메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1-45

Security and privacy issues in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

INTEROPERABILITY;

EID: 84902383043     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-4514-1.ch001     Document Type: Chapter
Times cited : (87)

References (112)
  • 1
    • 84945168954 scopus 로고    scopus 로고
    • (n.d.). Homepage. Retrieved from
    • Alliance for Telecommunications Industry Solutions. (n.d.). Homepage. Retrieved from http://www.atis.org
  • 2
    • 84945168955 scopus 로고    scopus 로고
    • Retrieved from
    • Amazon S3 Availability Event. (2008). Retrieved from http://status.aws.amazon.com/s3-20080720.html
    • (2008)
  • 3
    • 84945168956 scopus 로고    scopus 로고
    • Retrieved from
    • AOL Apologizes for Release of User Search Data. (2006). Retrieved from news.cnet.com/2010-1030_3-6102793.html
    • (2006)
  • 4
    • 84938917813 scopus 로고    scopus 로고
    • Above the clouds: A Berkeley view of cloud computing (Technical Report No. UCB/ EECS-2009-28)
    • Berkeley, CA: University of California at Berkeley. Retrieved from
    • Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., &Konwinsky, A.,Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing (Technical Report No. UCB/ EECS-2009-28). Berkeley, CA: University of California at Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
    • (2009)
    • Armbrust, M.1    Fox, A.2    Griffith, R.3    Joseph, A.D.4    Katz, R.H.5    Konwinsky A.Zaharia, M.6
  • 5
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Association for Retail Technology Standards (ARTS). (n.d.). Homepage. Retrieved from http://www.nrf-arts.org
    • Homepage
  • 6
    • 79960751022 scopus 로고    scopus 로고
    • Draft cloud computing synopsis and recommendations (Special Publication 800-146)
    • US Department of Commerce. Retrieved from
    • Badger, L., Grance, T., Patt-Corner, R., &Voas, J. (2011). Draft cloud computing synopsis and recommendations (Special Publication 800-146). National Institute of Standards and Technology (NIST). US Department of Commerce. Retrieved from http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf
    • (2011) National Institute of Standards and Technology (NIST)
    • Badger, L.1    Grance, T.2    Patt-Corner, R.3    Voas, J.4
  • 10
    • 79955145101 scopus 로고    scopus 로고
    • Cloud computing: Privacy, security challenges
    • Washington, DC: Bureau of National Affairs
    • Bruening, P. J., &Treacy, B. C. (2009). Cloud computing: Privacy, security challenges. Washington, DC: Bureau of National Affairs.
    • (2009)
    • Bruening, P.J.1    Treacy, B.C.2
  • 11
    • 78249290665 scopus 로고    scopus 로고
    • Information security briefing on cloud computing
    • 01/2010. Retrieved from
    • Center for the Protection of Natural Infrastructure (CPNI). (2010). Information security briefing on cloud computing, 01/2010. Retrieved from http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
    • (2010)
  • 12
    • 77954327465 scopus 로고    scopus 로고
    • What's new about cloud computing security
    • (Technical Report UCB/EECS-2010-5). Berkeley, CA: EECS Department, University of California, Berkeley. Retrieved from
    • Chen, Y., Paxson, V., &Katz, R. H. (2010). What's new about cloud computing security? (Technical Report UCB/EECS-2010-5). Berkeley, CA: EECS Department, University of California, Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
    • (2010)
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 14
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: Outsourcing computation without outsourcing control
    • Chicago, IL: ACM Press. Cloud Security Alliance. (n.d.). Homepage. Retrieved from
    • Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., &Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09), (pp. 85-90). Chicago, IL: ACM Press. Cloud Security Alliance. (n.d.). Homepage. Retrieved from https://cloudsecurityalliance.org
    • (2009) Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09) , pp. 85-90
    • Chow, R.1    Golle, P.2    Jakobsson, M.3    Shi, E.4    Staddon, J.5    Masuoka, R.6    Molina, J.7
  • 15
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • Retrieved from
    • Cloud Security Alliance (CSA). (2009). Security guidance for critical areas of focus in cloud computing. CSA. Retrieved from https://cloudsecurityalliance.org/csaguide.pdf
    • (2009) CSA
  • 16
    • 84945122154 scopus 로고    scopus 로고
    • FTC questions cloud computing security
    • Retrieved from
    • CNet. (2009). FTC questions cloud computing security. Retrieved from http://news.cnet.com/8301-13578_3-10198577-38.html?part=rss&subj=news&tag=2547-1_3-0-20
    • (2009)
  • 17
    • 84872196108 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Cryptographic Key Management Project. (n.d.). Website. Retrieved from http://csrc.nist.gov/ groups/ST/key_mgmt/
    • Website.
