메뉴 건너뛰기




Volumn , Issue , 2013, Pages 119-124

Management issues with cloud computing

Author keywords

Authorize; Cloud computing; Issues; Management; Organizations; Standardize

Indexed keywords

DIGITAL STORAGE; MANAGEMENT; SOCIETIES AND INSTITUTIONS;

EID: 84899549369     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2556871.2556899     Document Type: Conference Paper
Times cited : (20)

References (22)
  • 2
    • 84857370722 scopus 로고    scopus 로고
    • Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing
    • A. Beloglazov, J. Abawajy and R. Buyya, "Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing," Future Generation Computer Systems, vol. 28, no. 1, p. 755-768, 2012.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.1 , pp. 755-768
    • Beloglazov, A.1    Abawajy, J.2    Buyya, R.3
  • 5
    • 84857373304 scopus 로고    scopus 로고
    • Commentary : Cloud computinge A security problem or solution?
    • P. G. Dorey and A. Leite, "Commentary : Cloud computinge A security problem or solution?," Information Security Technical Report, vol. 16, no. 1, pp. 89-96, 2011.
    • (2011) Information Security Technical Report , vol.16 , Issue.1 , pp. 89-96
    • Dorey, P.G.1    Leite, A.2
  • 7
    • 79960910839 scopus 로고    scopus 로고
    • Knowing the past to understand the present-issues in the contracting for cloud based services
    • A. Joint and E. Baker, "Knowing the past to understand the present-issues in the contracting for cloud based services," Computer Law and Security Review, vol. 27, no. 1, pp. 4 0 7-4 1 5, 2011.
    • (2011) Computer Law and Security Review , vol.27 , Issue.1 , pp. 407-415
    • Joint, A.1    Baker, E.2
  • 9
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • T. M. Khorshed, S. A. Ali and S. A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer Systems, vol. 28, no. 1, pp. 833-851, 2012.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.1 , pp. 833-851
    • Khorshed, T.M.1    Ali, S.A.2    Wasimi, S.A.3
  • 10
    • 84899525851 scopus 로고    scopus 로고
    • Cloud computing as an innovation: Percepetion, attitude, and adoption
    • A. Lin and N.-C. Chen, "Cloud computing as an innovation: Percepetion, attitude, and adoption," International Journal of Information Management, vol. 1142, no. 1, pp. 1-8, 2012.
    • (2012) International Journal of Information Management , vol.1142 , Issue.1 , pp. 1-8
    • Lin, A.1    Chen, N.-C.2
  • 12
    • 80052802736 scopus 로고    scopus 로고
    • Cost-benefit analysis of an sla mapping approach for defining standardized cloud computing goods
    • M. Maurer, V. C. Emeakaroha, I. Brandic and J. Altmann, "Cost-benefit analysis of an SLA mapping approach for defining standardized Cloud computing goods," Future Generation Computer Systems, vol. 28, no. 1, pp. 39-47, 2012.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.1 , pp. 39-47
    • Maurer, M.1    Emeakaroha, V.C.2    Brandic, I.3    Altmann, J.4
  • 13
    • 78651374724 scopus 로고    scopus 로고
    • Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding return on investment
    • S. C. Misra and A. Mondal, "Identification of a company's suitability for the adoption of cloud computing and modelling its corresponding Return on Investment," Mathematical and Computer Modelling, vol. 53, no. 1, pp. 504-521, 2011.
    • (2011) Mathematical and Computer Modelling , vol.53 , Issue.1 , pp. 504-521
    • Misra, S.C.1    Mondal, A.2
  • 14
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • S. Paquette, P. T. Jaeger and S. C. Wilson, "Identifying the security risks associated with governmental use of cloud computing," Government Information Quarterly, vol. 27, no. 1, pp. 245-253, 2010.
    • (2010) Government Information Quarterly , vol.27 , Issue.1 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 15
    • 84899520641 scopus 로고    scopus 로고
    • Entrepreneurial and ethical adoption behaviour of cloud computing
    • V. Ratten, "Entrepreneurial and ethical adoption behaviour of cloud computing," Journal of High Technology Management Research, vol. 1, no. 1, pp. 1-11, 2012.
    • (2012) Journal of High Technology Management Research , vol.1 , Issue.1 , pp. 1-11
    • Ratten, V.1
  • 16
    • 81455143616 scopus 로고    scopus 로고
    • Who can you trust in the cloud? A review of security issues within cloud computing
    • Kennesaw, October
    • J. C. Roberts II and W. Al-Hamdani, "Who Can You Trust in the Cloud? A Review of Security Issues Within Cloud Computing," in Information Security Curriculum Development Conference, Kennesaw, October 7-9, 2011.
    • (2011) Information Security Curriculum Development Conference , pp. 7-9
    • Roberts II, J.C.1    Al-Hamdani, W.2
  • 17
    • 84857359528 scopus 로고    scopus 로고
    • Internet cloud security: The illusion of inclusion
    • D. Teneyuca, "Internet cloud security: The illusion of inclusion," Information Security Technical Report, vol. 16, no. 1, pp. 102-107, 2011.
    • (2011) Information Security Technical Report , vol.16 , Issue.1 , pp. 102-107
    • Teneyuca, D.1
  • 18
    • 84865755126 scopus 로고    scopus 로고
    • An adaptive model-free resource and power management approach for multi-tier cloud environments
    • X. Wang, Z. Du and Y. Chen, "An adaptive model-free resource and power management approach for multi-tier cloud environments," The Journal of Systems and Software, vol. 85, no. 2, pp. 1135-1146, 2012.
    • (2012) The Journal of Systems and Software , vol.85 , Issue.2 , pp. 1135-1146
    • Wang, X.1    Du, Z.2    Chen, Y.3
  • 19
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 1, pp. 583-592, 2012.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.1 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.