011, pp. 1113-1122.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1113-1122
    • Lombardi, F.1    Di Pietro, R.2
  • 17
    • 84894209248 scopus 로고    scopus 로고
    • Identity-based cryptography for cloud security
    • H. Li, Y. Dai, and B. Yang, "Identity-Based Cryptography for Cloud Security", IACR Cryptology ePrint Archive, 2011, pp. 169-169.
    • (2011) IACR Cryptology EPrint Archive , pp. 169-169
    • Li, H.1    Dai, Y.2    Yang, B.3
  • 18
    • 71749105371 scopus 로고    scopus 로고
    • Assessing the security risks of cloud computing
    • June
    • J. Heiser and M. Nicolett, "Assessing the Security Risks of Cloud Computing", Gartner technical report, June 2008.
    • (2008) Gartner Technical Report
    • Heiser, J.1    Nicolett, M.2
  • 22
    • 78649499377 scopus 로고    scopus 로고
    • ASSERT4SOA: Toward security certification of service-oriented applications
    • M. Anisetti et al., "ASSERT4SOA: Toward Security Certification of Service-Oriented Applications", OTM 2010 Woekshops, 2010, pp. 38-40.
    • (2010) OTM 2010 Woekshops , pp. 38-40
    • Anisetti, M.1
  • 25
    • 3342966061 scopus 로고    scopus 로고
    • The ganglia distributed monitoring system: Design, implementation, and experience
    • M. L. Massie, B. N. Chun, and D. E. Culler, "The ganglia distributed monitoring system: design, implementation, and experience", Parallel Computing, Vol. 30, 2004, pp. 817-840.
    • (2004) Parallel Computing , vol.30 , pp. 817-840
    • Massie, M.L.1    Chun, B.N.2    Culler, D.E.3
  • 26
    • 84963504867 scopus 로고    scopus 로고
    • [retrieved: June, 2013]
    • Microsoft, The Economics of Cloud for the EU Public Sector, Paper, 2010:http://www.microsoft.eu/Portals/0/Document/EU-Public-Sector-Cloud- Economics-A4.pdf [retrieved: June, 2013].
    • (2010) The Economics of Cloud for the EU Public Sector, Paper
  • 27
    • 84894219290 scopus 로고    scopus 로고
    • Nagios, 2011. http://www.nagios.org/
    • (2011)
  • 29
    • 84894117999 scopus 로고    scopus 로고
    • Ovum, http://www.computing.co.uk/ctg/news/2113323/ovum-public-cloud- services-market-explode
    • Ovum


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.