  • 18
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Distributed Management Task Force. (n.d.). Homepage. Retrieved from http://www.dmtf.org
    • Homepage
  • 19
    • 84945168959 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Don't Cloud Your Vision. (n.d.). Retrieved from http://www.ft.com/cms/s/0/303680a6-bf51-11ddae63-0000779fd18c.html?nclick_check=1
  • 20
    • 77955959213 scopus 로고    scopus 로고
    • Cloud computing: Benefits, risks and recommendations for information security
    • Geneva, Switzerland: ENISA
    • European Network and Information Security Agency (ENISA). (2009). Cloud computing: Benefits, risks and recommendations for information security. Geneva, Switzerland: ENISA.
    • (2009)
  • 21
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.) . Retrieved from
    • European Telecommunication Standards Institute. (n.d.). Homepage. Retrieved from http://www.etsi.org
    • Homepage
  • 22
    • 84945168960 scopus 로고    scopus 로고
    • Retrieved from
    • Flexiscale Suffers 18-Hour Outage. (2008). Retrieved from http://www.thewhir.com/webhosting-news/flexiscale-suffers-18-hour-outage
    • (2008)
  • 23
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Forum, T. M. (n.d.). Homepage. Retrieved from http://www.tmforum.org
    • Homepage
    • Forum, T.M.1
  • 25
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: A study of disk sanitization practices
    • Garfinkel, S., &Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy, 1(1), 17-27. doi:10.1109/MSECP.2003.1176992.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.1    Shelat, A.2
  • 26
    • 84945124925 scopus 로고    scopus 로고
    • Cloud computing and big data
    • Retrieved from
    • Gartner Hype-Cycle. (2012). Cloud computing and big data. Retrieved from http://www.gartner.com/technology/research/hype-cycles/
    • (2012)
  • 29
    • 84945168961 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • IBM Blue Cloud Initiative Advances Enterprise Cloud Computing. (n.d.). Retrieved from http://www-03.ibm.com/press/us/en/pressrelease/26642.wss
  • 30
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Institute of Electrical and Electronics Engineers (IEEE). (n.d.). Homepage. Retrieved from http://www.ieee.org
    • Homepage
  • 31
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved form
    • International Telecommunication Union - Telecommunication Standardization Sector (ITU-T). (n.d.). Homepage. Retrieved form http://www.itu.int/ITU-T
    • Homepage
  • 32
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Internet Engineering Task Force. (n.d.). Homepage. Retrieved from http://www.ietf.org
    • Homepage
  • 33
    • 11044223672 scopus 로고    scopus 로고
    • Access control language for multidomain environments
    • Joshi, J. B. D., Bhatti, R., Bertino, E., &Ghafoor, A. (2004). Access control language for multidomain environments. IEEE Internet Computing, 8(6), 40-50. doi:10.1109/MIC.2004.53.
    • (2004) IEEE Internet Computing , vol.8 , Issue.6 , pp. 40-50
    • Joshi, J.B.D.1    Bhatti, R.2    Bertino, E.3    Ghafoor, A.4
  • 35
    • 84945168962 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Latest Cloud Storage Hiccups Prompts Data Security Questions. (n.d.). Retrieved from http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130682&source=NLT_PM
  • 36
    • 59849089966 scopus 로고    scopus 로고
    • Is cloud computing really ready for prime time?
    • Leavitt, N. (2009). Is cloud computing really ready for prime time? IEEE Computer, 42(1), 15-20. doi:10.1109/MC.2009.20.
