-
1
-
-
84930617541
-
-
IDC, Framingham, MA, USA, Rep., Mar.
-
S. K. Crook, C. J. Kolodgy, S. Hudson, and S. D. Drake, "Worldwide mobile security 2011-2015 forecast and analysis," IDC, Framingham, MA, USA, Rep., Mar. 2011.
-
(2011)
Worldwide Mobile Security 2011-2015 Forecast and Analysis
-
-
Crook, S.K.1
Kolodgy, C.J.2
Hudson, S.3
Drake, S.D.4
-
2
-
-
84930656957
-
-
Guardian, London, U.K., 2011. [Online]. Available
-
C. Arthur, "Half of UK population owns a smartphone," in Guardian, London, U.K., 2011. [Online]. Available: http://www.guardian.co.uk/technology/2011/oct/31/half-uk-population-owns-smartphone
-
Half of UK Population Owns A Smartphone
-
-
Arthur, C.1
-
3
-
-
78349299500
-
The management of security in cloud computing
-
Aug.
-
S. Ramgovind, M. M. Eloff, and E. Smith, "The management of security in cloud computing," in Proc. ISSA, Aug. 2010, pp. 1-7.
-
(2010)
Proc. ISSA
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
4
-
-
84930650728
-
-
IDC, Framingham, MA, USA, Rep., Jan. [Online]. Available
-
C. Liebert and M. Posey, "Security highlights from the 2010 U.S. WAN manager survey," IDC, Framingham, MA, USA, Rep., Jan. 2011. [Online]. Available: http://www.idc.com/research/viewdocsynopsis.jsp?containerId=226221§ionId= null&elementId=null&pageType=SYNOPSIS.
-
(2011)
Security Highlights from the 2010 U.S. WAN Manager Survey
-
-
Liebert, C.1
Posey, M.2
-
5
-
-
77949842100
-
-
Sebastopol, CA, USA: O'Reilly Media
-
T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and PrivacyVAn Enterprise Perspective on Risks and Compliance. Sebastopol, CA, USA: O'Reilly Media, 2009.
-
(2009)
Cloud Security and PrivacyVAn Enterprise Perspective on Risks and Compliance
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
6
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
Sec., New York, NY, USA
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not (just) virtualization security: A short paper," in Proc. ACM Workshop Cloud Comput. Sec., New York, NY, USA, 2009, pp. 97-102.
-
(2009)
Proc. ACM Workshop Cloud Comput.
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
7
-
-
74049112206
-
Cloud security issues
-
Bangalore, India
-
B. R. Kandukuri, R. Paturi V, and A. Rakshit, "Cloud security issues," in Proc. IEEE Int. Conf. Services Comput., Bangalore, India, 2009, pp. 517-520.
-
(2009)
Proc. IEEE Int. Conf. Services Comput.
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturi, R.V.2
Rakshit, A.3
-
8
-
-
77958569832
-
An ontology for managing a virtual environment for risk prevention
-
L. Edward, K. Amokrane, D. Lourdeaux, and J. Barthes, "An ontology for managing a virtual environment for risk prevention," in Proc. 1st Int. Conf. Integr. Intell. Comput., 2010, pp. 62-67.
-
(2010)
Proc. 1st Int. Conf. Integr. Intell. Comput.
, pp. 62-67
-
-
Edward, L.1
Amokrane, K.2
Lourdeaux, D.3
Barthes, J.4
-
9
-
-
84930616099
-
A cloud you can trust: How to ensure that cloud computing's problemsVData breaches, leaks, service outagesVDon't obscure its virtues
-
Dec. IEEE
-
C. Cachin and M. Schunter, "A cloud you can trust: How to ensure that cloud computing's problemsVData breaches, leaks, service outagesVDon't obscure its virtues," in Proc. ICITST, Dec. 2001, pp. 214-219, IEEE.
-
(2001)
Proc. ICITST
, pp. 214-219
-
-
Cachin, C.1
Schunter, M.2
-
10
-
-
79958738559
-
Risk-based security testing in cloud computing environments
-
Verification Validation, Berlin, Germany, Mar. 21-25
-
P. Zech, "Risk-based security testing in cloud computing environments," in Proc. 4th IEEE Int. Conf. Softw. Testing, Verification Validation, Berlin, Germany, Mar. 21-25, 2011, pp. 411-414.
-
(2011)
Proc. 4th IEEE Int. Conf. Softw. Testing
, pp. 411-414
-
-
Zech, P.1
-
11
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
CCS, Chicago, IL, USA, Nov. 9-13
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. ACM Conf. CCS, Chicago, IL, USA, Nov. 9-13, 2009, pp. 199-212.
