-
1
-
-
84944171038
-
-
Computing Curricula 2005. (2005). The overview report. The joint task force for computing curricula 2005 by ACM, AIS, IEEE-CS, 30 September 2005. Last accessed July 18, 2014
-
Computing Curricula 2005. (2005). The overview report. The joint task force for computing curricula 2005 by ACM, AIS, IEEE-CS, 30 September 2005. http://www.acm.org/education/curric_vols/CC2005-March06Final.pdf. Last accessed July 18, 2014.
-
-
-
-
2
-
-
84861307113
-
(2011). The NIST definition of cloud computing
-
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication 800-145, September 2011.
-
(2011)
NIST Special Publication
, pp. 145-800
-
-
Mell, P.1
Grance, T.2
-
5
-
-
84944155981
-
-
Potential and Impacts of Cloud Computing Services and Social Network Websites. In Science and technology options assessment report, PE 513.546, European Parliamentary Research Service, January 2014
-
Potential and Impacts of Cloud Computing Services and Social Network Websites. In Science and technology options assessment report, PE 513.546, European Parliamentary Research Service, January 2014.
-
-
-
-
6
-
-
84906534653
-
On protecting data storage in mobile cloud computing paradigm
-
Abdalla, A.-K. A., & Pathan, A.-K. A. (2014). On protecting data storage in mobile cloud computing paradigm. IETE Technical Review,31(1), 82–91. doi:10.1080/02564602.2014.891382.
-
(2014)
IETE Technical Review
, vol.31
, Issue.1
, pp. 82-91
-
-
Abdalla, A.-K.A.1
Pathan, A.-K.A.2
-
7
-
-
79951788068
-
Formal trust specification in service workflows
-
Viriyasitavat, W., & Martin, A. (2010). Formal trust specification in service workflows. In 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC), 11–13 December, 2010, pp. 703–710.
-
(2010)
In 2010 IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC), 11–13 December
, vol.2010
, pp. 703-710
-
-
Viriyasitavat, W.1
Martin, A.2
-
8
-
-
84864579042
-
A survey of trust in workflows and relevant contexts
-
Viriyasitavat, W., & Martin, A. (2012). A survey of trust in workflows and relevant contexts. IEEE Communications Surveys & Tutorials,14(3), 911–940.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.3
, pp. 911-940
-
-
Viriyasitavat, W.1
Martin, A.2
-
10
-
-
0009481412
-
A survey of trust in internet applications
-
Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials,3(4), 2–16.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
11
-
-
33745913622
-
B-Trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th international conference on Trust (iTrust’06), 2006, LNCS 3986
-
Quercia, D., Hailes, S., & Capra, L. (2006). B-Trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th international conference on Trust (iTrust’06), 2006, LNCS 3986, Springer, pp. 298–312.
-
(2006)
Springer
, pp. 298-312
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
12
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Tabaki, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy,8(6), 24–31.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Tabaki, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
13
-
-
77957700442
-
Establishing trust in cloud computing
-
Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional,12(5), 20–27.
-
(2010)
IT Professional
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
14
-
-
78650536265
-
Protection of identity information in cloud computing without trusted third party. In 2010 29th IEEE symposium on reliable distributed systems
-
Ranchal, R., Bhargava, B., Othmane, L. B., Kim, A., Kang, M., & Linderman, M. (2010). Protection of identity information in cloud computing without trusted third party. In 2010 29th IEEE symposium on reliable distributed systems, October 31 2010–November 3 2010, pp. 368–372.
-
(2010)
October 31 2010–November
, vol.3
, Issue.2010
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.B.3
Kim, A.4
Kang, M.5
Linderman, M.6
-
15
-
-
30944450208
-
A reputation and trust management broker framework for web applications
-
Lin, K.-J., Lu, H., Yu, T., & Tai, C.-E. (2005). A reputation and trust management broker framework for web applications. In The 2005 IEEE international conference on e-technology, e-Commerce and e-Service, 2005 (EEE ‘05), 29 March–1 April 2005, pp. 262–269.
-
(2005)
In The 2005 IEEE international conference on e-technology, e-Commerce and e-Service, 2005 (EEE ‘05), 29 March–1 April
, vol.2005
, pp. 262-269
-
-
Lin, K.-J.1
Lu, H.2
Yu, T.3
Tai, C.-E.4
-
16
-
-
84877872779
-
Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing
-
Li, X., & Du, J. (2013). Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing. IET Information Security,7(1), 39–50.
-
(2013)
IET Information Security
, vol.7
, Issue.1
, pp. 39-50
-
-
Li, X.1
Du, J.2
-
17
-
-
84874432769
-
QoS based trust management model for Cloud IaaS
-
Goyal, M. K., Gupta, P., Aggarwal, A., & Kumar, P. (2012). QoS based trust management model for Cloud IaaS. In 2012 2nd IEEE international conference on parallel distributed and grid computing (PDGC), 6–8 December 2012, pp. 843–847.