    • (2009) IEEE Computer , vol.42 , Issue.1 , pp. 15-20
    • Leavitt, N.1
  • 37
    • 84945168963 scopus 로고    scopus 로고
    • Akamai and cloud computing: A perspective from the edge of the cloud (White Paper)
    • Retrieved from
    • Leighon, T. (2009). Akamai and cloud computing: A perspective from the edge of the cloud (White Paper). Akamai Technologies. Retrieved from http://www.essextec.com/assets/cloud/akamai/cloud-computing-perspective-wp.pdf
    • (2009) Akamai Technologies
    • Leighon, T.1
  • 38
    • 84945168964 scopus 로고    scopus 로고
    • Lessons from Twitter's security breach
    • Retrieved from
    • Lowensohn, J., &McCarthy, C. (2009). Lessons from Twitter's security breach. Retrieved from http://news.cnet.com/8301-17939_109-10287558-2.html
    • (2009)
    • Lowensohn, J.1    McCarthy, C.2
  • 39
    • 84857150602 scopus 로고    scopus 로고
    • Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud
    • Retrieved from
    • Molnar, D., &Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Proceedings of the Workshop on the Economics of Information Security. Retrieved from http://weis2010.econinfosec.org/papers/session5/weis2010_schechter.pdf
    • (2010) Proceedings of the Workshop on the Economics of Information Security
    • Molnar, D.1    Schechter, S.2
  • 40
    • 84945168965 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Netflix Prize. (n.d.). Retrieved from http://www.netflixprize.com/
  • 41
    • 77953615126 scopus 로고    scopus 로고
    • Loss of customer data spurs closure of online storage service the linkup
    • Retrieved from
    • Network World. (2008). Loss of customer data spurs closure of online storage service the linkup. Retrieved from http://www.networkworld.com/news/2008/081108-linkup-failure.html?page=1
    • (2008)
  • 42
    • 84945124056 scopus 로고    scopus 로고
    • Facebook users suffer viral surge
    • Retrieved from
    • News, B. B. C. (2009). Facebook users suffer viral surge. Retrieved from http://news.bbc.co.uk/2/hi/technology/7918839.stm
    • (2009)
    • News, B.B.C.1
  • 43
    • 84945168966 scopus 로고    scopus 로고
    • (n.d.). Homepage. Retrieved from
    • Object Management Group. (n.d.). Homepage. Retrieved from http://www.omg.org
  • 44
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Open Cloud Computing Interface. (n.d.). Homepage. Retrieved from http://occi-wg.org
    • Homepage
  • 45
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Open Cloud Consortium. (n.d.). Homepage. Retrieved from http://opencloudconsortium.org
    • Homepage
  • 46
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Organization for the Advancement of Structured Information Standards. (n.d.). Homepage. Retrieved from http://www.oasis-open.org
    • Homepage
  • 47
    • 84945133055 scopus 로고    scopus 로고
    • Lithuania weathers cyber attack, braces for round 2
    • Retrieved from
    • Post, W. (2008). Lithuania weathers cyber attack, braces for round 2. Retrieved from http://blog.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html
    • (2008)
    • Post, W.1
  • 49
    • 84945126552 scopus 로고    scopus 로고
    • Vulnerability in virtual PC and virtual server could allow elevation of privilege (937986)
    • MS07-049, Retrieved from
    • Security Bulletin, M. MS07-049. (2007). Vulnerability in virtual PC and virtual server could allow elevation of privilege (937986). Retrieved from http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx
    • (2007)
    • Security Bulletin, M.1
  • 50
    • 84945168967 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Security Evaluation of Grid Environments. (n.d.). Retrieved from http://www.slideworld.com/slideshows.aspx/Security-Evaluation-of-Grid-Environments-ppt-217556
  • 54
    • 84886248505 scopus 로고    scopus 로고
    • A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network
    • Sen, J. (2010d). A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network. International Journal of Network Security and its Applications, 2(4), 92-104.
    • (2010) International Journal of Network Security and its Applications , vol.2 , Issue.4 , pp. 92-104
    • Sen, J.1
  • 57
    • 85138406381 scopus 로고    scopus 로고
    • Reputation- and trust-based systems for wireless self-organizing networks
    • Boca Raton, FL: CRC Press
    • Sen, J. (2010g). Reputation- and trust-based systems for wireless self-organizing networks. In Security of Self-Organizing Networks: MANET, WSN, WMN, VANET (pp. 91-122). Boca Raton, FL: CRC Press. doi:10.1201/EBK1439819197-7.