-
(2009)
Proc. ACM Conf.
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
41549130598
-
The Delphi method for graduate research
-
G. J. Skulmoski, F. T. Hartman, and J. Krahn, "The Delphi method for graduate research," J. Inf. Technol. Educ., vol. 6, no. 1, pp. 1-21, 2007.
-
(2007)
J. Inf. Technol. Educ.
, vol.6
, Issue.1
, pp. 1-21
-
-
Skulmoski, G.J.1
Hartman, F.T.2
Krahn, J.3
-
13
-
-
4544264774
-
The Delphi method as a research tool: An example design considerations and applications
-
Dec.
-
C. Okoli and S. D. Pawlowski, "The Delphi method as a research tool: An example design considerations and applications," Inf. Manage., vol. 42, no. 1, pp. 15-29, Dec. 2004.
-
(2004)
Inf. Manage.
, vol.42
, Issue.1
, pp. 15-29
-
-
Okoli, C.1
Pawlowski, S.D.2
-
14
-
-
84930650923
-
-
IBM, Armonk, NY, USA, Rep., Sep. [Online]. Available
-
D. Morton, "IBM mainframe operating systems: Timeline and brief explanation for the IBM system/360 and beyond," IBM, Armonk, NY, USA, Rep., Sep. 2011. [Online]. Available: http://www.demorton.com/Tech/##OSTL.pdf.
-
(2011)
IBM Mainframe Operating Systems: Timeline and Brief Explanation for the IBM system/360 and beyond
-
-
Morton, D.1
-
15
-
-
84882585604
-
-
Gartner, Stamford, CT, USA, Rep. No. G00210732, Mar. 4
-
T. J. Bittman and L. Leong, "Virtual machines will slow in the enterprise, grow in the cloud," Gartner, Stamford, CT, USA, Rep. No. G00210732, Mar. 4, 2011.
-
(2011)
Virtual Machines Will Slow in the Enterprise, Grow in the Cloud
-
-
Bittman, T.J.1
Leong, L.2
-
16
-
-
84930635654
-
IT hardware: Does a move to large public clouds and data centers hurt or help server OEMs?
-
London, U.K., Rep., Apr. 6
-
E. C. G. T. Sacconaghi and M. R. Shah, "IT hardware: Does a move to large public clouds and data centers hurt or help server OEMs?" Bernstein Res., London, U.K., Rep., Apr. 6, 2011.
-
(2011)
Bernstein Res.
-
-
Sacconaghi, E.C.G.T.1
Shah, M.R.2
-
17
-
-
84930641075
-
-
Cloud News Daily, Accessed Dec. 14, 2011. [Online]. Available
-
Richard, "Amazon says AWS outage was a FRe-mirroring Storm," in Cloud News Daily, Accessed Dec. 14, 2011. [Online]. Available: http://cloudnewsdaily.com/2011/04/amazon-saysaws-outage-was-a-re-mirroring-storm/
-
Amazon Says AWS Outage Was A FRe-mirroring Storm
-
-
Richard1
-
18
-
-
78149332397
-
ETSI CLOUDVInitial standardization requirements for cloud services
-
K. Oberle and M. Fisher, "ETSI CLOUDVInitial standardization requirements for cloud services," in Proc. GECON, 2010, pp. 105-115.
-
(2010)
Proc. GECON
, pp. 105-115
-
-
Oberle, K.1
Fisher, M.2
-
19
-
-
78649895484
-
On the standardization of a testing framework for application deployment on grid and cloud infrastructures
-
T. Rings, J. Grabowski, and S. Schulz, "On the standardization of a testing framework for application deployment on grid and cloud infrastructures," in Proc. Adv. Syst. Testing VALID Lifecycle Conf., 2010, pp. 99-107.
-
(2010)
Proc. Adv. Syst. Testing VALID Lifecycle Conf.
, pp. 99-107
-
-
Rings, T.1
Grabowski, J.2
Schulz, S.3
-
20
-
-
84930657672
-
-
Gartner, Stamford, CT, USA, Rep. No. G00210845, Mar. 3
-
T. J. Bittman, "The road map from virtualization to cloud computing," Gartner, Stamford, CT, USA, Rep. No. G00210845, Mar. 3, 2011.
-
(2011)
The Road Map from Virtualization to Cloud Computing
-
-
Bittman, T.J.1
-
21
-
-
77956580783
-
Cloud computing security management
-
Sharjah, United Arab Emirates
-
S. A. Almulla and C. Y. Yeun, "Cloud computing security management," in Proc. ICESMA, Sharjah, United Arab Emirates, 2010, pp. 1-7.
