-
1
-
-
79951515545
-
Cloud computing - The business perspective
-
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing - The business perspective," Decision Support Syst., vol. 51, no. 1, pp. 176-189, 2011.
-
(2011)
Decision Support Syst.
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
2
-
-
85017313616
-
Cloud computing-issues, research and implementations
-
M. A. Vouk, "Cloud computing-issues, research and implementations," J. Comput. Inf. Technol.-CIT, vol. 4, pp. 235-246, 2008.
-
(2008)
J. Comput. Inf. Technol.-CIT
, vol.4
, pp. 235-246
-
-
Vouk, M.A.1
-
3
-
-
64749093541
-
Use of electronic health records in US hospitals
-
A. K. Jha, C. M. DesRoches, E. G. Campbell, K. Donelan, S. R. Rao, T. G. Ferris, and D. Blumenthal, "Use of electronic health records in US hospitals," New England J. Med., vol. 360, no. 16, pp. 1628-1638, 2009.
-
(2009)
New England J. Med.
, vol.360
, Issue.16
, pp. 1628-1638
-
-
Jha, A.K.1
DesRoches, C.M.2
Campbell, E.G.3
Donelan, K.4
Rao, S.R.5
Ferris, T.G.6
Blumenthal, D.7
-
4
-
-
84893590197
-
Financial cloud: Open cloud framework of derivative pricing
-
Sep.
-
H. T. Peng, W. W. Hsu, C. H. Chen, F. Lai, and J. M. Ho, "Financial cloud: open cloud framework of derivative pricing," in Proc. Int. Conf. Social Comput., Sep. 2013, pp. 782-789.
-
(2013)
Proc. Int. Conf. Social Comput.
, pp. 782-789
-
-
Peng, H.T.1
Hsu, W.W.2
Chen, C.H.3
Lai, F.4
Ho, J.M.5
-
5
-
-
84856030775
-
Using cloud computing in higher education: A strategy to improve agility in the current financial crisis
-
M. Mircea and A. I. Andreescu, "Using cloud computing in higher education: A strategy to improve agility in the current financial crisis," Commun. IBIMA, vol. 2011, pp. 1-15, 2011.
-
(2011)
Commun. IBIMA
, vol.2011
, pp. 1-15
-
-
Mircea, M.1
Andreescu, A.I.2
-
6
-
-
77950347409
-
Above the clouds: A Berkeley view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A Berkeley view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
7
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Sep.
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," in Proc. 11th IEEE Int. Requirements Eng. Conf., Sep. 2003, pp. 151-161.
-
(2003)
Proc. 11th IEEE Int. Requirements Eng. Conf.
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
8
-
-
77949842100
-
-
Sebastopol, CA, USA: O'Reilly Media
-
T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Sebastopol, CA, USA: O'Reilly Media, 2009.
-
(2009)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
9
-
-
39649084637
-
Bioinformatics challenges of new sequencing technology
-
M. Pop and S. L. Salzberg, "Bioinformatics challenges of new sequencing technology," Trends Genetics, vol. 24, no. 3, pp. 142-149, 2008.
-
(2008)
Trends Genetics
, vol.24
, Issue.3
, pp. 142-149
-
-
Pop, M.1
Salzberg, S.L.2
-
10
-
-
74949093980
-
The cost of a cloud: Research problems in data center networks
-
A. Greenberg, A. J. Hamilton, D. A. Maltz, and P. Patel, "The cost of a cloud: Research problems in data center networks," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 68-73, 2008.
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 68-73
-
-
Greenberg, A.1
Hamilton, A.J.2
Maltz, D.A.3
Patel, P.4
-
11
-
-
78649302229
-
Cloud computing: State-of-the-art and research challenges
-
Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," J. Internet Services Appl., vol. 1, no. 1, pp. 7-18, 2010.
-
(2010)
J. Internet Services Appl.
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
12
-
-
84878337116
-
A taxonomy of operational cyber security
-
Tech. Note: CMU/SEI-2010-TN-028, Pittsburgh, PA, USA, Dec.
-
J. J. Cebula and L. R. Young, "A taxonomy of operational cyber security," Softw. Eng. Inst., Tech. Note: CMU/SEI-2010-TN-028, Pittsburgh, PA, USA, Dec. 2010.
-
(2010)
Softw. Eng. Inst.
-
-
Cebula, J.J.1
Young, L.R.2
-
13
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Mar. 14-19
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, Mar. 14-19, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
14
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
Oct.
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. 17th ACM Conf. Comput. Commun. Security, Oct. 2010, pp. 735-737.
-
(2010)
Proc. 17th ACM Conf. Comput. Commun. Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
15
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, "Toward a usage-based security framework for collaborative computing systems," ACM Trans. Inf. Syst. Security, vol. 11, no. 1, p. 3, 2008.
-
(2008)
ACM Trans. Inf. Syst. Security
, vol.11
, Issue.1
, pp. 3
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
18
-
-
84902317248
-
-
New York, NY, USA: Springer CLOSER 2012, CCIS 367
-
V. Chang, R. J. Walters, and G. Wills, Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research. New York, NY, USA: Springer CLOSER 2012, CCIS 367, pp. 245-264, 2013.
-
(2013)
Cloud Storage and Bioinformatics in A Private Cloud Deployment: Lessons for Data Intensive Research
, pp. 245-264
-
-
Chang, V.1
Walters, R.J.2
Wills, G.3
-
19
-
-
84901593266
-
Business intelligence as service in the cloud
-
V. Chang, "Business intelligence as service in the cloud," Future Gener. Comput. Syst., vol. 37, pp. 512-534, 2014.
-
(2014)
Future Gener. Comput. Syst.