    • (2010) Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , pp. 91-122
    • Sen, J.1
  • 58
    • 84887904351 scopus 로고    scopus 로고
    • A robust mechanism for defending distributed denial of service attacks on web servers
    • Sen, J. (2011a). A robust mechanism for defending distributed denial of service attacks on web servers. International Journal of Network Security and its Applications, 3(2), 162-179.
    • (2011) International Journal of Network Security and its Applications , vol.3 , Issue.2 , pp. 162-179
    • Sen, J.1
  • 69
    • 84875548700 scopus 로고    scopus 로고
    • Preventive directions for insider threat mitigation using access control
    • Stolfo, S., Bellovin, S. M., Hershkop, S., Keromytis, A. D., Sinclair, S., &Smith, W. (Eds.), London: Springer
    • Sinclair, S., &Smith, S. W. (2008). Preventive directions for insider threat mitigation using access control. In Stolfo, S., Bellovin, S. M., Hershkop, S., Keromytis, A. D., Sinclair, S., &Smith, W. (Eds.), Insider Attack and Cyber Security: Beyond the Hacker. London: Springer. doi:10.1007/978- 0-387-77322-3_10.
    • (2008) Insider Attack and Cyber Security: Beyond the Hacker
    • Sinclair, S.1    Smith, S.W.2
  • 71
    • 84878557064 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Storage Networking Industry Association. (n.d.). Homepage. Retrieved from http://www.snia.org
    • Homepage
  • 72
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J. B. D., &Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 8(6), 24-31. doi:10.1109/MSP.2010.186.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 73
    • 84945168969 scopus 로고    scopus 로고
    • VMWare shared folder bug lets local users on the guest OS gain elevated privileges on the host OS
    • (n.d.), Security Tracker ID: 1019493. Retrieved from
    • Tracker, S. (n.d.). VMWare shared folder bug lets local users on the guest OS gain elevated privileges on the host OS. Security Tracker ID: 1019493. Retrieved from http://securitytracker.com/id/1019493
    • Tracker, S.1
  • 74
    • 84864868892 scopus 로고    scopus 로고
    • Cloud computing and security- A natural match
    • Retrieved from
    • Trusted Computing Group (TCG). (2010). Cloud computing and security- A natural match. Retrieved from http://www.trustedcomputinggroup.org
    • (2010)
  • 75
    • 84945133016 scopus 로고    scopus 로고
    • Extended gmail outage hits apps admins
    • Retrieved from
    • World, C. (2008). Extended gmail outage hits apps admins. Retrieved from http://www.computerworld.com/s/article/9117322/Extended_Gmail_outage_hits_Apps_admins
    • (2008)
    • World, C.1
  • 76
    • 84945117955 scopus 로고    scopus 로고
    • Salesforce.com warns customers of phishing scam
    • Retrieved from
    • World, P. C. (2007). Salesforce.com warns customers of phishing scam. Retrieved from http://www.pcworld.com/businesscenter/article/139353/article.html
    • (2007)
    • World, P.C.1
  • 77
    • 84945168970 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Xen Vulnerability. (n.d.). Retrieved from http://secunia.com/advisories/26986/
  • 78
    • 84945168971 scopus 로고    scopus 로고
    • Google hackers targeted source code of more than 30 companies
    • Retrieved from
    • Zetter, K. (2010). Google hackers targeted source code of more than 30 companies. Wired Threat Level. Retrieved from http://www.wired.com/threatlevel/2010/01/google-hack-attack/
    • (2010) Wired Threat Level
    • Zetter, K.1
  • 79
    • 78650039216 scopus 로고    scopus 로고
    • Access control and trust management for emerging multidomain environments
    • Upadhyay, S., &Rao, R. O. (Eds.), Dublin, Ireland: Emerald Group Publishing
    • Zhang, Y., &Joshi, J. (2009). Access control and trust management for emerging multidomain environments. In Upadhyay, S., &Rao, R. O. (Eds.), Annals of Emerging Research in Information Assurance, Security and Privacy Services (pp. 421-452). Dublin, Ireland: Emerald Group Publishing.
