메뉴 건너뛰기




Volumn 48, Issue 1, 2015, Pages

From security to assurance in the cloud: A survey

Author keywords

Assurance; Cloud computing; Security; Survey; Transparency

Indexed keywords

CLOUD COMPUTING; SURVEYING; SURVEYS; TRANSPARENCY;

EID: 84938346780     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2767005     Document Type: Review
Times cited : (136)

References (310)
  • 2
    • 84938399371 scopus 로고    scopus 로고
    • Advanced Security Service cERTificate for SOA.. Retrieved from
    • Advanced Security Service cERTificate for SOA. 2010. Advanced Security Service cERTificate for SOA. Retrieved from http://assert4soa.eu/.
    • (2010) Advanced Security Service CERTificate for SOA
  • 3
    • 84897070785 scopus 로고    scopus 로고
    • An overview of issues and recent developments in cloud computing and storage security
    • B.-Y. Choi, K. Han, and S. Song (Eds.). Springer
    • E. Aguiar, Y. Zhang, and M. Blanton. 2013. An overview of issues and recent developments in cloud computing and storage security. In High Performance Semantic Cloud Auditing, B.-Y. Choi, K. Han, and S. Song (Eds.). Springer.
    • (2013) High Performance Semantic Cloud Auditing
    • Aguiar, E.1    Zhang, Y.2    Blanton, M.3
  • 4
    • 84938410822 scopus 로고    scopus 로고
    • SECRESO: A secure storage model for cloud data based on reed-solomon code
    • July
    • M. Ahmed, Q. H. Vu, R. Asal, H. Al Muhairi, and C. Y. Yeun. July 2012. SECRESO: A secure storage model for cloud data based on reed-solomon code. In Proc. of AIM 2012.
    • (2012) Proc. of AIM 2012
    • Ahmed, M.1    Vu, Q.H.2    Asal, R.3    Al Muhairi, H.4    Yeun, C.Y.5
  • 5
    • 84938349406 scopus 로고    scopus 로고
    • An analysis of the cloud computing security problem
    • November-December
    • M. Al Morsy, J. Grundy, and I.Müller. November-December 2010. An analysis of the cloud computing security problem. In Proc. of APSEC-CLOUD 2010.
    • (2010) Proc. of APSEC-CLOUD 2010
    • Al Morsy, M.1    Grundy, J.2    Müller, I.3
  • 7
    • 77956580783 scopus 로고    scopus 로고
    • Cloud computing security management
    • March-April. Sharjah, UAE
    • S. A. Almulla and C. Y. Yeun. March-April 2010. Cloud computing security management. In Proc. of ICESMA 2010. Sharjah, UAE.
    • (2010) Proc. of ICESMA 2010
    • Almulla, S.A.1    Yeun, C.Y.2
  • 9
    • 84938364863 scopus 로고    scopus 로고
    • Aniketos, ASSERT4SOA, CUMULUS, SecCord. Retrieved from
    • Aniketos, ASSERT4SOA, CUMULUS, SecCord. 2013. Specifications identification & gap analysis Use cases 43, 78, 80. Retrieved from http://csc.etsi.org/Application/documentapp/downloadimmediate/?docId=123.
    • (2013) Specifications Identification & Gap Analysis Use Cases 43, 78, 80
  • 10
  • 11
    • 84891823464 scopus 로고    scopus 로고
    • Security certification of composite services: A test-based approach
    • June-July
    • M. Anisetti, C. A. Ardagna, and E. Damiani. June-July 2013a. Security certification of composite services: A test-based approach. In Proc. of IEEE ICWS 2013.
    • (2013) Proc. of IEEE ICWS 2013
    • Anisetti, M.1    Ardagna, C.A.2    Damiani, E.3
  • 13
    • 84879910325 scopus 로고    scopus 로고
    • A test-based security certification scheme for web services
    • (May 2013)
    • M. Anisetti, C. A. Ardagna, E. Damiani, and F. Saonara. 2013b. A test-based security certification scheme for web services. ACM TWEB 7, 2 (May 2013), 1-41.
    • (2013) ACM TWEB , vol.7 , Issue.2 , pp. 1-41
    • Anisetti, M.1    Ardagna, C.A.2    Damiani, E.3    Saonar, F.4
  • 14
    • 84901455703 scopus 로고    scopus 로고
    • On the management of cloud nonfunctional properties: The cloud transparency toolkit
    • March-April
    • C. A. Ardagna, R. Asal, E. Damiani, and Q. H. Vu. March-April 2014. On the management of cloud nonfunctional properties: The cloud transparency toolkit. In Proc. of IFIP NTMS 2014.
    • (2014) Proc. of IFIP NTMS 2014
    • Ardagna, C.A.1    Asal, R.2    Damiani, E.3    Vu, Q.H.4
  • 18
    • 84899712053 scopus 로고    scopus 로고
    • NIST Special Publication 500-299. Retrieved from
    • W. W. Armour et al. 2013. NIST Cloud Computing Security Reference Architecture. NIST Special Publication 500-299. Retrieved from http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST-Security-Reference-Architecture-2013.05.15-v1.0.pdf.
    • (2013) NIST Cloud Computing Security Reference Architecture
    • Armour, W.W.1
  • 19
    • 84938410811 scopus 로고    scopus 로고
    • Sharing-based privacy and availability of cloud data warehouses
    • September
    • V. Attasena, N. Harbi, and J. Darmont. September 2013. Sharing-based privacy and availability of cloud data warehouses. In Proc. of EDA 2013.
    • (2013) Proc. of EDA 2013
    • Attasena, V.1    Harbi, N.2    Darmont, J.3
  • 24
    • 84887308413 scopus 로고    scopus 로고
    • Security and availability techniques for cloud-based applications
    • (October 2013)
    • G. Ballabio. 2013. Security and availability techniques for cloud-based applications. Computer Fraud & Security 2013, 10 (October 2013), 5-7.
    • (2013) Computer Fraud & Security , vol.2013 , Issue.10 , pp. 5-7
    • Ballabio, G.1
  • 25
    • 33750060523 scopus 로고    scopus 로고
    • Dynamo: Dynamic monitoring of WS-BPEL processes
    • December
    • L. Baresi and S. Guinea. December 2005. Dynamo: Dynamic monitoring of WS-BPEL processes. In Proc. of ICSOC 2005.
    • (2005) Proc. of ICSOC 2005
    • Baresi, L.1    Guinea, S.2
  • 26
    • 84887982439 scopus 로고    scopus 로고
    • Enabling dynamic data and indirect mutual trust for cloud computing storage systems
    • (December 2013)
    • A. Barsoum and A. Hasan. 2013. Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE TPDS 24, 12 (December 2013), 2375-2385.
    • (2013) IEEE TPDS , vol.24 , Issue.12 , pp. 2375-2385
    • Barsoum, A.1    Hasan, A.2
  • 27
    • 84938413685 scopus 로고    scopus 로고
    • A distributed and privacy-preservingmethod for network intrusion detection
    • October 2010
    • F. Benali, N. Bennani, G. Gianini, and S. Cimato. October 2010. A distributed and privacy-preservingmethod for network intrusion detection. In Proc. of OTM 2010.
    • (2010) Proc. of OTM
    • Benali, F.1    Bennani, N.2    Gianini, G.3    Cimato, S.4
  • 28
    • 84938397472 scopus 로고    scopus 로고
    • Toward cloud-based key management for outsourced databases
    • July
    • N. Bennani, E. Damiani, and S. Cimato. July 2010. Toward cloud-based key management for outsourced databases. In Proc. of SAPSE 2010.
    • (2010) Proc. of SAPSE 2010
    • Bennani, N.1    Damiani, E.2    Cimato, S.3
  • 32
    • 80053148327 scopus 로고    scopus 로고
    • Certicloud: A novel TPM-based approach to ensure cloud IaaS security
    • July
    • B. Bertholon, S. Varrette, and P. Bouvry. July 2011. Certicloud: A novel TPM-based approach to ensure cloud IaaS security. In Proc. of IEEE CLOUD 2011.
    • (2011) Proc. of IEEE CLOUD 2011
    • Bertholon, B.1    Varrette, S.2    Bouvry, P.3
  • 34
    • 41149174088 scopus 로고    scopus 로고
    • Monitoring conversational web services
    • September. Dubrovnik, Croati
    • D. Bianculli and C. Ghezzi. September 2007. Monitoring conversational web services. In Proc. of IW-SOSWE 2007. Dubrovnik, Croatia.
    • (2007) Proc. of IW-SOSWE 2007
    • Bianculli, D.1    Ghezzi, C.2
  • 40
  • 43
    • 0035483245 scopus 로고    scopus 로고
    • Fuzzy service selection in a distributed object-oriented environment
    • 2001
    • P. Bosc, E. Damiani, and M. Fugini. 2001. Fuzzy service selection in a distributed object-oriented environment. IEEE TFS 9, 5 (2001), 682-698.
    • (2001) IEEE TFS , vol.9 , Issue.5 , pp. 682-698
    • Bosc, P.1    Damiani, E.2    Fugini, M.3
  • 45
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • November
    • K. D. Bowers, A. Juels, and A. Oprea. November 2009. HAIL: A high-availability and integrity layer for cloud storage. In Proc. of ACM CCS 2009.
    • (2009) Proc. of ACM CCS 2009
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 46
    • 84879116782 scopus 로고    scopus 로고
    • Risk perception and risk management in cloud computing: Results from a case study of Swiss companies
    • (June 2013)
    • N. Brender and I. Markov. 2013. Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. IJIM 33, 5 (June 2013), 726-733.
    • (2013) IJIM , vol.33 , Issue.5 , pp. 726-733
    • Brender, N.1    Markov, I.2
  • 50
    • 84866670724 scopus 로고    scopus 로고
    • Side-channel attacks
    • H. C. A. van Tilborg and S. Jajodia (Eds.). Springer
    • T. Caddy. 2011. Side-channel attacks. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia (Eds.). Springer.
    • (2011) Encyclopedia of Cryptography and Security
    • Caddy, T.1
  • 52
    • 84925655451 scopus 로고    scopus 로고
    • Merkle trees
    • L. Liu, M. T. Özsu, and M. Tamer (Eds.). Springer
    • B. Carminati. 2009. Merkle trees. In Encyclopedia of Database Systems, L. Liu, M. T. Özsu, and M. Tamer (Eds.). Springer.
    • (2009) Encyclopedia of Database Systems
    • Carminati, B.1
  • 53
    • 84875209774 scopus 로고    scopus 로고
    • Mechanisms for SLA provisioning in cloud-based service providers
    • (February 2013)
    • E. Casalicchio and L. Silvestri. 2013. Mechanisms for SLA provisioning in cloud-based service providers. Computer Networks 57, 3 (February 2013), 795-810.
    • (2013) Computer Networks , vol.57 , Issue.3 , pp. 795-810
    • Casalicchio, E.1    Silvestri, L.2
  • 54
    • 77955959213 scopus 로고    scopus 로고
    • November. European Network and Information Security Agency (ENISA). Retreived from
    • D. Catteddu and G. Hogben. November 2009a. Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency (ENISA). Retreived from http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessm ent/at-download/fullReport.
    • (2009) Cloud Computing: Benefits, Risks and Recommendations for Information Security
    • Catteddu, D.1    Hogben, G.2
  • 57
    • 84938402561 scopus 로고    scopus 로고
    • Certification infrastrUcture forMUlti-layer cloUd Services. Retrieved from
    • Certification infrastrUcture forMUlti-layer cloUd Services 2013. Certification infrastrUcture forMUlti-layer cloUd Services. Retrieved from http://www.cumulus-project.eu/.
    • (2013)
  • 58
    • 84938367514 scopus 로고    scopus 로고
    • Certification InteRnationalisation and standaRdization in cloUd Security, Certification, InteRnationalisation and standaRdization in cloUd Security. Retrieved from
    • Certification, InteRnationalisation and standaRdization in cloUd Security 2012. Certification, InteRnationalisation and standaRdization in cloUd Security. Retrieved from http://www.cirrus-project.eu/.
    • (2012)
  • 61
    • 53349116756 scopus 로고    scopus 로고
    • Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
    • June
    • X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. June 2008. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Proc. of IEEE/IFIP DSN 2008.
    • (2008) Proc. of IEEE/IFIP DSN 2008
    • Chen, X.1    Andersen, J.2    Mao, Z.M.3    Bailey, M.4    Nazario, J.5
  • 62
    • 77954327465 scopus 로고    scopus 로고
    • January, Technical Report No. UCB/EECS-2010-5. Retrieved from
    • Y. Chen, V. Paxson, and R. H. Katz. January 2010. What's New About Cloud Computing Security? Technical Report No. UCB/EECS-2010-5. Retrieved from http://www.eecs.Berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html.
    • (2010) What's New about Cloud Computing Security?
    • Chen, Y.1    Paxson, V.2    Katz, R.H.3
  • 63
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • (July 2011)
    • A. Chonka, Y. Xiang, W. Zhou, and A. Bonti. 2011. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications 34, 4 (July 2011), 1097-1107.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 64
    • 84863238100 scopus 로고    scopus 로고
    • Dynamic secure cloud storage with provenance
    • D. Naccache (Ed.). Springer-Verlag, Berlin
    • S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng. 2012. Dynamic secure cloud storage with provenance. In Cryptography and Security, D. Naccache (Ed.). Springer-Verlag, Berlin, 442-464.
    • (2012) Cryptography and Security , pp. 442-464
    • Chow, S.S.M.1    Chu, C.-K.2    Huang, X.3    Zhou, J.4    Deng, R.H.5
  • 66
    • 84891807562 scopus 로고    scopus 로고
    • Key-aggregate cryptosystem for scalable data sharing in cloud storage
    • (February 2014)
    • C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng. 2014. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE TPDS 25, 2 (February 2014), 468-477.
    • (2014) IEEE TPDS , vol.25 , Issue.2 , pp. 468-477
    • Chu, C.-K.1    Chow, S.S.M.2    Tzeng, W.-G.3    Zhou, J.4    Deng, R.H.5
  • 70
    • 84881791018 scopus 로고    scopus 로고
    • Monitoring service clouds in the future internet
    • G. Tselentis, A. Galis, A. Gavras, S. Krco, V. Lotz, E. Simperl, B. Stiller, and T. Zahariadis (Eds.). IOS Press
    • S. Clayman, A. Galis, C. Chapman, G. Toffetti, L. Rodero-Merino, L. Miguel Vaquero, K. Nagin, and B. Rochwerger. 2010. Monitoring service clouds in the future internet. In Towards the Future Internet, G. Tselentis, A. Galis, A. Gavras, S. Krco, V. Lotz, E. Simperl, B. Stiller, and T. Zahariadis (Eds.). IOS Press, 115-126.
    • (2010) Towards the Future Internet , pp. 115-126
    • Clayman, S.1    Galis, A.2    Chapman, C.3    Toffetti, G.4    Rodero-Merino, L.5    Miguel Vaquero, L.6    Nagin, K.7    Rochwerger, B.8
  • 71
    • 84938313606 scopus 로고    scopus 로고
    • Cloud Accountability Project 2012. Cloud Accountability Project, Retrieved from
    • Cloud Accountability Project 2012. Cloud Accountability Project. Retrieved from http://www.a4cloud.eu/.
  • 72
    • 84868314580 scopus 로고    scopus 로고
    • Cloud Security Alliance. Retrieved from
    • Cloud Security Alliance. 2010. Guidance for Identity & Access Management V2.1. Retrieved from http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf.
    • (2010) Guidance for Identity & Access Management V2.1
  • 74
    • 84886731331 scopus 로고    scopus 로고
    • Cloud Security Alliance
    • Cloud Security Alliance. 2013. The Notorious Nine Cloud Computing Top Threats in 2013. https://downloads.cloudsecurityalliance.org/initiatives/top-threats/The-Notorious-Nine-Cloud-Computing-Top-Threats-in-2013.pdf.
    • (2013) The Notorious Nine Cloud Computing Top Threats in 2013
  • 75
    • 84938355655 scopus 로고    scopus 로고
    • Cloud Security on Demand. Retrieved from
    • Cloud Security on Demand 2012. Cloud Security on Demand. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1218817&HistoricalAwards=false.
    • (2012) Cloud Security on Demand
  • 76
    • 84919771672 scopus 로고    scopus 로고
    • Cloud Standards Customer Council. August. Retrieved from
    • Cloud Standards Customer Council. August 2012. Security for Cloud Computing 10 Steps to Ensure Success. Retrieved from http://www.cloud-council.org/Security-for-Cloud-Computing-Final-080912.pdf.
    • (2012) Security for Cloud Computing 10 Steps to Ensure Success
  • 77
    • 84938359639 scopus 로고    scopus 로고
    • CloudSec. October. Retrieved from
    • CloudSec. October 2013. A Briefing on Cloud Security Challenges and Opportunities. Retrieved from http://www.telenor.com/wp-content/uploads/2013/11/TelenorWhitepaperCloud-V-30-v.pdf.
    • (2013) A Briefing on Cloud Security Challenges and Opportunities
  • 78
    • 84938348671 scopus 로고    scopus 로고
    • Continuous Quality Assurance and Optimisation for Cloud brokers. Retrieved from
    • Continuous Quality Assurance and Optimisation for Cloud brokers 2012. Continuous Quality Assurance and Optimisation for Cloud Brokers. Retrieved from http://www.broker-cloud.eu/.
    • (2012) Continuous Quality Assurance and Optimisation for Cloud Brokers
  • 80
    • 84859433005 scopus 로고    scopus 로고
    • A survey of risks, threats and vulnerabilities in cloud computing
    • April, Amman, Jordan
    • K. Dahbur, B. Mohammad, and A. B. Tarakji. April 2011. A survey of risks, threats and vulnerabilities in cloud computing. In Proc. of ISWSA 2011. Amman, Jordan.
    • (2011) Proc. of ISWSA 2011
    • Dahbur, K.1    Mohammad, B.2    Tarakji, A.B.3
  • 83
    • 77953172125 scopus 로고    scopus 로고
    • Infrastructure as a service security: Challenges and solutions
    • March
    • W. Dawoud, I. Takouna, and C. Meinel. March 2010. Infrastructure as a service security: Challenges and solutions. In Proc. of INFOS 2010.
    • (2010) Proc. of INFOS 2010
    • Dawoud, W.1    Takouna, I.2    Meinel, C.3
  • 85
    • 84929936983 scopus 로고    scopus 로고
    • Selective and fine-grained access to data in the cloud
    • S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer
    • S. De Capitani di Vimercati, S. Foresti, and P. Samarati. 2014. Selective and fine-grained access to data in the cloud. In Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer.
    • (2014) Secure Cloud Computing
    • De Vimercati Di Capitani, S.1    Foresti, S.2    Samarati, P.3
  • 86
    • 84867658730 scopus 로고    scopus 로고
    • December. European Network and Information Security Agency (ENISA). Retrieved from
    • M. Dekker and G. Hogben. December 2011. Survey and analysis of security parameters in cloud SLAs across the European public sector. European Network and Information Security Agency (ENISA). Retrieved from http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysisof-security-parameters-in-cloud-slas-across-the-european-public-sector/at-download/fullReport.
    • (2011) Survey and Analysis of Security Parameters in Cloud SLAs Across the European Public Sector
    • Dekker, M.1    Hogben, G.2
  • 87
    • 84938371432 scopus 로고    scopus 로고
    • Covert channels
    • H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
    • Y. Desmedt. 2011. Covert channels. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
    • (2011) Encyclopedia of Cryptography and Security
    • Desmedt, Y.1
  • 90
    • 84926426274 scopus 로고    scopus 로고
    • An agent based business aware incident detection system for cloud environments
    • F. Doelitzscher, C. Reich, M. Knahl, A. Passfall, and N. Clarke. 2012. An agent based business aware incident detection system for cloud environments. JoCCASA 1, 1 (2012), 1-19.
    • (2012) JoCCASA 2012 , vol.1 , Issue.1 , pp. 1-19
    • Doelitzscher, F.1    Reich, C.2    Knahl, M.3    Passfall, A.4    Clarke, N.5
  • 92
    • 84886902973 scopus 로고    scopus 로고
    • Security assessment of virtual machines in open source clouds
    • May
    • A. Donevski, S. Ristov, and M. Gusev. May 2013. Security assessment of virtual machines in open source clouds. In Proc. of MIPRO 2013.
    • (2013) Proc. of MIPRO 2013
    • Donevski, A.1    Ristov, S.2    Gusev, M.3
  • 93
    • 74549215709 scopus 로고    scopus 로고
    • Run-time verification of behavioural conformance for conversational web services
    • November
    • D. Dranidis, E. Ramollari, and D. Kourtesis. November 2009. Run-time verification of behavioural conformance for conversational web services. In Proc. of IEEE ECOWS 2009.
    • (2009) Proc. of IEEE ECOWS 2009
    • Dranidis, D.1    Ramollari, E.2    Kourtesis, D.3
  • 94
    • 84894493160 scopus 로고    scopus 로고
    • Building resilient cloud services using DDDAS and moving target defence
    • 2013
    • G. Dsouza, G. Rodriguez, Y. Al-Nashif, and S. Hariri. 2013. Building resilient cloud services using DDDAS and moving target defence. JCC 2, 2/3 (2013), 171-190.
    • (2013) JCC , vol.2 , Issue.2-3 , pp. 171-190
    • Dsouza, G.1    Rodriguez, G.2    Al-Nashif, Y.3    Hariri, S.4
  • 97
    • 84905819449 scopus 로고    scopus 로고
    • ETSI. November. Retrieved from
    • ETSI. November 2013. Cloud Standards Coordination - Final Report. Retrieved from http://csc.etsi.org/Application/documentapp/downloadimmediate/?docId=204.