, vol.37
, pp. 512-534
-
-
Chang, V.1
-
20
-
-
39449099894
-
Security requirements for rest of us: A survey
-
Jan./Feb.
-
I. A. Tondel et al., "Security requirements for rest of us: A survey," IEEE Softw., Special Issue Security Agile Requirement Eng. Methods, vol. 25, no. 1, pp. 20-27, Jan./Feb. 2008.
-
(2008)
IEEE Softw., Special Issue Security Agile Requirement Eng. Methods
, vol.25
, Issue.1
, pp. 20-27
-
-
Tondel, I.A.1
-
21
-
-
33751189883
-
Security quality requirements engineering (SQUARE)methodology
-
N. R. Mead, T. Stehney, "Security quality requirements engineering (SQUARE)methodology," ACM, vol. 30, no 4, pp. 1-7, 2005.
-
(2005)
ACM
, vol.30
, Issue.4
, pp. 1-7
-
-
Mead, N.R.1
Stehney, T.2
-
22
-
-
84961996013
-
-
Oracle9i Security Overview Release Number 2(9.2), accessed on 4th November [Online]
-
Oracle. (2012). Data Security Challenges. Oracle9i security overview release number 2(9.2), accessed on 4th November [Online]. Available: http://docs.oracle.com/cd/B10501-01/network.920/a96582/overview.htm
-
(2012)
Data Security Challenges
-
-
-
23
-
-
84880091985
-
Cloud computing: Towards case study of data security mechanism
-
Jul.
-
V. Kumar, M. S. Swetha, M. S. Muneshwara, and S. Prakash "Cloud computing: Towards case study of data security mechanism," Int. J. Adv. Technol. Eng. Res., vol. 2, no. 4, pp. 1-8, Jul. 2012.
-
(2012)
Int. J. Adv. Technol. Eng. Res.
, vol.2
, Issue.4
, pp. 1-8
-
-
Kumar, V.1
Swetha, M.S.2
Muneshwara, M.S.3
Prakash, S.4
-
24
-
-
84863037213
-
The study on data security in cloud computing based on virtualization
-
F. Wen, and L. Xiang, "The study on data security in cloud computing based on virtualization," in Proc. IEEE Int. Symp. IT Med. Edu., 2011, vol. 2, no. 1, pp. 257-261.
-
(2011)
Proc. IEEE Int. Symp. IT Med. Edu.
, vol.2
, Issue.1
, pp. 257-261
-
-
Wen, F.1
Xiang, L.2
-
25
-
-
2442679963
-
-
New York, NY, USA: Copernicus Books
-
B. Schneier, Beyond Fear. New York, NY, USA: Copernicus Books, 2003.
-
(2003)
Beyond Fear
-
-
Schneier, B.1
-
27
-
-
84902078584
-
An interval-valued approach to business process simulation based on genetic algorithms and the BPMN
-
G. M. Cimino and G. Vaglini, "An interval-valued approach to business process simulation based on genetic algorithms and the BPMN," Information, vol. 5, pp. 319-356, 2014.
-
(2014)
Information
, vol.5
, pp. 319-356
-
-
Cimino, G.M.1
Vaglini, G.2
-
28
-
-
84873389836
-
An analysis of cloud computing security issues
-
Trivandrum, India, Nov.
-
A. Behl and K. Behl, "An analysis of cloud computing security issues," in Proc. World Congr. Inf. Commun. Technol., Trivandrum, India, Nov. 2012, pp. 109-114.
-
(2012)
Proc. World Congr. Inf. Commun. Technol.
, pp. 109-114
-
-
Behl, A.1
Behl, K.2
-
29
-
-
84900000372
-
Security as a service model for cloud environment
-
Mar.
-
V. Vardharajan and U. Tupakula, "Security as a service model for cloud environment," IEEE Trans. Netw. Service Manage., vol. 11, no. 1, pp. 60-75, Mar. 2014.
-
(2014)
IEEE Trans. Netw. Service Manage
, vol.11
, Issue.1
, pp. 60-75
-
-
Vardharajan, V.1
Tupakula, U.2
-
30
-
-
37249006310
-
About penetration testing
-
Nov./Dec.
-
M. Bishop, "About penetration testing," IEEE Security Privacy, vol. 5, no. 6, pp. 84-87, Nov./Dec. 2007.
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.6
, pp. 84-87
-
-
Bishop, M.1
-
31
-
-
73349124466
-
The effect of perceived ethical performance of shopping websites on consumer trust
-
M. H. Yang, N. Chandlrees, B. Lin, and H. Y. Chao, "The effect of perceived ethical performance of shopping websites on consumer trust," J. Comput. Inf. Syst., vol. 50, no. 1, p. 15, 2009.
-
(2009)
J. Comput. Inf. Syst.
, vol.50
, Issue.1
, pp. 15
-
-
Yang, M.H.1
Chandlrees, N.2
Lin, B.3
Chao, H.Y.4
-
32
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Oct.
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th ACM Conf. Comput. Commun. Security, Oct., 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
33
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Gener. Comput. Syst., vol. 28, no. 3, pp. 583-592, 2012.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
34
-
-
84927724623
-
Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples
-
Mar./Apr.
-
N. Antunes and M. Vieira, "Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples," IEEE Trans. Services Comput., vol. 8, no. 2, pp. 269-283, Mar./Apr. 2015.
-
(2015)
IEEE Trans. Services Comput.
, vol.8
, Issue.2
, pp. 269-283
-
-
Antunes, N.1
Vieira, M.2
|