메뉴 건너뛰기




Volumn 57, Issue , 2016, Pages 24-41

Cloud computing adoption framework: A security framework for business clouds

Author keywords

CCAF multi layered security; Cloud computing adoption framework (CCAF); OpenStack; Security for business clouds

Indexed keywords

BIG DATA; BLENDING; CLOUD COMPUTING; MALWARE; QUERY LANGUAGES; VIRUSES;

EID: 84949545363     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2015.09.031     Document Type: Article
Times cited : (255)

References (33)
  • 1
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • X. Zhang, M. Nakae, M.J. Covington, and R. Sandhu Toward a usage-based security framework for collaborative computing systems ACM Trans. Inf. Syst. Secur. 11 1 2008 3
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.11 , Issue.1 , pp. 3
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4
  • 6
    • 84902317248 scopus 로고    scopus 로고
    • Cloud storage and bioinformatics in a private cloud deployment: Lessons for data intensive research
    • Springer International Publishing
    • V. Chang, R.J. Walters, and G. Wills Cloud storage and bioinformatics in a private cloud deployment: Lessons for data intensive research Cloud Computing and Services Science 2013 Springer International Publishing 245 264
    • (2013) Cloud Computing and Services Science , pp. 245-264
    • Chang, V.1    Walters, R.J.2    Wills, G.3
  • 12
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 17
    • 79956072588 scopus 로고    scopus 로고
    • Scalable SQL and NoSQL data stores
    • R. Cattell Scalable SQL and NoSQL data stores ACM SIGMOD Rec. 39 4 2010 12 27
    • (2010) ACM SIGMOD Rec. , vol.39 , Issue.4 , pp. 12-27
    • Cattell, R.1
  • 21
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inf. Theory 29 2 1983 198 208
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 22
    • 0027308007 scopus 로고
    • Cascade ciphers: The importance of being first
    • U.M. Maurer, and J.L. Massey Cascade ciphers: The importance of being first J. Cryptol. 6 1 1993 55 61
    • (1993) J. Cryptol. , vol.6 , Issue.1 , pp. 55-61
    • Maurer, U.M.1    Massey, J.L.2
  • 23
    • 84868349605 scopus 로고    scopus 로고
    • Stronger key derivation via sequential memory-hard functions
    • C. Percival, Stronger key derivation via sequential memory-hard functions, in: The BSD Conference, BSDCan, May, 2009.
    • (2009) The BSD Conference, BSDCan, May
    • Percival, C.1
  • 26
    • 84977864689 scopus 로고    scopus 로고
    • Towards data security with the cloud computing adoption framework
    • V. Chang, and M. Ramachandran Towards data security with the cloud computing adoption framework IEEE Trans. Serv. Comput. 8 6 2015
    • (2015) IEEE Trans. Serv. Comput. , vol.8 , Issue.6
    • Chang, V.1    Ramachandran, M.2
  • 27
    • 84927724623 scopus 로고    scopus 로고
    • Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples
    • N. Antunes, and M. Vieira Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples IEEE Trans. Serv. Comput. 8 2 2015 269 283
    • (2015) IEEE Trans. Serv. Comput. , vol.8 , Issue.2 , pp. 269-283
    • Antunes, N.1    Vieira, M.2
  • 31
    • 0038562418 scopus 로고    scopus 로고
    • NIST Publication 800-12, downloaded from
    • NIST, An introduction to computer security. Publication 800-12, 1996, downloaded from http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf.
    • (1996) An Introduction to Computer Security


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.