-
1
-
-
85012229582
-
Security in the cloud
-
ACM digital library, New York
-
Anthes G (2010) Security in the cloud. