메뉴 건너뛰기




Volumn 9, Issue 1, 2016, Pages 138-151

Towards Achieving Data Security with the Cloud Computing Adoption Framework

Author keywords

Business Process Modeling Notation (BPMN); Cloud Computing Adoption Framework (CCAF); Data security in the Data Center; multi layered security protection; security framework

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; PERSONAL COMPUTING; PROCESS ENGINEERING; SYSTEMS ENGINEERING; VIRUSES;

EID: 84962038954     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2015.2491281     Document Type: Article
Times cited : (221)

References (34)
  • 2
    • 85017313616 scopus 로고    scopus 로고
    • Cloud computing-issues, research and implementations
    • M. A. Vouk, "Cloud computing-issues, research and implementations," J. Comput. Inf. Technol.-CIT, vol. 4, pp. 235-246, 2008.
    • (2008) J. Comput. Inf. Technol.-CIT , vol.4 , pp. 235-246
    • Vouk, M.A.1
  • 5
    • 84856030775 scopus 로고    scopus 로고
    • Using cloud computing in higher education: A strategy to improve agility in the current financial crisis
    • M. Mircea and A. I. Andreescu, "Using cloud computing in higher education: A strategy to improve agility in the current financial crisis," Commun. IBIMA, vol. 2011, pp. 1-15, 2011.
    • (2011) Commun. IBIMA , vol.2011 , pp. 1-15
    • Mircea, M.1    Andreescu, A.I.2
  • 9
    • 39649084637 scopus 로고    scopus 로고
    • Bioinformatics challenges of new sequencing technology
    • M. Pop and S. L. Salzberg, "Bioinformatics challenges of new sequencing technology," Trends Genetics, vol. 24, no. 3, pp. 142-149, 2008.
    • (2008) Trends Genetics , vol.24 , Issue.3 , pp. 142-149
    • Pop, M.1    Salzberg, S.L.2
  • 11
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: State-of-the-art and research challenges
    • Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," J. Internet Services Appl., vol. 1, no. 1, pp. 7-18, 2010.
    • (2010) J. Internet Services Appl. , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3
  • 12
    • 84878337116 scopus 로고    scopus 로고
    • A taxonomy of operational cyber security
    • Tech. Note: CMU/SEI-2010-TN-028, Pittsburgh, PA, USA, Dec.
    • J. J. Cebula and L. R. Young, "A taxonomy of operational cyber security," Softw. Eng. Inst., Tech. Note: CMU/SEI-2010-TN-028, Pittsburgh, PA, USA, Dec. 2010.
    • (2010) Softw. Eng. Inst.
    • Cebula, J.J.1    Young, L.R.2
  • 13
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Mar. 14-19
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, Mar. 14-19, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 14
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • Oct.
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. 17th ACM Conf. Comput. Commun. Security, Oct. 2010, pp. 735-737.
    • (2010) Proc. 17th ACM Conf. Comput. Commun. Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 15
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, "Toward a usage-based security framework for collaborative computing systems," ACM Trans. Inf. Syst. Security, vol. 11, no. 1, p. 3, 2008.
    • (2008) ACM Trans. Inf. Syst. Security , vol.11 , Issue.1 , pp. 3
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4
  • 19
    • 84901593266 scopus 로고    scopus 로고
    • Business intelligence as service in the cloud
    • V. Chang, "Business intelligence as service in the cloud," Future Gener. Comput. Syst., vol. 37, pp. 512-534, 2014.
    • (2014) Future Gener. Comput. Syst. , vol.37 , pp. 512-534
    • Chang, V.1
  • 21
    • 33751189883 scopus 로고    scopus 로고
    • Security quality requirements engineering (SQUARE)methodology
    • N. R. Mead, T. Stehney, "Security quality requirements engineering (SQUARE)methodology," ACM, vol. 30, no 4, pp. 1-7, 2005.