    • (2013) Cloud Standards Coordination - Final Report
  • 101
    • 79959339905 scopus 로고    scopus 로고
    • Advanced service monitoring configurations with SLA decomposition and selection
    • March
    • H. Foster and G. Spanoudakis. March 2011a. Advanced service monitoring configurations with SLA decomposition and selection. In Proc. of ACM SAC 2011.
    • (2011) Proc. of ACM SAC 2011
    • Foster, H.1    Spanoudakis, G.2
  • 102
    • 84938342840 scopus 로고    scopus 로고
    • SMaRT: A workbench for reporting the monitorability of services from SLAs
    • May
    • H. Foster and G. Spanoudakis. May 2011b. SMaRT: A workbench for reporting the monitorability of services from SLAs. In Proc. of PESOS 2011.
    • (2011) Proc. of PESOS 2011
    • Foster, H.1    Spanoudakis, G.2
  • 103
    • 84938409843 scopus 로고    scopus 로고
    • Ganglia. Homepage. Retrieved from
    • Ganglia. 2014. Homepage. Retrieved from http://ganglia.sourceforge.net/.
    • (2014)
  • 104
    • 84857307012 scopus 로고    scopus 로고
    • Cloud testing-issues, challenges, needs and practice
    • (September 2011)
    • J. Gao, X. Bai, andW.-T. Tsai. 2011. Cloud testing-issues, challenges, needs and practice. SeiJ 1, 1 (September 2011).
    • (2011) SeiJ , vol.1 , pp. 1
    • Gao, J.1    Bai, X.2    Tsai, W.-T.3
  • 105
  • 106
    • 84865048353 scopus 로고    scopus 로고
    • A framework for ranking of cloud computing services
    • (June 2013)
    • S. K. Garg, S. Versteeg, and R. Buyya. 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems 29, 4 (June 2013), 1012-1023.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.4 , pp. 1012-1023
    • Garg, S.K.1    Versteeg, S.2    Buyya, R.3
  • 107
    • 84889904798 scopus 로고    scopus 로고
    • German Federal Office for Information Security. August
    • German Federal Office for Information Security. August 2012. Security Recommendations for Cloud Computing Providers. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Minimum-informa tion/SecurityRecommendationsCloudComputingProviders.pdf?-blob=publicationFile.
    • (2012) Security Recommendations for Cloud Computing Providers
  • 109
    • 84889855905 scopus 로고    scopus 로고
    • Run-time monitoring in service-oriented architectures
    • L. Baresi and E. Di Nitto (Eds.). Springer, Berlin
    • C. Ghezzi and S. Guinea. 2007. Run-time monitoring in service-oriented architectures. In Test and Analysis of Web Services, L. Baresi and E. Di Nitto (Eds.). Springer, Berlin, 237-264.
    • (2007) Test and Analysis of Web Services , pp. 237-264
    • Ghezzi, C.1    Guinea, S.2
  • 110
    • 84897712723 scopus 로고    scopus 로고
    • A server-side solution to cache-based side-channel attacks in the cloud
    • June
    • M. Godfrey and M. Zulkernine. June 2013. A server-side solution to cache-based side-channel attacks in the cloud. In Proc. of IEEE CLOUD 2013.
    • (2013) Proc. of IEEE CLOUD 2013
    • Godfrey, M.1    Zulkernine, M.2
  • 111
    • 84873338342 scopus 로고    scopus 로고
    • The threat in the cloud
    • (January-February 2013)
    • M. Green. 2013. The threat in the cloud. IEEE Security & Privacy 11, 1 (January-February 2013), 86-89.
    • (2013) IEEE Security & Privacy , vol.11 , Issue.1 , pp. 86-89
    • Green, M.1
  • 112
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • (March-April 2011)
    • B. Grobauer, T. Walloschek, and E. Stocker. 2011. Understanding cloud computing vulnerabilities. IEEE Security & Privacy 9, 2 (March-April 2011), 50-57.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 113
    • 70449472667 scopus 로고    scopus 로고
    • Vulnerable cloud: SOAP message security validation revisited
    • July
    • N. Gruschka and L. L. Iacono. July 2009. Vulnerable cloud: SOAP message security validation revisited. In Proc. of IEEE ICWS 2009.
    • (2009) Proc. of IEEE ICWS 2009
    • Gruschka, N.1    Iacono, L.L.2
  • 114
    • 77957955892 scopus 로고    scopus 로고
    • Attack surfaces: A taxonomy for attacks on cloud services
    • July
    • N. Gruschka and M. Jensen. July 2010. Attack surfaces: A taxonomy for attacks on cloud services. In Proc. of IEEE CLOUD 2010.
    • (2010) Proc. of IEEE CLOUD 2010
    • Gruschka, N.1    Jensen, M.2
  • 115
    • 77955961955 scopus 로고    scopus 로고
    • A case for the accountable cloud
    • (April 2010)
    • A. Haeberlen. 2010. A case for the accountable cloud. ACM SIGOPS Operating Systems Review 44, 2 (April 2010), 52-57.
    • (2010) ACM SIGOPS Operating Systems Review , vol.44 , Issue.2 , pp. 52-57
    • Haeberlen, A.1
  • 116
    • 72949090350 scopus 로고    scopus 로고
    • Runtime monitoring of web service choreographies using streaming XML
    • March. Honolulu, HI, Hawaii
    • S. Hallé and R. Villemaire. March 2009. Runtime monitoring of web service choreographies using streaming XML. In Proc. of ACM SAC 2009. Honolulu, HI, Hawaii.
    • (2009) Proc. of ACM SAC 2009
    • Hallé, S.1    Villemaire, R.2
  • 117
    • 84857264879 scopus 로고    scopus 로고
    • The top ten cloud-security practices in next-generation networking
    • (December 2012)
    • W. M. Halton and S. Rahman. 2012. The top ten cloud-security practices in next-generation networking. IJCNDS 8, 1/2 (December 2012), 70-84.
    • (2012) IJCNDS , vol.8 , Issue.1-2 , pp. 70-84
    • Halton, W.M.1    Rahman, S.2
  • 118
    • 77953805943 scopus 로고    scopus 로고
    • Large-scale software testing environment using cloud computing technology for dependable parallel and distributed systems
    • April
    • T. Hanawa, T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, and M. Sato. April 2010. Large-scale software testing environment using cloud computing technology for dependable parallel and distributed systems. In Proc. of ICSTW 2010.
    • (2010) Proc. of ICSTW 2010
    • Hanawa, T.1    Banzai, T.2    Koizumi, H.3    Kanbayashi, R.4    Imada, T.5    Sato, M.6
  • 119
    • 79955163872 scopus 로고    scopus 로고
    • A time-bound ticket-based mutual authentication scheme for cloud computing
    • 2011
    • Z. Hao, S. Zhong, and N. Yu. 2011. A time-bound ticket-based mutual authentication scheme for cloud computing. IJCCC 6, 2 (2011), 227-235.
    • (2011) IJCCC , vol.6 , Issue.2 , pp. 227-235
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 120
    • 84887724123 scopus 로고    scopus 로고
    • An analysis of security issues for cloud computing
    • 2013
    • K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez. 2013. An analysis of security issues for cloud computing. JISA 4, 1 (2013), 1-13.
    • (2013) JISA , vol.4 , Issue.1 , pp. 1-13
    • Hashizume, K.1    Rosado, D.G.2    Fernandez-Medina, E.3    Fernandez, E.B.4
  • 121
    • 84876187834 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA). Retrieved from
    • G. Hogben and M. Dekker. 2012. Procure Secure: A guide to monitoring of security service levels in cloud contracts. European Network and Information Security Agency (ENISA). Retrieved from http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/procure-secure-a-guide-tomonitoring- of-security-service-levels-in-cloud-contracts/at-download/fullReport.
    • (2012) Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts
    • Hogben, G.1    Dekker, M.2
  • 123
    • 84865031080 scopus 로고    scopus 로고
    • Cloud computings security requirements: A systematic review
    • May
    • I. Iankoulova and M. Daneva. May 2012. Cloud computings security requirements: A systematic review. In Proc. of RCIS 2012.
    • (2012) Proc. of RCIS 2012
    • Iankoulova, I.1    Danev, M.2
  • 125
    • 84938331391 scopus 로고    scopus 로고
    • Emerging security challenges of cloud virtual infrastructure
    • November-December, Sydney, Australi
    • A. S. Ibrahim, J. Hamlyn-Harris, and J. Grundy. November-December 2010. Emerging security challenges of cloud virtual infrastructure. In Proc. of APSEC-CLOUD 2010. Sydney, Australia.
    • (2010) Proc. of APSEC-CLOUD 2010.
    • Ibrahim, A.S.1    Hamlyn-Harris, J.2    Grundy, J.3
  • 126
    • 84938371995 scopus 로고    scopus 로고
    • Infrastructure for Secure Cloud Computing , Infrastructure for Secure Cloud Computing. Retrieved from
    • Infrastructure for Secure Cloud Computing 2013. Infrastructure for Secure Cloud Computing. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1253870&HistoricalAwards=false.
    • (2013)
  • 127
    • 84888061178 scopus 로고    scopus 로고
    • Toward a taxonomy and costing method for security services
    • December
    • C. Irvine and T. Levin. December 1999. Toward a taxonomy and costing method for security services. In Proc. of ACSAC 1999.
    • (1999) Proc. of ACSAC 1999
    • Irvine, C.1    Levin, T.2
  • 128
    • 84881458187 scopus 로고    scopus 로고
    • Recoverable encryption through a noised secret over a large cloud
    • A. Hameurlain, J. Küng, and R. Wagner (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • S. Jajodia, W. Litwin, and T. Schwarz. 2013. Recoverable encryption through a noised secret over a large cloud. In Transactions on Large-Scale Data- and Knowledge-Centered Systems IX, A. Hameurlain, J. Küng, and R. Wagner (Eds.). Lecture Notes in Computer Science, Vol. 7980. Springer, Berlin, 42-64.
    • (2013) Transactions on Large-Scale Data- And Knowledge-Centered Systems IX , vol.7980 , pp. 42-64
    • Jajodia, S.1    Litwin, W.2    Schwarz, T.3
  • 131
    • 84879167714 scopus 로고    scopus 로고
    • The three pillars of a secure hybrid cloud environment
    • (June 2013)
    • C. Jenkins. 2013. The three pillars of a secure hybrid cloud environment. Computer Fraud & Security 2013, 6 (June 2013), 13-15.
    • (2013) Computer Fraud & Security , vol.2013 , Issue.6 , pp. 13-15
    • Jenkins, C.1
  • 133
    • 84887635648 scopus 로고    scopus 로고
    • Adaptive resource management for balancing availability and performance in cloud computing
    • August
    • R. Jhawar and V. Piuri. August 2013. Adaptive resource management for balancing availability and performance in cloud computing. In Proc. of SECRYPT 2013.