-
(2012)
In 2012 2nd IEEE international conference on parallel distributed and grid computing (PDGC), 6–8 December
, vol.2012
, pp. 843-847
-
-
Goyal, M.K.1
Gupta, P.2
Aggarwal, A.3
Kumar, P.4
-
18
-
-
84898885977
-
A new trust evaluation method based on reliability of customer feedback for cloud computing
-
Raghebi, Z., & Hashemi, M. R., (2013). A new trust evaluation method based on reliability of customer feedback for cloud computing. In 2013 10th international ISC conference on information security and cryptology (ISCISC), 29–30 August 2013, pp. 1–6.
-
(2013)
In 2013 10th international ISC conference on information security and cryptology (ISCISC), 29–30 August
, vol.2013
, pp. 1-6
-
-
Raghebi, Z.1
Hashemi, M.R.2
-
19
-
-
84887982439
-
Enabling dynamic data and indirect mutual trust for cloud computing storage systems
-
Barsoum, A., & Hasan, A. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems,24(12), 2375–2385.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.12
, pp. 2375-2385
-
-
Barsoum, A.1
Hasan, A.2
-
20
-
-
84903708116
-
MTBAC: A mutual trust based access control model in cloud computing
-
Lin, G., Wang, D., Bie, Y., & Lei, M. (2014). MTBAC: A mutual trust based access control model in cloud computing. China Communications,11(4), 154–162.
-
(2014)
China Communications
, vol.11
, Issue.4
, pp. 154-162
-
-
Lin, G.1
Wang, D.2
Bie, Y.3
Lei, M.4
-
21
-
-
84944155075
-
-
Pal, S., Khatua, S., Chaki, N., & Sanyal, S. (2012). A new trusted and collaborative agent based approach for ensuring cloud security. Annals of Faculty Engineering Hunedoara—International Journal of Engineering, 10(1), 71–78
-
Pal, S., Khatua, S., Chaki, N., & Sanyal, S. (2012). A new trusted and collaborative agent based approach for ensuring cloud security. Annals of Faculty Engineering Hunedoara—International Journal of Engineering, 10(1), 71–78.
-
-
-
-
22
-
-
77949396580
-
Trust management system for grid and cloud resources
-
Manuel, P. D., Selvi, S. T., & Barr, M. I. A.-E. (2009). Trust management system for grid and cloud resources. In First international conference on advanced computing, 2009 (ICAC 2009), 13–15 December 2009, pp. 176–181.
-
(2009)
In First international conference on advanced computing, 2009 (ICAC 2009), 13–15 December
, vol.2009
, pp. 176-181
-
-
Manuel, P.D.1
Selvi, S.T.2
Barr, M.I.A.-E.3
-
23
-
-
70450222501
-
CARE resource broker: A framework for scheduling and supporting virtual resource management
-
Somasundaram, T. S., Amarnath, B. R., Kumar, R., Balakrishnan, P., Rajendar, K., Rajiv, R., et al. (2010). CARE resource broker: A framework for scheduling and supporting virtual resource management. Future Generation Computer Systems,26, 337–347.
-
(2010)
Future Generation Computer Systems
, vol.26
, pp. 337-347
-
-
Somasundaram, T.S.1
Amarnath, B.R.2
Kumar, R.3
Balakrishnan, P.4
Rajendar, K.5
Rajiv, R.6
Kannan, G.7
Britto, G.R.8
Mahendran, E.9
Madusudhanan, B.10
-
24
-
-
84926426306
-
Trust as a facilitator in cloud computing: a survey
-
Habib, S. M., Hauke, S., Ries, S., & Mühlhäuser, M. (2012). Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing: Advances, Systems and Applications,. doi:10.1186/2192-113X-1-19.
-
(2012)
Journal of Cloud Computing: Advances, Systems and Applications
-
-
Habib, S.M.1
Hauke, S.2
Ries, S.3
Mühlhäuser, M.4
-
25
-
-
84899561938
-
Lethality of SQL injection against current and future internet-technologies
-
Pathan, A.-S. K., & Kindy, D. A. (2014). Lethality of SQL injection against current and future internet-technologies. International Journal of Computational Science and Engineering,9(4), 386–394.
-
(2014)
International Journal of Computational Science and Engineering
, vol.9
, Issue.4
, pp. 386-394
-
-
Pathan, A.-S.K.1
Kindy, D.A.2
-
26
-
-
84944162432
-
-
Building customer trust—A perspective on Service Organization Controls reporting options. In Technical report. PwC network, Canada. Last accessed July 26, 2014
-
Building customer trust—A perspective on Service Organization Controls reporting options. In Technical report. PwC network, Canada. http://www.pwc.com/en_CA/ca/controls/performance-assurance/publications/pwc-building-customer-trust-2013-10-en.pdf. Last accessed July 26, 2014.
-
-
-
-
27
-
-
84884344799
-
A detailed survey on various aspects of SQL injection in web applications: Vulnerabilities, innovative attacks and remedies
-
Kindy, D. A., & Pathan, A.-S. K. (2013). A detailed survey on various aspects of SQL injection in web applications: Vulnerabilities, innovative attacks and remedies. International Journal of Communication Networks and Information Security,5(2), 80–92.
-
(2013)
International Journal of Communication Networks and Information Security
, vol.5
, Issue.2
, pp. 80-92
-
-
Kindy, D.A.1
Pathan, A.-S.K.2
-
28
-
-
84874261558
-
DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices
-
Shin, J., Kim, Y., Park, W., & Park, C., (2012). DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices. In Proceedings of 2012 IEEE CloudCom, 3–6 December 2012, pp. 551–556.
-
(2012)
In Proceedings of 2012 IEEE CloudCom, 3–6 December
, vol.2012
, pp. 551-556
-
-
Shin, J.1
Kim, Y.2
Park, W.3
Park, C.4
-
29
-
-
79960576001
-
(2011). SDSM: A secure data service mechanism in mobile cloud computing
-
Jia, W., Zhu, H., Cao, Z., Wei, L., & Lin, X., (2011). SDSM: A secure data service mechanism in mobile cloud computing. In 2011 IEEE INFOCOM workshops, 1015 April 2011, pp. 1060–1065.
-
(2011)
In 2011 IEEE INFOCOM workshops
, vol.1015
, pp. 1060-1065
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
30
-
-
84944149812
-
-
Parann-Nissany, G. (2014). Top cloud computing security issues and solutions. May 5, 2014. Last accessed July 26, 2014
-
Parann-Nissany, G. (2014). Top cloud computing security issues and solutions. May 5, 2014. http://www.cloudave.com/34670/top-cloud-computing-security-issues-solutions/. Last accessed July 26, 2014.
-
-
-
-
31
-
-
85063830027
-
Cloud computing security: A survey
-
Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers,3, 1–35.
-
(2014)
Computers
, vol.3
, pp. 1-35
-
-
Khalil, I.M.1
Khreishah, A.2
Azeem, M.3
-
32
-
-
84944151684
-
-
Adams, M. (2014). Three ways to build customer trust. Forbes Magazine, 22 April, 2014. Last accessed July 26, 2014
-
Adams, M. (2014). Three ways to build customer trust. Forbes Magazine, 22 April, 2014. http://www.forbes.com/sites/yec/2014/04/22/three-ways-to-build-customer-trust/. Last accessed July 26, 2014.
-
-
-
-
33
-
-
84944176177
-
-
General information on ISO. Last accessed July 26, 2014
-
General information on ISO. http://www.iso.org/iso/support/faqs/faqs_general_information_on_iso.htm. Last accessed July 26, 2014.
-
-
-
-
34
-
-
80055049518
-
Secret program execution in the cloud applying homomorphic encryption
-
Brenner, M., Wiebelitz, J., Voigt, G. V., & Smith, M. (2011). Secret program execution in the cloud applying homomorphic encryption. In 2011 Proceedings of 5th IEEE DEST, 31 May–3 June 2011, pp. 114–119.
-
(2011)
In 2011 Proceedings of 5th IEEE DEST, 31 May–3 June
, vol.2011
, pp. 114-119
-
-
Brenner, M.1
Wiebelitz, J.2
Voigt, G.V.3
Smith, M.4
-
35
-
-
84949544908
-
-
Mohammed, M. M. Z. E., & Pathan, A.-S. K. (2014). International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In The 11th IEEE international conference on autonomic and trusted computing (ATC-2014), December 9–12, 2014, Ayodya Resort, Bali, Indonesia
-
Mohammed, M. M. Z. E., & Pathan, A.-S. K. (2014). International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In The 11th IEEE international conference on autonomic and trusted computing (ATC-2014), December 9–12, 2014, Ayodya Resort, Bali, Indonesia.
-
-
-
-
37
-
-
84944175461
-
-
Cloud for Europe. Last accessed December 20, 2014
-
Cloud for Europe. http://ec.europa.eu/digital-agenda/en/news/cloud-europe-stage. Last accessed December 20, 2014.
-
-
-
-
38
-
-
84944162731
-
-
US Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft), NIST, USA, November 2011. Last accessed December 26, 2014
-
US Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft), NIST, USA, November 2011. http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf. Last accessed December 26, 2014.
-
-
-
-
39
-
-
84944148346
-
-
US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption, NIST, USA, October 2014. Last accessed December 26, 2014
-
US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption, NIST, USA, October 2014. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-293.pdf. Last accessed December 26, 2014.
-
-
-
|