    • (2009) Annals of Emerging Research in Information Assurance, Security and Privacy Services , pp. 421-452
    • Zhang, Y.1    Joshi, J.2
  • 80
    • 33847739288 scopus 로고    scopus 로고
    • Xen and the art of virtualization (Technical Report)
    • Cambridge, UK: University of Cambridge. Retrieved from
    • Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., &Ho, A. Warfield, A. (2003). Xen and the art of virtualization (Technical Report). Cambridge, UK: University of Cambridge. Retrieved from www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf
    • (2003)
    • Barham, P.1    Dragovic, B.2    Fraser, K.3    Hand, S.4    Harris, T.5    Ho, A.6    Warfield, A.7
  • 84
    • 73549093886 scopus 로고    scopus 로고
    • Privacy in the clouds: A white paper on privacy and digital identity: Implications for the internet
    • Retrieved from
    • Cavoukian, A. (2008). Privacy in the clouds: A white paper on privacy and digital identity: Implications for the internet. Retrieved from http://www.ipc.on.ca/images/resources/privacyintheclouds.pdf
    • (2008)
    • Cavoukian, A.1
  • 85
    • 70449467093 scopus 로고    scopus 로고
    • Introducing the azure services platform
    • Retrieved from
    • Chappel, D. (2008). Introducing the azure services platform. Retrieved from http://download.microsoft.com
    • (2008)
    • Chappel, D.1
  • 86
    • 49949097790 scopus 로고    scopus 로고
    • Multitenant data architecture
    • Retrieved from
    • Chong, F., Carraro, G., &Wolter, R. (2006). Multitenant data architecture. Retrieved from http://msdn.microsoft.com/en-us/library/aa479086.aspx
    • (2006)
    • Chong, F.1    Carraro, G.2    Wolter, R.3
  • 89
    • 77950329698 scopus 로고    scopus 로고
    • Tutorial for understanding the relationship between cloud computing and SaaS
    • Stamford, CT: Gartner
    • Desisto, R. P., Plummer, D. C., &Smith, D. M. (2008). Tutorial for understanding the relationship between cloud computing and SaaS. Stamford, CT: Gartner.
    • (2008)
    • Desisto, R.P.1    Plummer, D.C.2    Smith, D.M.3
  • 91
    • 67649425263 scopus 로고    scopus 로고
    • Cloud computing- A question of trust
    • Computer Fraud &Security
    • Everett, C. (2009). Cloud computing- A question of trust. Computer Fraud &Security, (6): 5-7. doi:10.1016/S1361-3723(09)70071-5.
    • (2009) , Issue.6 , pp. 5-7
    • Everett, C.1
  • 92
    • 77950567715 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • Retrieved from
    • Gellman, R. (2009). Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum (WPF) Report. Retrieved from http://www.worldprivacyforum.org/cloudprivacy.html
    • (2009) World Privacy Forum (WPF) Report
    • Gellman, R.1
  • 93
    • 84879877373 scopus 로고    scopus 로고
    • Capex vs. opex: Most people miss the point about cloud economics
    • Retrieved from
    • Golden, B. (2009). Capex vs. opex: Most people miss the point about cloud economics. Retrieved from http://www.cio.com/article/484429/Capex_vs._Opex_Most_People_Miss_the_point_About_Cloud_Economic
    • (2009)
    • Golden, B.1
  • 94
    • 84945168973 scopus 로고    scopus 로고
    • Hosted informatics: Bringing cloud computing down to earth with bottom-line benefits for pharma
    • Heritage, T. (2009). Hosted informatics: Bringing cloud computing down to earth with bottom-line benefits for pharma. Next Generation Pharmaceutical, (17).
    • (2009) Next Generation Pharmaceutical , Issue.17
    • Heritage, T.1
  • 96
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security &Privacy, 7(4), 61-64. doi:10.1109/MSP.2009.87.