    • (2013) Proc. of SECRYPT 2013
    • Jhawar, R.1    Piuri, V.2
  • 134
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • December
    • R. Jhawar, V. Piuri, and P. Samarati. December 2012. Supporting security requirements for resource management in cloud computing. In Proc. of IEEE CSE 2012.
    • (2012) Proc. of IEEE CSE 2012
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 135
    • 84881291342 scopus 로고    scopus 로고
    • Towards assurance of availability in virtualized cloud system
    • May
    • S. Jin, J. Seol, and S. Maeng. May 2013. Towards assurance of availability in virtualized cloud system. In Proc. of IEEE/ACM CCGrid 2013.
    • (2013) Proc. of IEEE/ACM CCGrid 2013
    • Jin, S.1    Seol, J.2    Maeng, S.3
  • 136
    • 84873677485 scopus 로고    scopus 로고
    • New approaches to security and availability for cloud data
    • (February 2013)
    • A. Juels and A. Oprea. 2013. New approaches to security and availability for cloud data. CACM 56, 2 (February 2013).
    • (2013) CACM , vol.56 , pp. 2
    • Juels, A.1    Oprea, A.2
  • 137
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-authorities
    • April
    • T. Jung, X.-Y. Li, and Z. Wan. April 2013. Privacy preserving cloud data access with multi-authorities. In Proc. of IEEE INFOCOM 2013.
    • (2013) Proc. of IEEE INFOCOM 2013
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3
  • 139
    • 84893584607 scopus 로고    scopus 로고
    • SCM: A design and implementation of monitoring system for cloudstack
    • November
    • L. Kai, T.Weiqin, Z. Liping, and H. Chao. November 2013. SCM: A design and implementation of monitoring system for cloudstack. In Proc. of CSC 2013.
    • (2013) Proc. of CSC 2013
    • Kai, L.1    Weiqin, T.2    Liping, Z.3    Chao, H.4
  • 141
    • 57349106468 scopus 로고    scopus 로고
    • SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
    • June
    • S. Kang, J. Lee, H. Jang, H. Lee, Y. Lee, S. Park, T. Park, and J. Song. June 2008. SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments. In Proc. of MobiSys 2008.
    • (2008) Proc. of MobiSys 2008
    • Kang, S.1    Lee, J.2    Jang, H.3    Lee, H.4    Lee, Y.5    Park, S.6    Park, T.7    Song, J.8
  • 142
    • 77955131289 scopus 로고    scopus 로고
    • Can public-cloud security meet its unique challenges?
    • (July-August 2010)
    • L. M. Kaufman. 2010. Can public-cloud security meet its unique challenges? IEEE Security & Privacy 8, 4 (July-August 2010), 55-57.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.4 , pp. 55-57
    • Kaufman, L.M.1
  • 143
    • 84938343856 scopus 로고    scopus 로고
    • Cloud based secure and privacy enhanced authentication & authorization protocol
    • September
    • U. Khalid, A. Ghafoor, M. Irum, andM. A. Shibli. September 2013. Cloud based secure and privacy enhanced authentication & authorization protocol. In Proc. of KES 2013.
    • (2013) Proc. of KES 2013
    • Khalid, U.1    Ghafoor, A.2    Irum, M.3    Shibli, M.A.4
  • 144
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • (September- October 2010)
    • K. M. Khan and Q. Malluhi. 2010. Establishing trust in cloud computing. IT Professional 12, 5 (September- October 2010), 20-27.
    • (2010) IT Professional , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 145
    • 77953733759 scopus 로고    scopus 로고
    • Migrating autonomic self-testing to the cloud
    • April
    • T. M. King and A. S. Ganti. April 2010. Migrating autonomic self-testing to the cloud. In Proc. of ICSTW 2010.
    • (2010) Proc. of ICSTW 2010
    • King, T.M.1    Ganti, A.S.2
  • 147
    • 79952395279 scopus 로고    scopus 로고
    • Do you get what you pay for? Using proof-of-work functions to verify performance assertions in the cloud
    • November-December
    • F. Koeppe and J. Schneider. November-December 2010. Do you get what you pay for? using proof-of-work functions to verify performance assertions in the cloud. In Proc. of IEEE CloudCom 2010.
    • (2010) Proc. of IEEE CloudCom 2010
    • Koeppe, F.1    Schneider, J.2
  • 148
    • 77749234127 scopus 로고    scopus 로고
    • Increased reliability in SOA environments through registry-based conformance testing ofWeb services
    • D. Kourtesis, E. Ramollari, D. Dranidis, and I. Paraskakis. 2010. Increased reliability in SOA environments through registry-based conformance testing ofWeb services. Production Planning & Control 21, 2 (2010), 130-144.
    • (2010) Production Planning & Control 2010 , vol.21 , Issue.2 , pp. 130-144
    • Kourtesis, D.1    Ramollari, E.2    Dranidis, D.3    Paraskakis, I.4
  • 149
    • 84875980858 scopus 로고    scopus 로고
    • Private virtual infrastructure for cloud computing
    • June. San Diego, CA, USA
    • F. J. Krautheim. June 2009. Private virtual infrastructure for cloud computing. In Proc. of HotCloud 2009. San Diego, CA, USA.
    • (2009) Proc. of HotCloud 2009
    • Krautheim, F.J.1
  • 152
    • 79952383924 scopus 로고    scopus 로고
    • OpenPMF SCaaS: Authorization as a service for cloud & SOA applications
    • November-December
    • U. Lang. November-December 2010. OpenPMF SCaaS: Authorization as a service for cloud & SOA applications. In Proc. of IEEE CloudCom 2010.
    • (2010) Proc. of IEEE CloudCom 2010
    • Lang, U.1
  • 153
    • 79955677448 scopus 로고    scopus 로고
    • Multi-level intrusion detection system and log management in cloud computing
    • February . Gangwon-Do, South Korea
    • J.-H. Lee, M.-W. Park, J.-H. Eom, and T.-M. Chung. February 2011. Multi-level intrusion detection system and log management in cloud computing. In Proc. of ICACT 2011. Gangwon-Do, South Korea.
    • (2011) Proc. of ICACT 2011
    • Lee, J.-H.1    Park, M.-W.2    Eom, J.-H.3    Chung, T.-M.4
  • 154
    • 84894209248 scopus 로고    scopus 로고
    • Identity-based cryptography for cloud security
    • H. Li, Y. Dai, and B. Yang. 2011a. Identity-based cryptography for cloud security. IACR Cryptology ePrint Archive 2011 (2011), 169.
    • (2011) IACR Cryptology EPrint Archive , vol.2011 , Issue.2011 , pp. 169
    • Li, H.1    Dai, Y.2    Yang, B.3
  • 155
    • 80053654165 scopus 로고    scopus 로고
    • CyberGuarder: A virtualization security assurance architecture for green cloud computing
    • (May 2011)
    • J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K. P. Lam. 2011b. CyberGuarder: A virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems 28, 2 (May 2011), 379-390.
    • (2011) Future Generation Computer Systems , vol.28 , Issue.2 , pp. 379-390
    • Li, J.1    Li, B.2    Wo, T.3    Hu, C.4    Huai, J.5    Liu, L.6    Lam, K.P.7
  • 156
    • 85013945047 scopus 로고    scopus 로고
    • MyCloud: Supporting user-configured privacy protection in cloud computing
    • December
    • M. Li, W. Zang, K. Bai, M. Yu, and P. Liu. December 2013. MyCloud: Supporting user-configured privacy protection in cloud computing. In Proc. of ACSAC 2013.
    • (2013) Proc. of ACSAC 2013
    • Li, M.1    Zang, W.2    Bai, K.3    Yu, M.4    Liu, P.5
  • 158
    • 84860512062 scopus 로고    scopus 로고
    • A secure erasure code-based cloud storage system with secure data forwarding
    • (June 2012)
    • H.-Y. Lin and W.-G. Tzeng. 2012. A secure erasure code-based cloud storage system with secure data forwarding. IEEE TPDS 23, 6 (June 2012), 995-1003.
    • (2012) IEEE TPDS , vol.23 , Issue.6 , pp. 995-1003
    • Lin, H.-Y.1    Tzeng, W.-G.2
  • 159
    • 78650154288 scopus 로고    scopus 로고
    • A new form of DOS attack in a cloud and its avoidance mechanism
    • October
    • H. Liu. October 2010. A new form of DOS attack in a cloud and its avoidance mechanism. In Proc. of ACM CCSW 2010.
    • (2010) Proc. of ACM CCSW 2010
    • Liu, H.1
  • 160
    • 84893461004 scopus 로고    scopus 로고
    • Hierarchical attribute-based access control with authentication for outsourced data in cloud computing
    • July
    • X. Liu, Y. Xia, S. Jiang, F. Xia, and Y. Wang. July 2013. Hierarchical attribute-based access control with authentication for outsourced data in cloud computing. In Proc. of IEEE TrustCom 2013.
    • (2013) Proc. of IEEE TrustCom 2013
    • Liu, X.1    Xia, Y.2    Jiang, S.3    Xia, F.4    Wang, Y.5
  • 163
    • 84938315857 scopus 로고    scopus 로고
    • A multi-criteria QoS-aware trust service composition algorithm in cloud computing environments
    • 2014
    • W. Lu, X. Hu, S. Wang, and X. Li. 2014. A multi-criteria QoS-aware trust service composition algorithm in cloud computing environments. IJGDC 7, 1 (2014), 77-88.
    • (2014) IJGDC , vol.7 , Issue.1 , pp. 77-88
    • Lu, W.1    Hu, X.2    Wang, S.3    Li, X.4
  • 164
    • 84938392011 scopus 로고    scopus 로고
    • Federated cloud security architecture for secure and agile clouds
    • K. J. Han, B.-Y. Choi, and S. Song (Eds.). Springer, New York
    • W. Luo, L. Xu, Z. Zhan, Q. Zheng, and S. Xu. 2014. Federated cloud security architecture for secure and agile clouds. In High Performance Cloud Auditing and Applications, K. J. Han, B.-Y. Choi, and S. Song (Eds.). Springer, New York.
    • (2014) High Performance Cloud Auditing and Applications
    • Luo, W.1    Xu, L.2    Zhan, Z.3    Zheng, Q.4    Xu, S.5
  • 165
    • 84904126401 scopus 로고    scopus 로고
    • A virtual machine cloning approach based on trusted computing
    • (November 2013)
    • W. Ma, X. Li, Y. Shi, and Y. Guo. 2013. A virtual machine cloning approach based on trusted computing. TELKOMNIKA 11, 11 (November 2013), 6935-6942.
