메뉴 건너뛰기




Volumn 1, Issue , 2014, Pages

Security framework for cloud manufacturing

Author keywords

Cloud computing; Cloud manufacturing; Cloud security; IAM; Infrastructure security

Indexed keywords

CLOUD MANUFACTURING; CLOUD SECURITIES; IAM; INFRASTRUCTURE SECURITY; SECURITY FRAMEWORKS;

EID: 84908884244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1115/MSEC2014-4082     Document Type: Conference Paper
Times cited : (9)

References (23)
  • 3
    • 84866264657 scopus 로고    scopus 로고
    • Typical characteristics, technologies and applications of cloud manufacturing
    • Li, B.H., Zhang, L., Ren, L., Chai, X., & et al, 2012. "Typical characteristics, technologies and applications of cloud manufacturing". Computer Integrated Manufacturing Systems CIMS, 2012,18(7):1345-1356.
    • (2012) Computer Integrated Manufacturing Systems CIMS, 2012 , vol.18 , Issue.7 , pp. 1345-1356
    • Li, B.H.1    Zhang, L.2    Ren, L.3    Chai, X.4
  • 5
    • 84892430418 scopus 로고    scopus 로고
    • Cloud manufacturing: A new manufacturing paradigm
    • online published
    • Zhang, L., Luo., Y., Tao, F., Ren, L.,& et al,2012. "Cloud manufacturing: a new manufacturing paradigm". Enterprise Information Systems (online published. DOI: 10.1080/17517575.2012.683812).
    • (2012) Enterprise Information Systems
    • Zhang, L.1    Luo, Y.2    Tao, F.3    Ren, L.4
  • 7
    • 84890279748 scopus 로고    scopus 로고
    • Cloud manufacturing platform: Operating paradigm, functional requirements, and architecture design
    • Ren L, Zhang L, Zhao C, Chai X. Cloud manufacturing platform: operating paradigm, functional requirements, and architecture design. ASME MSEC 2013.
    • ASME MSEC 2013
    • Ren, L.1    Zhang, L.2    Zhao, C.3    Chai, X.4
  • 10
    • 84860905667 scopus 로고    scopus 로고
    • A methodology toward virtualization-based high performance simulation platform supporting multidisciplinary design of complex products
    • Ren L, Zhang L, Tao F, Zhang X, Luo Y, ZhangY. A methodology toward virtualization-based high performance simulation platform supporting multidisciplinary design of complex products. Enterprise Information Systems 2012; 6(3): 267-290.
    • (2012) Enterprise Information Systems , vol.6 , Issue.3 , pp. 267-290
    • Ren, L.1    Zhang, L.2    Tao, F.3    Zhang, X.4    Luo, Y.5    Zhang, Y.6
  • 11
    • 84871341075 scopus 로고    scopus 로고
    • Key issues in cloud simulation platform based on cloud computing
    • Rome, Italy
    • Ren, L., et al., 2011. Key issues in cloud simulation platform based on cloud computing. In: Proceedings of the 23th European Modeling & Simulation Symposium, Rome, Italy, 502-507.
    • (2011) Proceedings of the 23th European Modeling & Simulation Symposium , pp. 502-507
    • Ren, L.1
  • 13
    • 78049416058 scopus 로고    scopus 로고
    • Gartner: Seven cloud-computing security risks. Data integrity, recovery, privacy and regulatory compliance are key issues to consider
    • July 02
    • Jon Brodkin, Gartner: Seven cloud-computing security risks. Data integrity, recovery, privacy and regulatory compliance are key issues to consider, Network World, July 02, 2008.
    • (2008) Network World
    • Brodkin, J.1
  • 19
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Jul.,2010
    • S. Subashini, and V. Kavitha. (2010) "A survey on security issues in service delivery models of cloud computing." J Network Comput Appl doi:10.1016/j.jnca.2010.07.006. Jul.,2010.
    • (2010) J Network Comput Appl
    • Subashini, S.1    Kavitha, V.2
  • 22
  • 23
    • 78049416058 scopus 로고    scopus 로고
    • [Mar. 13, 2009]
    • J. Brodkin. "Gartner: Seven cloud-computing security risks." Infoworld, Available: 〈http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurity-risks-853?page=0,1〉 [Mar. 13, 2009] .
    • Gartner: Seven Cloud-computing Security Risks
    • Brodkin, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.