메뉴 건너뛰기




Volumn , Issue , 2014, Pages 922-927

Analysis of SDN contributions for cloud computing security

Author keywords

Cloud Computing; Security; Software Defined Networking

Indexed keywords

CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; MOBILE SECURITY; NETWORK ARCHITECTURE;

EID: 84946690824     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UCC.2014.150     Document Type: Conference Paper
Times cited : (14)

References (38)
  • 1
    • 84923699471 scopus 로고    scopus 로고
    • NIST Last access in: Julho
    • NIST, "Final Version of Cloud Computing Definition Published." 2014, available online: http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf. Last access in: Julho 2014
    • (2014) Final Version of Cloud Computing Definition Published
  • 4
    • 85063830027 scopus 로고    scopus 로고
    • Cloud computing security: A survey
    • I. M. Khalil, A. Khreishah, and M. Azeem, "Cloud computing security: A survey," Computers, vol. 3, no. 1, pp. 1-35, 2014. [Online]. Available: http://www. mdpi. com/2073-431X/3/1/1
    • (2014) Computers , vol.3 , Issue.1 , pp. 1-35
    • Khalil, I.M.1    Khreishah, A.2    Azeem, M.3
  • 10
    • 84904165732 scopus 로고    scopus 로고
    • Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions
    • May
    • A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, "Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions," in Network Operations and Management Symposium (NOMS), 2014 IEEE, May 2014, pp. 1-9
    • (2014) Network Operations and Management Symposium (NOMS), 2014 IEEE , pp. 1-9
    • Zaalouk, A.1    Khondoker, R.2    Marx, R.3    Bayarou, K.4
  • 12
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • S. Pearson and G. Yee, Eds. Springer London
    • S. Pearson, "Privacy, Security and Trust in Cloud Computing," in Privacy and Security for Cloud Computing, ser. Computer Communications and Networks, S. Pearson and G. Yee, Eds. Springer London, 2013, pp. 3-42. [Online]. Available: http://dx. doi. org/10. 1007/ 978-1-4471-4189-1\ 1
    • (2013) Privacy and Security for Cloud Computing, Ser. Computer Communications and Networks , pp. 3-42
    • Pearson, S.1
  • 15
    • 84893597549 scopus 로고    scopus 로고
    • The controller placement problem
    • Sep.
    • B. Heller, R. Sherwood, and N. McKeown, "The controller placement problem," SIGCOMM Comput. Commun. Rev., vol. 42, no. 4, pp. 473-478, Sep. 2012. [Online]. Available: http://doi. acm. org/10. 1145/ 2377677. 2377767
    • (2012) SIGCOMM Comput. Commun. Rev. , vol.42 , Issue.4 , pp. 473-478
    • Heller, B.1    Sherwood, R.2    McKeown, N.3
  • 30
    • 84874562245 scopus 로고    scopus 로고
    • Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
    • Oct
    • S. Shin and G. Gu, "Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in Network Protocols (ICNP), 2012 20th IEEE International Conference on, Oct 2012, pp. 1-6
    • (2012) Network Protocols (ICNP), 2012 20th IEEE International Conference on , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 32
    • 84864275241 scopus 로고    scopus 로고
    • Qos-aware network operating system for software defined networking with generalized openflows
    • April
    • K. Jeong, J. Kim, and Y.-T. Kim, "Qos-aware network operating system for software defined networking with generalized openflows," in Network Operations and Management Symposium (NOMS), 2012 IEEE, April 2012, pp. 1167-1174
    • (2012) Network Operations and Management Symposium (NOMS), 2012 IEEE , pp. 1167-1174
    • Jeong, K.1    Kim, J.2    Kim, Y.-T.3
  • 34
    • 84857170570 scopus 로고    scopus 로고
    • Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
    • Dec
    • A. Behl, "Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation," in Information and Communication Technologies (WICT), 2011 World Congress on, Dec 2011, pp. 217-222
    • (2011) Information and Communication Technologies (WICT), 2011 World Congress on , pp. 217-222
    • Behl, A.1
  • 35
    • 84886738282 scopus 로고    scopus 로고
    • Multi-tenant network monitoring based on software defined networking
    • R. Meersman, H. Panetto, T. Dillon, J. Eder, Z. Bellahsene, N. Ritter, P. De Leenheer, and D. Dou, Eds. Springer Berlin Heidelberg
    • A. TaheriMonfared and C. Rong, "Multi-tenant network monitoring based on software defined networking," in On the Move to Meaningful Internet Systems: OTM 2013 Conferences, ser. Lecture Notes in Computer Science, R. Meersman, H. Panetto, T. Dillon, J. Eder, Z. Bellahsene, N. Ritter, P. De Leenheer, and D. Dou, Eds. Springer Berlin Heidelberg, 2013, vol. 8185, pp. 327-341. [Online]. Available: http://dx. doi. org/10. 1007/978-3-642-41030-7 24
    • (2013) On the Move to Meaningful Internet Systems: OTM 2013 Conferences, Ser. Lecture Notes in Computer Science , vol.8185 , pp. 327-341
    • Taherimonfared, A.1    Rong, C.2
  • 38
    • 84902545598 scopus 로고    scopus 로고
    • Resource management in iaas cloud platforms made flexible through programmability
    • communications and Networking in the Cloud
    • J. A. Wickboldt, R. P. Esteves, M. B. de Carvalho, and L. Z. Granville, "Resource management in iaas cloud platforms made flexible through programmability," Computer Networks, vol. 68, no. 0, pp. 54-70, 2014, communications and Networking in the Cloud.
    • (2014) Computer Networks , vol.68 , Issue.0 , pp. 54-70
    • Wickboldt, J.A.1    Esteves, R.P.2    De Carvalho, M.B.3    Granville, L.Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.