-
(2010)
Proc. ICESMA
, pp. 1-7
-
-
Almulla, S.A.1
Yeun, C.Y.2
-
22
-
-
70449467093
-
-
SQL Services, and Live Services, Oct., Report
-
D. Chappell, Introducing the Azure Services Platform: An Early Look at Windows Azure, .Net Services, SQL Services, and Live Services, Oct. 2008, Report.
-
(2008)
Introducing the Azure Services Platform: An Early Look at Windows Azure, .Net Services
-
-
Chappell, D.1
-
24
-
-
84947200665
-
Failure trends in a large disk drive population
-
E. Pinheiro, W. Weber, and L. A. Barroso, "Failure trends in a large disk drive population," in Proc. 5th USENIX Conf. FAST, 2007, p. 2.
-
(2007)
Proc. 5th USENIX Conf. FAST
, pp. 2
-
-
Pinheiro, E.1
Weber, W.2
Barroso, L.A.3
-
25
-
-
84930638473
-
Pulp google hackingVThe next generation search engine hacking arsenal
-
NV, USA,. [Online]. Available
-
F. Brown and R. Ragan, "Pulp google hackingVThe next generation search engine hacking arsenal," in Proc. Black Hat, Las Vegas, NV, USA, 2011, pp. 1-70. [Online]. Available: https://media.blackhat.com/bh-us-11/Brown/BH-US-11-BrownRagan-Pulp-Google.pdf.
-
(2011)
Proc. Black Hat, Las Vegas
, pp. 1-70
-
-
Brown, F.1
Ragan, R.2
-
26
-
-
84874373544
-
-
Accessed Jan. 11, 2009. [Online]. Available
-
J. Browne, Brewer's CAP Theorem, Accessed Jan. 11, 2009. [Online]. Available: http://www.julianbrowne.com/article/viewer/brewers-cap-theorem
-
Brewer's CAP Theorem
-
-
Browne, J.1
-
28
-
-
21644437974
-
The google file system
-
Principles, Lake George, NY, USA, Oct. 19-22
-
S. Ghemawat, H. Gobioff, and S. Leung, "The google file system," in Proc. Symp. Oper. Syst. Principles, Lake George, NY, USA, Oct. 19-22, 2003, pp. 29-43.
-
(2003)
Proc. Symp. Oper. Syst.
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.3
-
29
-
-
84861495191
-
-
VMware, Palo Alto, CA, USA, May, Report
-
VMware vSphere 4.0-Security Hardening Guide, VMware, Palo Alto, CA, USA, May 2010, pp. 1-70, Report.
-
(2010)
VMware VSphere 4.0-Security Hardening Guide
, pp. 1-70
-
-
-
30
-
-
0037252945
-
Amazon.com recommendations: Item-to-item collaborative filtering
-
Jan./Feb.
-
B. S. G. Linden and J. York, "Amazon.com recommendations: Item-to-item collaborative filtering," IEEE Internet Comput., vol. 7, no. 1, pp. 76-80, Jan./Feb. 2003.
-
(2003)
IEEE Internet Comput.
, vol.7
, Issue.1
, pp. 76-80
-
-
Linden, B.S.G.1
York, J.2
-
31
-
-
84927613938
-
-
Upper Saddle River, NJ, USA: IBM Press
-
M. Azua, The Social Factor : Innovate, Ignite, and Win through Mass Collaboration And Social Networking. Upper Saddle River, NJ, USA: IBM Press, 2009.
-
(2009)
The Social Factor : Innovate, Ignite, and Win Through Mass Collaboration and Social Networking
-
-
Azua, M.1
-
32
-
-
84930616613
-
Next generation scalable and efficient data protection
-
Forum,. [Online]. Available
-
S. Siewert and G. Scott, "Next Generation Scalable and Efficient Data Protection," in Proc. Intel Develop. Forum, 2011, pp. 1-30. [Online]. Available: http://ecee.colorado.edu/~siewerts/SF11-STOS004-101F.pdf.
-
(2011)
Proc. Intel Develop
, pp. 1-30
-
-
Siewert, S.1
Scott, G.2
-
33
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Jan. 1
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1-11, Jan. 1, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
34
-
-
85084160707
-
Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?
-
San Jose, CA, USA
-
B. Schroeder and G. A. Gibson, "Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?" in Proc. 5th USENIX Conf. FAST, San Jose, CA, USA, 2007, pp. 1-16.
-
(2007)
Proc. 5th USENIX Conf. FAST
, pp. 1-16
-
-
Schroeder, B.1
Gibson, G.A.2
|