메뉴 건너뛰기




Volumn 85, Issue 1, 2015, Pages 77-99

Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body

Author keywords

Center; Certificate; Cloud; Computing; Security; Trust

Indexed keywords

CLOUD COMPUTING; CLOUDS; DISTRIBUTED DATABASE SYSTEMS; WEB SERVICES;

EID: 84944155677     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-015-2729-z     Document Type: Article
Times cited : (12)

References (39)
  • 1
    • 84944171038 scopus 로고    scopus 로고
    • Computing Curricula 2005. (2005). The overview report. The joint task force for computing curricula 2005 by ACM, AIS, IEEE-CS, 30 September 2005. Last accessed July 18, 2014
    • Computing Curricula 2005. (2005). The overview report. The joint task force for computing curricula 2005 by ACM, AIS, IEEE-CS, 30 September 2005. http://www.acm.org/education/curric_vols/CC2005-March06Final.pdf. Last accessed July 18, 2014.
  • 2
    • 84861307113 scopus 로고    scopus 로고
    • (2011). The NIST definition of cloud computing
    • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication 800-145, September 2011.
    • (2011) NIST Special Publication , pp. 145-800
    • Mell, P.1    Grance, T.2
  • 5
    • 84944155981 scopus 로고    scopus 로고
    • Potential and Impacts of Cloud Computing Services and Social Network Websites. In Science and technology options assessment report, PE 513.546, European Parliamentary Research Service, January 2014
    • Potential and Impacts of Cloud Computing Services and Social Network Websites. In Science and technology options assessment report, PE 513.546, European Parliamentary Research Service, January 2014.
  • 6
    • 84906534653 scopus 로고    scopus 로고
    • On protecting data storage in mobile cloud computing paradigm
    • Abdalla, A.-K. A., & Pathan, A.-K. A. (2014). On protecting data storage in mobile cloud computing paradigm. IETE Technical Review,31(1), 82–91. doi:10.1080/02564602.2014.891382.
    • (2014) IETE Technical Review , vol.31 , Issue.1 , pp. 82-91
    • Abdalla, A.-K.A.1    Pathan, A.-K.A.2
  • 11
    • 33745913622 scopus 로고    scopus 로고
    • B-Trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th international conference on Trust (iTrust’06), 2006, LNCS 3986
    • Quercia, D., Hailes, S., & Capra, L. (2006). B-Trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th international conference on Trust (iTrust’06), 2006, LNCS 3986, Springer, pp. 298–312.
    • (2006) Springer , pp. 298-312
    • Quercia, D.1    Hailes, S.2    Capra, L.3
  • 12
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Tabaki, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy,8(6), 24–31.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 24-31
    • Tabaki, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 13
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional,12(5), 20–27.
    • (2010) IT Professional , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 14
    • 78650536265 scopus 로고    scopus 로고
    • Protection of identity information in cloud computing without trusted third party. In 2010 29th IEEE symposium on reliable distributed systems
    • Ranchal, R., Bhargava, B., Othmane, L. B., Kim, A., Kang, M., & Linderman, M. (2010). Protection of identity information in cloud computing without trusted third party. In 2010 29th IEEE symposium on reliable distributed systems, October 31 2010–November 3 2010, pp. 368–372.
    • (2010) October 31 2010–November , vol.3 , Issue.2010 , pp. 368-372
    • Ranchal, R.1    Bhargava, B.2    Othmane, L.B.3    Kim, A.4    Kang, M.5    Linderman, M.6
  • 16
    • 84877872779 scopus 로고    scopus 로고
    • Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing
    • Li, X., & Du, J. (2013). Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing. IET Information Security,7(1), 39–50.
    • (2013) IET Information Security , vol.7 , Issue.1 , pp. 39-50
    • Li, X.1    Du, J.2
  • 19
    • 84887982439 scopus 로고    scopus 로고
    • Enabling dynamic data and indirect mutual trust for cloud computing storage systems
    • Barsoum, A., & Hasan, A. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems,24(12), 2375–2385.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.12 , pp. 2375-2385
    • Barsoum, A.1    Hasan, A.2
  • 20
    • 84903708116 scopus 로고    scopus 로고
    • MTBAC: A mutual trust based access control model in cloud computing
    • Lin, G., Wang, D., Bie, Y., & Lei, M. (2014). MTBAC: A mutual trust based access control model in cloud computing. China Communications,11(4), 154–162.
    • (2014) China Communications , vol.11 , Issue.4 , pp. 154-162
    • Lin, G.1    Wang, D.2    Bie, Y.3    Lei, M.4
  • 21
    • 84944155075 scopus 로고    scopus 로고
    • Pal, S., Khatua, S., Chaki, N., & Sanyal, S. (2012). A new trusted and collaborative agent based approach for ensuring cloud security. Annals of Faculty Engineering Hunedoara—International Journal of Engineering, 10(1), 71–78