    • (2009) IEEE Security &Privacy , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 97
    • 84945415321 scopus 로고    scopus 로고
    • Gartner on cloud security: Our nightmare scenario is here now
    • Messmer, E. (2009). Gartner on cloud security: Our nightmare scenario is here now. Network World Retrieved from http://www.networkworld.com/news/2009/102109-gartner-cloud-security.html
    • (2009) Network World Retrieved from
    • Messmer, E.1
  • 98
    • 84945168975 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • Open Cloud Manifesto. (n.d.). Retrieved from http://www.opencloudmanifesto.org/Open%20Cloud%20Manifesto.pdf
  • 101
    • 82955188460 scopus 로고    scopus 로고
    • Design and implementation of a xen-based execution environment
    • (Diploma Thesis). Technische Universitat Kaiserslautern, Kaiserslautern, Germany.
    • Petry, A. (2007). Design and implementation of a xen-based execution environment. (Diploma Thesis). Technische Universitat Kaiserslautern, Kaiserslautern, Germany.
    • (2007)
    • Petry, A.1
  • 102
    • 56649115709 scopus 로고    scopus 로고
    • The paradox of security in virtual environments
    • Price, M. (2008). The paradox of security in virtual environments. IEEE Computer, 41(11), 22-38. doi:10.1109/MC.2008.472.
    • (2008) IEEE Computer , vol.41 , Issue.11 , pp. 22-38
    • Price, M.1
  • 103
    • 84945168976 scopus 로고    scopus 로고
    • RightScale cloud management features
    • Retrieved from
    • RightScale Inc. (2009). RightScale cloud management features. Retrieved from http://www.rightscale.com/products/cloud-management.php
    • (2009)
  • 105
    • 84880184742 scopus 로고    scopus 로고
    • Above the clouds: From grids to service-oriented operating systems
    • Tselentis, G. et al. (Eds.), Amsterdam: IOS Press
    • Schubert, L., Kipp, A., &Wesner, S. (2009). Above the clouds: From grids to service-oriented operating systems. In Tselentis, G. et al. (Eds.), Towards the Future Internet- A European Research Perspective (pp. 238-249). Amsterdam: IOS Press.
    • (2009) Towards the Future Internet- A European Research Perspective , pp. 238-249
    • Schubert, L.1    Kipp, A.2    Wesner, S.3
  • 106
    • 84894636287 scopus 로고    scopus 로고
    • IBM blue cloud initiative advances enterprise cloud computing
    • Retrieved from
    • Sims, K. (2009). IBM blue cloud initiative advances enterprise cloud computing. Retrieved from http://www-03.ibm.com/press/us/en/pressrelease/26642.wss
    • (2009)
    • Sims, K.1
  • 107
    • 70349456218 scopus 로고    scopus 로고
    • Virtual infrastructure management in private and hybrid cloud
    • Sotomayor, B., Montero, R. S., Llorente, I. M., &Foster, I. (2009). Virtual infrastructure management in private and hybrid cloud. IEEE Internet Computing, 13(5), 14-22. doi:10.1109/ MIC.2009.119.
    • (2009) IEEE Internet Computing , vol.13 , Issue.5 , pp. 14-22
    • Sotomayor, B.1    Montero, R.S.2    Llorente, I.M.3    Foster, I.4
  • 108
    • 84945138070 scopus 로고    scopus 로고
    • Cloud computing security: Making virtual machines cloud ready
    • Retrieved from
    • Tech Republic. (2013). Cloud computing security: Making virtual machines cloud ready. Retrieved from http://www.techrepublic.com/whitepapers/cloud-computing-security-making-virtual-machines-cloud-ready/1728295
    • (2013)
  • 112
    • 84944099971 scopus 로고    scopus 로고
    • Zimory distributed cloud - Whitepaper
    • Retrieved from
    • Zimory Gmb, H. (2009). Zimory distributed cloud - Whitepaper. Retrieved from http://www.zimory.de/index.php?eID=tx_nawsecuredl&u=0&file=fileadmin/user_upload/pdf/Distributed_Clouds_Whitepaper.pdf&t=1359027268&hash=93c5f42f8c91817a746f7b8cff55fbdc68ae7379
    • (2009)
    • Zimory Gmb, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.