    • (2013) TELKOMNIKA , vol.11 , Issue.11 , pp. 6935-6942
    • Ma, W.1    Li, X.2    Shi, Y.3    Guo, Y.4
  • 166
    • 33748782229 scopus 로고    scopus 로고
    • Comply or explain": Market discipline and non-compliance with the Combined Code
    • 2006
    • I. MacNeil and X. Li. 2006. "Comply or explain": Market discipline and non-compliance with the Combined Code. Corporate Governance: An International Review 14, 5 (2006), 486-496.
    • (2006) Corporate Governance: An International Review , vol.14 , Issue.5 , pp. 486-496
    • MacNeil, I.1    Li., X.2
  • 167
    • 84889872804 scopus 로고    scopus 로고
    • Monitoring WS-agreements: An event calculusbased approach
    • L. Baresi and E. Di Nitto (Eds.). Springer, Berlin
    • K. Mahbub and G. Spanoudakis. 2007. Monitoring WS-agreements: An event calculusbased approach. In Test and Analysis of Web Services, L. Baresi and E. Di Nitto (Eds.). Springer, Berlin, 265-306.
    • (2007) Test and Analysis of Web Services , pp. 265-306
    • Mahbub, K.1    Spanoudakis, G.2
  • 168
    • 20444433248 scopus 로고    scopus 로고
    • A framework for requirements monitoring of service based systems
    • November
    • K. Mahbub and G. Spanoudakis. November 2004. A framework for requirements monitoring of service based systems. In Proc. of ICSOC 2004.
    • (2004) Proc. of ICSOC 2004
    • Mahbub, K.1    Spanoudakis, G.2
  • 170
    • 57549096898 scopus 로고    scopus 로고
    • Danger in the clouds
    • December 2008
    • S. Mansfield-Devine. 2008. Danger in the clouds. Network Security 2008, 12 (December 2008), 9-11.
    • (2008) Network Security , vol.2008 , Issue.12 , pp. 9-11
    • Mansfield-Devine, S.1
  • 172
    • 3342966061 scopus 로고    scopus 로고
    • The ganglia distributed monitoring system: Design, implementation, and experience
    • July 2004
    • M. L. Massie, B. N. Chun, and D. E. Culler. 2004. The ganglia distributed monitoring system: Design, implementation, and experience. Parallel Comput. 30, 7 (July 2004), 817-840.
    • (2004) Parallel Comput. , vol.30 , Issue.7 , pp. 817-840
    • Massie, M.L.1    Chun, B.N.2    Culler, D.E.3
  • 174
    • 46849086890 scopus 로고    scopus 로고
    • XML signature element wrapping attacks and countermeasures
    • November. Fairfax, VA, USA
    • M. McIntosh and P. Austel. November 2005. XML signature element wrapping attacks and countermeasures. In Proc. of SWS 2005. Fairfax, VA, USA.
    • (2005) Proc. of SWS 2005
    • McIntosh, M.1    Austel, P.2
  • 175
    • 84938396526 scopus 로고    scopus 로고
    • TTP-ACE: A trusted third party for auditing in cloud environment
    • September
    • S. Mei, H. Ba, F. Tu, J. Ren, and Z. Wang. September 2013. TTP-ACE: A trusted third party for auditing in cloud environment. In Proc. of ICSCTEA 2013. September.
    • (2013) Proc. of ICSCTEA 2013
    • Mei, S.1    Ba, H.2    Tu, F.3    Ren, J.4    Wang, Z.5
  • 177
    • 84881144407 scopus 로고    scopus 로고
    • Enhanced monitoring-as-A-service for effective cloud management
    • (September 2013)
    • S. Meng and L. Liu. 2013. Enhanced monitoring-as-a-service for effective cloud management. IEEE TC 62, 9 (September 2013), 1705-1720.
    • (2013) IEEE TC , vol.62 , Issue.9 , pp. 1705-1720
    • Meng, S.1    Liu, L.2
  • 178
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of cloud computing
    • (February 2013)
    • C. Modi, D. Patel, B. Borisaniya, A. Patel, andM. Rajarajan. 2013a. A survey on security issues and solutions at different layers of cloud computing. Journal of Supercomputing 63, 2 (February 2013).
    • (2013) Journal of Supercomputing , vol.63 , pp. 2
    • Modi, C.1    Patel, D.2    Borisaniya, B.3    Patel, A.4    Rajarajan, M.5
  • 180
    • 85006223235 scopus 로고    scopus 로고
    • A survey on resource allocation and monitoring in cloud computing
    • (February 2014)
    • M. H. Mohamaddiah, A. Abdullah, S. Subramaniam, and M. Hussin. 2014. A survey on resource allocation and monitoring in cloud computing. IJMLC 4, 1 (February 2014).
    • (2014) IJMLC , vol.4 , pp. 1
    • Mohamaddiah, M.H.1    Abdullah, A.2    Subramaniam, S.3    Hussin, M.4
  • 181
    • 84857187859 scopus 로고    scopus 로고
    • Monitoring intrusions and security breaches in highly distributed cloud environments
    • November-December
    • A. T. Monfared and M. G. Jaatun. November-December 2011. Monitoring intrusions and security breaches in highly distributed cloud environments. In Proc. of IEEE CloudCom 2011.
    • (2011) Proc. of IEEE CloudCom 2011
    • Monfared, A.T.1    Jaatun, M.G.2
  • 182
    • 84863140035 scopus 로고    scopus 로고
    • Master Thesis - ETH Zürich. Retreived from
    • J. Moreno. 2010. A Testing Framework for Cloud Storage Systems. Master Thesis - ETH Zürich. Retreived from http://e-collection.library.ethz.ch/eserv/eth:1987/eth-1987-01.pdf.
    • (2010) A Testing Framework for Cloud Storage Systems
    • Moreno, J.1
  • 183
    • 84922992001 scopus 로고    scopus 로고
    • Trusted platform module
    • H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
    • T. Morris. 2011. Trusted platform module. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
    • (2011) Encyclopedia of Cryptography and Security
    • Morris, T.1
  • 184
    • 57349093724 scopus 로고    scopus 로고
    • Non-intrusive monitoring and service adaptation for WS-BPEL
    • April
    • O. Moser, F. Rosenberg, and S. Dustdar. April 2008. Non-intrusive monitoring and service adaptation for WS-BPEL. In Proc. of WWW 2008.
    • (2008) Proc. of WWW 2008
    • Moser, O.1    Rosenberg, F.2    Dustdar, S.3
  • 185
    • 84881474672 scopus 로고    scopus 로고
    • A framework to support selection of cloud providers based on security and privacy requirements
    • (March 2013)
    • H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis. 2013. A framework to support selection of cloud providers based on security and privacy requirements. JSS 86, 9 (March 2013), 2276-2293.
    • (2013) JSS , vol.86 , Issue.9 , pp. 2276-2293
    • Mouratidis, H.1    Islam, S.2    Kalloniatis, C.3    Gritzalis, S.4
  • 186
    • 84888019509 scopus 로고    scopus 로고
    • Bridging the GAP between software certification and trusted computing for securing cloud computing
    • June
    • A. Muñoz and A. Maña. June 2013. Bridging the GAP between software certification and trusted computing for securing cloud computing. In Proc. of IEEE SERVICES 2013.
    • (2013) Proc. of IEEE SERVICES 2013
    • Muñoz, A.1    Maña, A.2
  • 188
    • 84884783064 scopus 로고    scopus 로고
    • Privacy preserving policy-based content sharing in public clouds
    • (November 2013)
    • M. Nabeel, N. Shang, and E. Bertino. 2013. Privacy preserving policy-based content sharing in public clouds. IEEE TKDE 25, 11 (November 2013), 2602-2614.
    • (2013) IEEE TKDE , vol.25 , Issue.11 , pp. 2602-2614
    • Nabeel, M.1    Shang, N.2    Bertino, E.3
  • 189
    • 80051572582 scopus 로고    scopus 로고
    • Nagios.. Retrieved from
    • Nagios. 2014. Cloud Computing. Retrieved from http://www.nagios.com/solutions/cloud-computing.
    • (2014) Cloud Computing
  • 190
    • 84893073951 scopus 로고    scopus 로고
    • Network of Excellence on Engineering Secure Future Internet Software Services and Systems. Retrieved from
    • Network of Excellence on Engineering Secure Future Internet Software Services and Systems. 2010. Network of Excellence on Engineering Secure Future Internet Software Services and Systems. Retrieved from http://www.nessos-project.eu/.
    • (2010) Network of Excellence on Engineering Secure Future Internet Software Services and Systems
  • 191
    • 84901667966 scopus 로고    scopus 로고
    • On the security of an efficient dynamic auditing protocol in cloud storage
    • J. Ni, Y. Yu, Y. Mu, and Q. Xia. 2014. On the security of an efficient dynamic auditing protocol in cloud storage. IEEE TPDS (2014).
    • (2014) IEEE TPDS (2014)
    • Ni, J.1    Yu, Y.2    Mu, Y.3    Xia, Q.4
  • 192
    • 77954737019 scopus 로고    scopus 로고
    • Load-based covert channels between xen virtual machines
    • March . Sierre, Switzerland
    • K. Okamura and Y. Oyama. March 2010. Load-based covert channels between xen virtual machines. In Proc. of ACM SAC 2010. Sierre, Switzerland.
    • (2010) Proc. of ACM SAC 2010
    • Okamura, K.1    Oyam, Y.2
  • 194
    • 84938349985 scopus 로고    scopus 로고
    • OpenStack Open Source Cloud Computing Software, Retrieved from
    • OpenStack Open Source Cloud Computing Software 2015. OpenStack Open Source Cloud Computing Software. Retrieved from https://www.openstack.org/.
    • (2015) OpenStack Open Source Cloud Computing Software
  • 197
    • 77953614890 scopus 로고    scopus 로고
    • Identifying the security risks associated with governmental use of cloud computing
    • (April 2010)
    • S. Paquette, P. T. Jaeger, and S. C. Wilson. 2010. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27, 3 (April 2010), 245-253.
    • (2010) Government Information Quarterly , vol.27 , Issue.3 , pp. 245-253
    • Paquette, S.1    Jaeger, P.T.2    Wilson, S.C.3
  • 198
    • 84883814353 scopus 로고    scopus 로고
    • THEMIS: A mutually verifiable billing system for the cloud computing environment
    • (July-September 2013)
    • K.-W. Park, J. Han, J. Chung, and K. H. Park. 2013. THEMIS: A mutually verifiable billing system for the cloud computing environment. IEEE TSC 6, 3 (July-September 2013), 300-313.
    • (2013) IEEE TSC , vol.6 , Issue.3 , pp. 300-313
    • Park, K.-W.1    Han, J.2    Chung, J.3    Park, K.H.4
  • 199
    • 77953793664 scopus 로고    scopus 로고
    • When to migrate software testing to the cloud?
    • April 2010
    • T. Parveen and S. Tilley. April 2010. When to migrate software testing to the cloud?. In Proc of ICSTW 2010.