    • Pal, S., Khatua, S., Chaki, N., & Sanyal, S. (2012). A new trusted and collaborative agent based approach for ensuring cloud security. Annals of Faculty Engineering Hunedoara—International Journal of Engineering, 10(1), 71–78.
  • 26
    • 84944162432 scopus 로고    scopus 로고
    • Building customer trust—A perspective on Service Organization Controls reporting options. In Technical report. PwC network, Canada. Last accessed July 26, 2014
    • Building customer trust—A perspective on Service Organization Controls reporting options. In Technical report. PwC network, Canada. http://www.pwc.com/en_CA/ca/controls/performance-assurance/publications/pwc-building-customer-trust-2013-10-en.pdf. Last accessed July 26, 2014.
  • 27
    • 84884344799 scopus 로고    scopus 로고
    • A detailed survey on various aspects of SQL injection in web applications: Vulnerabilities, innovative attacks and remedies
    • Kindy, D. A., & Pathan, A.-S. K. (2013). A detailed survey on various aspects of SQL injection in web applications: Vulnerabilities, innovative attacks and remedies. International Journal of Communication Networks and Information Security,5(2), 80–92.
    • (2013) International Journal of Communication Networks and Information Security , vol.5 , Issue.2 , pp. 80-92
    • Kindy, D.A.1    Pathan, A.-S.K.2
  • 28
    • 84874261558 scopus 로고    scopus 로고
    • DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices
    • Shin, J., Kim, Y., Park, W., & Park, C., (2012). DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices. In Proceedings of 2012 IEEE CloudCom, 3–6 December 2012, pp. 551–556.
    • (2012) In Proceedings of 2012 IEEE CloudCom, 3–6 December , vol.2012 , pp. 551-556
    • Shin, J.1    Kim, Y.2    Park, W.3    Park, C.4
  • 29
    • 79960576001 scopus 로고    scopus 로고
    • (2011). SDSM: A secure data service mechanism in mobile cloud computing
    • Jia, W., Zhu, H., Cao, Z., Wei, L., & Lin, X., (2011). SDSM: A secure data service mechanism in mobile cloud computing. In 2011 IEEE INFOCOM workshops, 1015 April 2011, pp. 1060–1065.
    • (2011) In 2011 IEEE INFOCOM workshops , vol.1015 , pp. 1060-1065
    • Jia, W.1    Zhu, H.2    Cao, Z.3    Wei, L.4    Lin, X.5
  • 30
    • 84944149812 scopus 로고    scopus 로고
    • Parann-Nissany, G. (2014). Top cloud computing security issues and solutions. May 5, 2014. Last accessed July 26, 2014
    • Parann-Nissany, G. (2014). Top cloud computing security issues and solutions. May 5, 2014. http://www.cloudave.com/34670/top-cloud-computing-security-issues-solutions/. Last accessed July 26, 2014.
  • 31
    • 85063830027 scopus 로고    scopus 로고
    • Cloud computing security: A survey
    • Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers,3, 1–35.
    • (2014) Computers , vol.3 , pp. 1-35
    • Khalil, I.M.1    Khreishah, A.2    Azeem, M.3
  • 32
    • 84944151684 scopus 로고    scopus 로고
    • Adams, M. (2014). Three ways to build customer trust. Forbes Magazine, 22 April, 2014. Last accessed July 26, 2014
    • Adams, M. (2014). Three ways to build customer trust. Forbes Magazine, 22 April, 2014. http://www.forbes.com/sites/yec/2014/04/22/three-ways-to-build-customer-trust/. Last accessed July 26, 2014.
  • 33
    • 84944176177 scopus 로고    scopus 로고
    • General information on ISO. Last accessed July 26, 2014
    • General information on ISO. http://www.iso.org/iso/support/faqs/faqs_general_information_on_iso.htm. Last accessed July 26, 2014.
  • 35
    • 84949544908 scopus 로고    scopus 로고
    • Mohammed, M. M. Z. E., & Pathan, A.-S. K. (2014). International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In The 11th IEEE international conference on autonomic and trusted computing (ATC-2014), December 9–12, 2014, Ayodya Resort, Bali, Indonesia
    • Mohammed, M. M. Z. E., & Pathan, A.-S. K. (2014). International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In The 11th IEEE international conference on autonomic and trusted computing (ATC-2014), December 9–12, 2014, Ayodya Resort, Bali, Indonesia.
  • 37
    • 84944175461 scopus 로고    scopus 로고
    • Cloud for Europe. Last accessed December 20, 2014
    • Cloud for Europe. http://ec.europa.eu/digital-agenda/en/news/cloud-europe-stage. Last accessed December 20, 2014.
  • 38
    • 84944162731 scopus 로고    scopus 로고
    • US Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft), NIST, USA, November 2011. Last accessed December 26, 2014
    • US Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (Draft), NIST, USA, November 2011. http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf. Last accessed December 26, 2014.
  • 39
    • 84944148346 scopus 로고    scopus 로고
    • US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption, NIST, USA, October 2014. Last accessed December 26, 2014
    • US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption, NIST, USA, October 2014. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-293.pdf. Last accessed December 26, 2014.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.