    • (2005) ACM , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Stehney, T.2
  • 22
    • 84961996013 scopus 로고    scopus 로고
    • Oracle9i Security Overview Release Number 2(9.2), accessed on 4th November [Online]
    • Oracle. (2012). Data Security Challenges. Oracle9i security overview release number 2(9.2), accessed on 4th November [Online]. Available: http://docs.oracle.com/cd/B10501-01/network.920/a96582/overview.htm
    • (2012) Data Security Challenges
  • 24
    • 84863037213 scopus 로고    scopus 로고
    • The study on data security in cloud computing based on virtualization
    • F. Wen, and L. Xiang, "The study on data security in cloud computing based on virtualization," in Proc. IEEE Int. Symp. IT Med. Edu., 2011, vol. 2, no. 1, pp. 257-261.
    • (2011) Proc. IEEE Int. Symp. IT Med. Edu. , vol.2 , Issue.1 , pp. 257-261
    • Wen, F.1    Xiang, L.2
  • 25
    • 2442679963 scopus 로고    scopus 로고
    • New York, NY, USA: Copernicus Books
    • B. Schneier, Beyond Fear. New York, NY, USA: Copernicus Books, 2003.
    • (2003) Beyond Fear
    • Schneier, B.1
  • 27
    • 84902078584 scopus 로고    scopus 로고
    • An interval-valued approach to business process simulation based on genetic algorithms and the BPMN
    • G. M. Cimino and G. Vaglini, "An interval-valued approach to business process simulation based on genetic algorithms and the BPMN," Information, vol. 5, pp. 319-356, 2014.
    • (2014) Information , vol.5 , pp. 319-356
    • Cimino, G.M.1    Vaglini, G.2
  • 28
    • 84873389836 scopus 로고    scopus 로고
    • An analysis of cloud computing security issues
    • Trivandrum, India, Nov.
    • A. Behl and K. Behl, "An analysis of cloud computing security issues," in Proc. World Congr. Inf. Commun. Technol., Trivandrum, India, Nov. 2012, pp. 109-114.
    • (2012) Proc. World Congr. Inf. Commun. Technol. , pp. 109-114
    • Behl, A.1    Behl, K.2
  • 29
    • 84900000372 scopus 로고    scopus 로고
    • Security as a service model for cloud environment
    • Mar.
    • V. Vardharajan and U. Tupakula, "Security as a service model for cloud environment," IEEE Trans. Netw. Service Manage., vol. 11, no. 1, pp. 60-75, Mar. 2014.
    • (2014) IEEE Trans. Netw. Service Manage , vol.11 , Issue.1 , pp. 60-75
    • Vardharajan, V.1    Tupakula, U.2
  • 30
    • 37249006310 scopus 로고    scopus 로고
    • About penetration testing
    • Nov./Dec.
    • M. Bishop, "About penetration testing," IEEE Security Privacy, vol. 5, no. 6, pp. 84-87, Nov./Dec. 2007.
    • (2007) IEEE Security Privacy , vol.5 , Issue.6 , pp. 84-87
    • Bishop, M.1
  • 31
    • 73349124466 scopus 로고    scopus 로고
    • The effect of perceived ethical performance of shopping websites on consumer trust
    • M. H. Yang, N. Chandlrees, B. Lin, and H. Y. Chao, "The effect of perceived ethical performance of shopping websites on consumer trust," J. Comput. Inf. Syst., vol. 50, no. 1, p. 15, 2009.
    • (2009) J. Comput. Inf. Syst. , vol.50 , Issue.1 , pp. 15
    • Yang, M.H.1    Chandlrees, N.2    Lin, B.3    Chao, H.Y.4
  • 33
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Gener. Comput. Syst., vol. 28, no. 3, pp. 583-592, 2012.
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 34
    • 84927724623 scopus 로고    scopus 로고
    • Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples
    • Mar./Apr.
    • N. Antunes and M. Vieira, "Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples," IEEE Trans. Services Comput., vol. 8, no. 2, pp. 269-283, Mar./Apr. 2015.
    • (2015) IEEE Trans. Services Comput. , vol.8 , Issue.2 , pp. 269-283
    • Antunes, N.1    Vieira, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.