메뉴 건너뛰기




Volumn , Issue , 2014, Pages 344-351

Multi-tenancy in cloud computing

Author keywords

Attack Models; Cloud Computing; Cloud Data; Multi Tenancy; Security

Indexed keywords

INFORMATION TECHNOLOGY; SYSTEMS ENGINEERING;

EID: 84903642496     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SOSE.2014.50     Document Type: Conference Paper
Times cited : (87)

References (41)
  • 4
    • 84858158707 scopus 로고    scopus 로고
    • A Survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Md. Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi, A Survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, Future Generation Computer Systems (2012).
    • (2012) Future Generation Computer Systems
    • Tanzim Khorshed, Md.1    Shawkat Ali, A.B.M.2    Wasimi, S.A.3
  • 10
    • 84880884217 scopus 로고    scopus 로고
    • Internet cloud security: The illusion of inclusion
    • David Teneyuca, Internet cloud security: the illusion of inclusion, SciVerse ScienceDirect (2011).
    • (2011) SciVerse ScienceDirect
    • Teneyuca, D.1
  • 23
    • 57549096898 scopus 로고    scopus 로고
    • Danger in the clouds
    • Dec
    • S. Mansfielddevine, "Danger in the clouds, " Network Security, vol. 2008, no. 12, pp. 9-11, Dec. 2008.
    • (2008) Network Security , vol.2008 , Issue.12 , pp. 9-11
    • Mansfielddevine, S.1
  • 31
    • 78049340512 scopus 로고    scopus 로고
    • IT Auditing to assure a secure cloud computing
    • Jul.
    • Z. Chen and J. Yoon, "IT Auditing to Assure a Secure Cloud Computing, " 2010 6th World Congress on Services, pp. 252-259, Jul. 2010.
    • (2010) 2010 6th World Congress on Services , pp. 252-259
    • Chen, Z.1    Yoon, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.