    • (2010) Proc of ICSTW
    • Parveen, T.1    Tilley, S.2
  • 200
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: A systematic review
    • (January 2013)
    • A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino JúNior. 2013. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 36, 1 (January 2013), 25-41.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Celestino, J.4
  • 202
    • 84875146484 scopus 로고    scopus 로고
    • Virtualization: Issues, security threats, and solutions
    • (February 2013)
    • M. Pearce, S. Zeadally, and R. Hunt. 2013. Virtualization: Issues, security threats, and solutions. ACMCSUR 45, 2 (February 2013), 17:1-17:39.
    • (2013) ACMCSUR , vol.45 , Issue.2 , pp. 171-1739
    • Pearce, M.1    Zeadally, S.2    Hunt, R.3
  • 203
    • 79959961301 scopus 로고    scopus 로고
    • Toward accountability in the cloud
    • 2011
    • S. Pearson. 2011. Toward accountability in the cloud. IEEE Internet Computing 15, 4 (2011), 64-69.
    • (2011) IEEE Internet Computing , vol.15 , Issue.4 , pp. 64-69
    • Pearson, S.1
  • 204
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • S. Pearson and G. Yee (Eds.). Springer London
    • S. Pearson. 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing, S. Pearson and G. Yee (Eds.). Springer London, 3-42.
    • (2013) Privacy and Security for Cloud Computing , pp. 3-42
    • Pearson, S.1
  • 205
    • 79952367895 scopus 로고    scopus 로고
    • Privacy, security and trust issues arising from cloud computing
    • November-December
    • S. Pearson and A. Benameur. November-December 2010. Privacy, security and trust issues arising from cloud computing. In Proc. of IEEE CloudCom 2010.
    • (2010) Proc. of IEEE CloudCom 2010
    • Pearson, S.1    Benameur, A.2
  • 207
    • 84938308909 scopus 로고    scopus 로고
    • Characterizing hypervisor vulnerabilities in cloud computing servers
    • May
    • D. Perez-Botero, J. Szefer, and R. B. Lee. May 2013. Characterizing hypervisor vulnerabilities in cloud computing servers. In Proc. of ASIACCS-SCC 2013.
    • (2013) Proc. of ASIACCS-SCC 2013
    • Perez-Botero, D.1    Szefer, J.2    Lee, R.B.3
  • 208
    • 77958132271 scopus 로고    scopus 로고
    • Don't trust. and verify: A security architecture stack for the cloud
    • (September-October 2010)
    • G. Peterson. 2010. Don't trust. and verify: A security architecture stack for the cloud. IEEE Security & Privacy 8, 5 (September-October 2010), 83-86.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.5 , pp. 83-86
    • Peterson, G.1
  • 209
    • 80051924493 scopus 로고    scopus 로고
    • CloudVal: A framework for validation of virtualization environment in cloud infrastructure
    • June
    • C. Pham, D. Chen, Z. Kalbarczyk, and R. K. Iyer. June 2011. CloudVal: A framework for validation of virtualization environment in cloud infrastructure. In Proc of IEEE/IFIP DSN 2011.
    • (2011) Proc of IEEE/IFIP DSN 2011
    • Pham, C.1    Chen, D.2    Kalbarczyk, Z.3    Iyer, R.K.4
  • 210
    • 84938408972 scopus 로고    scopus 로고
    • Policy and Security Configuration Management 2010. Retrieved from
    • Policy and Security Configuration Management 2010. Policy and Security Configuration Management. Retrieved from http://www.posecco.eu/.
    • Policy and Security Configuration Management
  • 212
    • 84938365997 scopus 로고    scopus 로고
    • MAC algorithms
    • H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
    • B. Preneel. 2011. MAC algorithms. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
    • (2011) Encyclopedia of Cryptography and Security
    • Preneel, B.1
  • 213
    • 84888840097 scopus 로고    scopus 로고
    • Simultaneous authentication and secrecy in identity-based data upload to cloud
    • (April 2013)
    • B. Qin, H. Wang, Q. Wu, J. Liu, and J. Domingo-Ferrer. 2013. Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Computing 16, 4 (April 2013), 845-859.
    • (2013) Cluster Computing , vol.16 , Issue.4 , pp. 845-859
    • Qin, B.1    Wang, H.2    Wu, Q.3    Liu, J.4    Domingo-Ferrer, J.5
  • 215
    • 84893307436 scopus 로고    scopus 로고
    • QoS guarantees and service differentiation for dynamic cloud applications
    • (March 2013)
    • J. Rao, Y. Wei, J. Gong, and C.-Z. Xu. 2013. QoS guarantees and service differentiation for dynamic cloud applications. IEEE TNSM 10, 1 (March 2013), 43-55.
    • (2013) IEEE TNSM , vol.10 , Issue.1 , pp. 43-55
    • Rao, J.1    Wei, Y.2    Gong, J.3    Xu, C.-Z.4
  • 216
    • 84923953445 scopus 로고    scopus 로고
    • Data and infrastructure security auditing in cloud computing environments
    • (December 2013)
    • H. Rasheed. 2013. Data and infrastructure security auditing in cloud computing environments. IJIM (December 2013).
    • (2013) IJIM
    • Rasheed, H.1
  • 217
    • 84888295277 scopus 로고    scopus 로고
    • Privacy enhanced access control for outsourced data sharing
    • February-March
    • M. Raykova, H. Zhao, and S. M. Bellovin. February-March 2012. Privacy enhanced access control for outsourced data sharing. In Proc. of FC 2012.
    • (2012) Proc. of FC 2012
    • Raykova, M.1    Zhao, H.2    Bellovin, S.M.3
  • 218
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • (January-February 2012)
    • K. Ren, C. Wang, and Q. Wang. 2012. Security challenges for the public cloud. IEEE Internet Computing 16, 1 (January-February 2012), 69-73.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 219
  • 220
    • 84938310152 scopus 로고    scopus 로고
    • Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing. Retrieved from
    • Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing 2013. Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1332035&HistoricalAwards=false.
    • (2013) Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing
  • 221
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • November
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. November 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proc. of ACM CCS 2009.
    • (2009) Proc. of ACM CCS 2009
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 223
    • 80052161321 scopus 로고    scopus 로고
    • Lucy in the sky without diamonds: Stealing confidential data in the cloud
    • June
    • F. Rocha and M. Correia. June 2011. Lucy in the sky without diamonds: Stealing confidential data in the cloud. In Proc. of IEEE/IFIP DSN-W 2011.
    • (2011) Proc. of IEEE/IFIP DSN-W 2011
    • Rocha, F.1    Correi, M.2
  • 224
    • 84855993467 scopus 로고    scopus 로고
    • Building safe PaaS clouds: A survey on security in multitenant software platforms
    • (February 2012)
    • L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez. 2012. Building safe PaaS clouds: A survey on security in multitenant software platforms. Computers & Security 31, 1 (February 2012), 96-108.
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 96-108
    • Rodero-Merino, L.1    Vaquero, L.M.2    Caron, E.3    Muresan, A.4    Desprez, F.5
  • 225
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • (May 2013)
    • C. Rong, S. T. Nguyen, and M. G. Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering 39, 1 (May 2013), 47-54.
    • (2013) Computers & Electrical Engineering , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 226
    • 84891761004 scopus 로고    scopus 로고
    • Decentralized access control with anonymous authentication of data stored in clouds
    • (February 2014)
    • S. Ruj, M. Stojmenovic, and A. Nayak. 2014. Decentralized access control with anonymous authentication of data stored in clouds. IEEE TPDS 25, 2 (February 2014), 384-394.
    • (2014) IEEE TPDS , vol.25 , Issue.2 , pp. 384-394
    • Ruj, S.1    Stojmenovic, M.2    Nayak, A.3
  • 227
    • 84881472688 scopus 로고    scopus 로고
    • Cloud computing security: The scientific challenge, and a survey of solutions
    • (February 2013)
    • M. D. Ryan. 2013. Cloud computing security: The scientific challenge, and a survey of solutions. JSS 86, 9 (February 2013), 2263-2268.
    • (2013) JSS , vol.86 , Issue.9 , pp. 2263-2268
    • Ryan, M.D.1
  • 228
    • 43749124807 scopus 로고    scopus 로고
    • Supporting the dynamic evolution of web service protocols in service-oriented architectures
    • April 2008
    • S. H. Ryu, F. Casati, H. Skogsrud, B. Betanallah, and R. Saint-Paul. 2008. Supporting the dynamic evolution of web service protocols in service-oriented architectures. ACM TWEB 2, 2 (April 2008), 13:1-13:46.
    • (2008) ACM TWEB , vol.2 , Issue.2 , pp. 131-1346
    • Ryu, S.H.1    Casati, F.2    Skogsrud, H.3    Betanallah, B.4    Saint-Paul, R.5
  • 229
    • 84866745335 scopus 로고    scopus 로고
    • SLA-based and consumer-centric dynamic provisioning for cloud databases
    • June 2012
    • S. Sakr and A. Liu. June 2012. SLA-based and consumer-centric dynamic provisioning for cloud databases. In Proc. of IEEE CLOUD 2012.
    • Proc. of IEEE CLOUD 2012
    • Sakr, S.1    Liu, A.2
  • 230
    • 47949096953 scopus 로고    scopus 로고
    • Specifyingmonitoring and switching problems in context
    • October
    • M. Salifu, Yijun Yu, and B. Nuseibeh.October 2007. Specifyingmonitoring and switching problems in context. In Proc. of IEEE RE 2007.
    • (2007) Proc. of IEEE RE 2007
    • Salifu, M.1    Yu, Y.2    Nuseibeh, B.3
  • 232
    • 77957948993 scopus 로고    scopus 로고
    • QUIRC: A quantitative impact and risk assessment framework for cloud security
    • P. Saripalli and B. Walters. 2010. QUIRC: A quantitative impact and risk assessment framework for cloud security. In Proc. of IEEE CLOUD 2010.
    • (2010) Proc. of IEEE CLOUD 2010
    • Saripalli, P.1    Walters, B.2
  • 234
    • 84938346469 scopus 로고    scopus 로고
    • Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
    • Secure and Privacy-assured Data Service Outsourcing in Cloud Computing 2012. Secure and Privacy-assured Data Service Outsourcing in Cloud Computing. http://www.nsf.gov/awardsearch/showAward?AWD-ID=1262277&HistoricalAwards=false.
    • (2012) Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
  • 235
    • 84938313454 scopus 로고    scopus 로고
    • Secure Data-Intensive Computing on Hybrid Clouds
    • Secure Data-Intensive Computing on Hybrid Clouds 2012. Secure Data-Intensive Computing on Hybrid Clouds. http://www.nsf.gov/awardsearch/showAward?AWD-ID=1223495&HistoricalAwards=false.
    • (2012) Secure Data-Intensive Computing on Hybrid Clouds
  • 236
    • 84893045126 scopus 로고    scopus 로고
    • Secure Provision and Consumption in the Internet of Services. Retrieved from
    • Secure Provision and Consumption in the Internet of Services 2010. Secure Provision and Consumption in the Internet of Services. Retrieved from http://www.spacios.eu/.
    • (2010) Secure Provision and Consumption in the Internet of Services
  • 237
    • 84938346351 scopus 로고    scopus 로고
    • Secure Provisioning of Cloud Services based on SLAmanagement . Retrieved from
    • Secure Provisioning of Cloud Services based on SLAmanagement 2013. Secure Provisioning of Cloud Services Based on SLA Management. Retrieved from http://specs-project.eu/.
    • (2013) Secure Provisioning of Cloud Services Based on SLA Management
  • 238
    • 84938379746 scopus 로고    scopus 로고
    • A simple technique for securing data at rest stored in a computing cloud
    • December. Beijing, China
    • J. Sedayao, S. Su, X. Ma, M. Jiang, and K. Miao. December 2009. A simple technique for securing data at rest stored in a computing cloud. In Proc. of CloudCom 2009. Beijing, China.
    • (2009) Proc. of CloudCom 2009
    • Sedayao, J.1    Su, S.2    Ma, X.3    Jiang, M.4    Miao, K.5
  • 239
    • 84879919116 scopus 로고    scopus 로고
    • SEI., Retrieved from
    • SEI. 2011. Securing Web Services for Army SOA. Retrieved from http://www.sei.cmu.edu/solutions/softwaredev/securing-web-services.cfm.
    • (2011) Securing Web Services for Army SOA
  • 242
    • 84888031754 scopus 로고    scopus 로고
    • Auditing and analysis of network traffic in cloud environment
    • June-July
    • S. Shetty. June-July 2013. Auditing and analysis of network traffic in cloud environment. In Proc. of IEEE SERVICES 2013.
    • (2013) Proc. of IEEE SERVICES 2013
    • Shetty, S.1
  • 245
    • 84873619608 scopus 로고    scopus 로고
    • Collaboration in multicloud computing environments: Framework and security issues
    • (February 2013)
    • M. Singhal, S. Chandrasekhar, T. Ge, R. Sandhu, R. Krishnan, G.-J. Ahn, and E. Bertino. 2013. Collaboration in multicloud computing environments: Framework and security issues. Computer 46, 2 (February 2013), 76-84.
    • (2013) Computer , vol.46 , Issue.2 , pp. 76-84
    • Singhal, M.1    Chandrasekhar, S.2    Ge, T.3    Sandhu, R.4    Krishnan, R.5    Ahn, G.-J.6    Bertino, E.7
  • 247
    • 84863185930 scopus 로고    scopus 로고
    • TrustCube: An infrastructure that builds trust in client
    • D. Gawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik (Eds.). Vieweg+Teubner
    • Z. Song, J.Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka. 2009. TrustCube: An infrastructure that builds trust in client. In Future of Trust in Computing, D. Gawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik (Eds.). Vieweg+Teubner, 68-79.
    • (2009) Future of Trust in Computing , pp. 68-79
    • Song, Z.1    Molina, J.2    Lee, S.3    Lee, H.4    Kotani, S.5    Masuoka, R.6
  • 248
    • 84872000645 scopus 로고    scopus 로고
    • Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach
    • October 2012
    • G. Spanoudakis, E. Damiani, and A. Maña. October 2012. Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach. In Proc. of IEEE HASE 2012.
    • Proc. of IEEE HASE 2012
    • Spanoudakis, G.1    Damiani, E.2    Maña, A.3
  • 249
    • 84896860116 scopus 로고    scopus 로고
    • State-of-The-Art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment
    • August
    • M. K. Srinivasan, K. Sarukesi, P. Rodrigues, M. S.Manoj, and P. Revathy. August 2012. State-of-the-art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment. In Proc. of ICACCI 2012.
    • (2012) Proc. of ICACCI 2012
    • Srinivasan, M.K.1    Sarukesi, K.2    Rodrigues, P.3    Manoj, M.S.4    Revathy, P.5
  • 250
    • 84938367992 scopus 로고    scopus 로고
    • Application-level denial of service
    • H. C. A. van Tilborg and S. Jajodia (Eds.). Springer
    • M. Srivatsa and A. Iyengar. 2011. Application-level denial of service. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia (Eds.). Springer.
    • (2011) Encyclopedia of Cryptography and Security
    • Srivatsa, M.1    Iyengar, A.2
  • 251
    • 84885001426 scopus 로고    scopus 로고
    • Integrated TaaS platform for mobile development: Architecture solutions
    • May
    • O. Starov and S. Vilkomir. May 2013. Integrated TaaS platform for mobile development: Architecture solutions. In Proc. of AST 2013.
    • (2013) Proc. of AST 2013
    • Starov, O.1    Vilkomir, S.2
  • 252
    • 84874906821 scopus 로고    scopus 로고
    • Iris: A scalable cloud file system with efficient integrity checks
    • December
    • E. Stefanov, M. van Dijk, A. Juels, and A. Oprea. December 2012. Iris: A scalable cloud file system with efficient integrity checks. In Proc. of ACSAC 2012.
    • (2012) Proc. of ACSAC 2012
    • Stefanov, E.1    Van Dijk, M.2    Juels, A.3    Opre, A.4
  • 253
    • 84864275237 scopus 로고    scopus 로고
    • Fog computing: Mitigating insider data theft attacks in the cloud
    • May
    • S. J. Stolfo, M. B. Salem, and A. D. Keromytis. May 2012. Fog computing: Mitigating insider data theft attacks in the cloud. In Proc. of IEEE SPW 2012.
    • (2012) Proc. of IEEE SPW 2012
    • Stolfo, S.J.1    Salem, M.B.2    Keromytis, A.D.3
  • 254
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • (January 2011)
    • S. Subashini and V. Kavitha. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1 (January 2011), 1-11.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 255
    • 84938389835 scopus 로고    scopus 로고
    • Towards a self-protecting cloud
    • September
    • A. Sulistio and C. Reich. September 2013. Towards a self-protecting cloud. In Proc. of OTM 2013.
    • (2013) Proc. of OTM 2013
    • Sulistio, A.1    Reich, C.2
  • 256
    • 84861176850 scopus 로고    scopus 로고
    • Ensuring distributed accountability for data sharing in the cloud
    • (July 2012)
    • S. Sundareswaran, A. C. Squicciarini, and D. Lin. 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE TDSC 9, 4 (July 2012), 556-568.
    • (2012) IEEE TDSC , vol.9 , Issue.4 , pp. 556-568
    • Sundareswaran, S.1    Squicciarini, A.C.2    Lin, D.3
  • 257
    • 84873696561 scopus 로고    scopus 로고
    • Cloud services certification
    • (February 2013)
    • A. Sunyaev and S. Schneider. 2013. Cloud services certification. CACM 56, 2 (February 2013), 33-36.
    • (2013) CACM , vol.56 , Issue.2 , pp. 33-36
    • Sunyaev, A.1    Schneider, S.2
  • 258
    • 84929854649 scopus 로고    scopus 로고
    • Hardware-enhanced security for cloud computing
    • S. Jajodia, K. Kant, P. Samarati V. Swarup, and C. Wang (Eds.). Springer
    • J. Szefer and R. B. Lee. 2014. Hardware-enhanced security for cloud computing. In Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer.
    • (2014) Secure Cloud Computing
    • Szefer, J.1    Lee, R.B.2
  • 259
    • 84857960811 scopus 로고    scopus 로고
    • Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment
    • January
    • H. Takabi and J. B. D. Joshi. January 2012. Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment. In Proc. of HICSS 2012.
    • (2012) Proc. of HICSS 2012
    • Takabi, H.1    Joshi, J.B.D.2
  • 260
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • (November-December 2010)
    • H. Takabi, J. B. D. Joshi, and Gail-Joon Ahn. 2010b. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8, 6 (November-December 2010), 24-31.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.3
  • 261
    • 78649806730 scopus 로고    scopus 로고
    • SecureCloud: Towards a comprehensive security framework for cloud computing environments
    • July
    • H. Takabi, J. B. D. Joshi, and G.-J. Ahn. July 2010a. SecureCloud: Towards a comprehensive security framework for cloud computing environments. In Proc. of IEEE COMPSACW 2010.
    • (2010) Proc. of IEEE COMPSACW 2010
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 263
    • 84866619747 scopus 로고    scopus 로고
    • Secure overlay cloud storage with access control and assured deletion
    • (November 2012)
    • Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE TDSC 9, 6 (November 2012), 903-916.
    • (2012) IEEE TDSC , vol.9 , Issue.6 , pp. 903-916
    • Tang, Y.1    Lee, P.P.C.2    Lui, J.C.S.3    Perlman, R.4
  • 266
    • 12944287797 scopus 로고    scopus 로고
    • SCALEA-G: A unified monitoring and performance analysis system for the grid
    • December 2004
    • H.-L. Truongc and T. Fahringer. 2004. SCALEA-G: A unified monitoring and performance analysis system for the grid. Scientific Programming 12, 4 (December 2004), 225-237.
    • (2004) Scientific Programming , vol.12 , Issue.4 , pp. 225-237
    • Truongc, H.-L.1    Fahringer, T.2
  • 267
    • 84863022550 scopus 로고    scopus 로고
    • Threat as a service? Virtualization's impact on cloud security
    • (January-February 2012)
    • H.-Y. Tsai, M. Siebenhaar, A. Miede, Y.-L. Huang, and R. Steinmetz. 2012. Threat as a service? virtualization's impact on cloud security. IT Professional 14, 1 (January-February 2012), 32-37.
    • (2012) IT Professional , vol.14 , Issue.1 , pp. 32-37
    • Tsai, H.-Y.1    Siebenhaar, M.2    Miede, A.3    Huang, Y.-L.4    Steinmetz, R.5
  • 269
    • 84969915329 scopus 로고    scopus 로고
    • Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds
    • (July 2013)
    • P. K. Tysowski and M. A. Hasan. 2013. Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE TCC 1, 2 (July 2013), 172-186.
    • (2013) IEEE TCC , vol.1 , Issue.2 , pp. 172-186
    • Tysowski, P.K.1    Hasan, M.A.2
  • 271
    • 70350405249 scopus 로고    scopus 로고
    • October. International Software Testing Qualifications Board (ISTQB). Retrieved from
    • E. van Veenendaal. October 2012. Standard glossary of terms used in Software Testing. International Software Testing Qualifications Board (ISTQB). Retrieved from http://www.istqb.org/downloads/finish/20/101.html.
    • (2012) Standard Glossary of Terms Used in Software Testing
    • Van Veenendaal, E.1
  • 272
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • (January 2011)
    • L. M. Vaquero, L. Rodero-Merino, and D. Moran. 2011. Locking the sky: A survey on IaaS cloud security. Computing 91, 1 (January 2011), 93-118.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Moran, D.3
  • 273
    • 84944333491 scopus 로고    scopus 로고
    • Secure and privacy-aware multiplexing of hardware-protected TPM integrity measurements among virtual machines
    • November 2013.
    • M. Velten and F. Stumpf. November 2013. Secure and privacy-aware multiplexing of hardware-protected TPM integrity measurements among virtual machines. In Proc. of ICISC 2012.
    • (2012) Proc. of ICISC
    • Velten, M.1    Stumpf, F.2
  • 274
    • 84863392301 scopus 로고    scopus 로고
    • HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
    • (April 2012)
    • Z.Wan, J. Liu, and R.-H. Deng. 2012. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE TIFS 7, 2 (April 2012), 743-754.
    • (2012) IEEE TIFS , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.-H.3
  • 275
    • 84893341393 scopus 로고    scopus 로고
    • Storing shared data on the cloud via security-mediator
    • July 2013
    • B.Wang, S. S. M. Chow, M. Li, and H. Li. July 2013a. Storing shared data on the cloud via security-mediator. In Proc. of IEEE ICDCS 2013.
    • (2013) Proc. of IEEE ICDCS
    • Wang, B.1    Chow, S.S.M.2    Li, M.3    Li, H.4
  • 276
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • B.Wang, B. Li, and H. Li. 2014. Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE TCC (2014).
    • (2014) IEEE TCC (2014)
    • Wang, B.1    Li, B.2    Li, H.3
  • 277
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • April 2013
    • B. Wang, B. Li, and H. Li. April 2013. Public auditing for shared data with efficient user revocation in the cloud. In Proc. of IEEE INFOCOM 2013.
    • (2013) Proc. of IEEE INFOCOM
    • Wang, B.1    Li, B.2    Li, H.3
  • 278
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • (August 2012)
    • C. Wang, N. Cao, K. Ren, and W. Lou. 2012. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23, 8 (August 2012), 1467-1479.
    • (2012) IEEE TPDS , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 279
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • (February 2013)
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. 2013b. Privacy-preserving public auditing for secure cloud storage. IEEE TC 62, 2 (February 2013), 362-375.
    • (2013) IEEE TC , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 280
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • (April 2012)
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. 2012. Toward secure and dependable storage services in cloud computing. IEEE TSC 5, 2 (April 2012), 220-232.
    • (2012) IEEE TSC , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 281
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • March 2010
    • C. Wang, Q. Wang, K. Ren, and W. Lou. March 2010. Privacy-preserving public auditing for data storage security in cloud computing. In Proc. of IEEE INFOCOM 2010.
    • (2010) Proc. of IEEE INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 282
    • 77953218351 scopus 로고    scopus 로고
    • Scalable run-time correlation engine for monitoring in a cloud computing environment
    • March
    • M. Wang, V. Holub, T. Parsons, J. Murphy, and P. O'Sullivan. March 2010. Scalable run-time correlation engine for monitoring in a cloud computing environment. In Proc. of IEEE ECBS 2010.
    • (2010) Proc. of IEEE ECBS 2010
    • Wang, M.1    Holub, V.2    Parsons, T.3    Murphy, J.4    O'Sullivan, P.5
  • 283
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • (May 2011)
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE TPDS 22, 5 (May 2011), 847-859.
    • (2011) IEEE TPDS , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 284
    • 79952380988 scopus 로고    scopus 로고
    • Modeling the runtime integrity of cloud servers: A scoped invariant perspective
    • November-December 2013
    • J. Wei, C. Pu, C. V. Rozas, A. Rajan, and F. Zhu. November-December 2013. Modeling the runtime integrity of cloud servers: A scoped invariant perspective. In Proc. of IEEE CloudCom 2010.
    • (2010) Proc. of IEEE CloudCom
    • Wei, J.1    Pu, C.2    Rozas, C.V.3    Rajan, A.4    Zhu, F.5
  • 285
    • 84938383580 scopus 로고    scopus 로고
    • Third-party private DFA evaluation on encrypted files in the cloud
    • September 2012
    • L. Wei and M. K. Reiter. September 2012. Third-party private DFA evaluation on encrypted files in the cloud. In Proc. of ESORICS 2012.
    • (2012) Proc. of ESORICS
    • Wei, L.1    Reiter, M.K.2
  • 286
    • 84938355388 scopus 로고    scopus 로고
    • Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
    • September. Egham, UK
    • L. Wei and M. K. Reiter. September 2013. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In Proc. of ESORICS 2013. Egham, UK.
    • (2013) Proc. of ESORICS 2013
    • Wei, L.1    Reiter, M.K.2
  • 287
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • April, (April April 2014)
    • L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos. April 2014. Security and privacy for storage and computation in cloud computing. Information Sciences 258 (April April 2014), 371-386.
    • (2014) Information Sciences , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 289
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • (April-June 2013)
    • Z. Xiao and Y. Xiao. 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials 15, 2 (April-June 2013), 843-859.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 290
    • 84885205587 scopus 로고    scopus 로고
    • SnortFlow: A openflow-based intrusion prevention system in cloud environment
    • March 2013
    • T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar. March 2013. SnortFlow: A openflow-based intrusion prevention system in cloud environment. In Proc. of GENI GREE 2012.
    • (2012) Proc. of GENI GREE
    • Xing, T.1    Huang, D.2    Xu, L.3    Chung, C.-J.4    Khatkar, P.5
  • 291
    • 84888848223 scopus 로고    scopus 로고
    • Software service signature (s3) for authentication in cloud computing
    • (December 2013)
    • L. Xu, X. Cao, Y. Zhang, and W. Wu. 2013a. Software service signature (s3) for authentication in cloud computing. Cluster Computing 16, 4 (December 2013), 905-914.
    • (2013) Cluster Computing , vol.16 , Issue.4 , pp. 905-914
    • Xu, L.1    Cao, X.2    Zhang, Y.3    Wu, W.4
  • 292
    • 84883084283 scopus 로고    scopus 로고
    • Proof-carrying cloud computation: The case of convex optimization
    • April 2013. Turin, Italy
    • Z. Xu, C. Wang, Q. Wang, K. Ren, and L. Wang. April 2013b. Proof-carrying cloud computation: The case of convex optimization. In Proc. of IEEE INFOCOM 2013. Turin, Italy.
    • (2013) Proc. of IEEE INFOCOM
    • Xu, Z.1    Wang, C.2    Wang, Q.3    Ren, K.4    Wang, L.5
  • 293
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • (September 2013)
    • K. Yang and X. Jia. 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE TPDS 24, 9 (September 2013), 1717-1726.
    • (2013) IEEE TPDS , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 294
    • 84883076035 scopus 로고    scopus 로고
    • AC-MACS: Effective data access control for multiauthority cloud storage systems
    • April 2013. Turin, Italy
    • K. Yang, X. Jia, K. Ren, and B. Zhang. April 2013. DAC-MACS: Effective data access control for multiauthority cloud storage systems. In Proc. of IEEE INFOCOM 2013. Turin, Italy.
    • (2013) Proc. of IEEE INFOCOM
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4
  • 295
    • 84877647239 scopus 로고    scopus 로고
    • Verifying cloud service level agreement
    • December . Anaheim, CA, USA
    • L. Ye, H. Zhang, J. Shi, and X. Du. December 2012. Verifying cloud service level agreement. In Proc. of IEEE GLOBECOM 2012. Anaheim, CA, USA.
    • (2012) Proc. of IEEE GLOBECOM 2012
    • Ye, L.1    Zhang, H.2    Shi, J.3    Du, X.4
  • 297
    • 84897586040 scopus 로고    scopus 로고
    • Toward secure multikeyword top-k retrieval over encrypted cloud data
    • (July 2013)
    • J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li. 2013a. Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE TDSC 10, 4 (July 2013), 239-250.
    • (2013) IEEE TDSC , vol.10 , Issue.4 , pp. 239-250
    • Yu, J.1    Lu, P.2    Zhu, Y.3    Xue, G.4    Li, M.5
  • 299
    • 84958591167 scopus 로고    scopus 로고
    • Can we beat DDoS attacks in clouds?
    • (July 2013)
    • S. Yu, Y. Tian, S. Guo, and D. Wu. 2013b. Can we beat DDoS attacks in clouds? IEEE TPDS (July 2013).
    • (2013) IEEE TPDS
    • Yu, S.1    Tian, Y.2    Guo, S.3    Wu, D.4
  • 300
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • March
    • S. Yu, C. Wang, K. Ren, and W. Lou. March 2010b. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proc. of IEEE INFOCOM 2010.
    • (2010) Proc. of IEEE INFOCOM 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 302
    • 79958738559 scopus 로고    scopus 로고
    • Risk-based security testing in cloud computing environments
    • March
    • P. Zech. March 2011. Risk-based security testing in cloud computing environments. In Proc. of IEEE ICST 2011.
    • (2011) Proc. of IEEE ICST 2011
    • Zech, P.1
  • 304
    • 84889019424 scopus 로고    scopus 로고
    • Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
    • November
    • Y. Zhang and M. K. Reiter. November 2013. Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In Proc. of ACM CCS 2013.
    • (2013) Proc. of ACM CCS 2013
    • Zhang, Y.1    Reiter, M.K.2
  • 305
    • 84858038685 scopus 로고    scopus 로고
    • Flexible service selection with user-specific QoS support in service-oriented architecture
    • (March 2012)
    • L. Zhao, Y. Ren, M. Li, and K. Sakurai. 2012. Flexible service selection with user-specific QoS support in service-oriented architecture. Journal of Network and Computer Applications 35, 3 (March 2012), 962-973.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 962-973
    • Zhao, L.1    Ren, Y.2    Li, M.3    Sakurai, K.4
  • 307
    • 84878830854 scopus 로고    scopus 로고
    • Dynamic audit services for outsourced storages in clouds
    • (April 2013)
    • Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu. 2013. Dynamic audit services for outsourced storages in clouds. IEEE TSC 6, 2 (April 2013), 227-238.
    • (2013) IEEE TSC , vol.6 , Issue.2 , pp. 227-238
    • Zhu, Y.1    Ahn, G.-J.2    Hu, H.3    Yau, S.S.4    An, H.G.5    Hu, C.-J.6
  • 309
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • (March 2012)
    • D. Zissis and D. Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems 28, 3 (March 2012), 583-592.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 310
    • 84885955735 scopus 로고    scopus 로고
    • Design and implementation of a trusted monitoring framework for cloud platforms
    • (October 2013)
    • D. Zou, W. Zhang, W. Qiang, G. Xiang, L. T. Yang, H. Jin, and K. Hu. 2013. Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems 29, 8 (October 2013), 2092-2102.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.8 , pp. 2092-2102
    • Zou, D.1    Zhang, W.2    Qiang, W.3    Xiang, G.4    Yang, L.T.5    Jin, H.6    Hu, K.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.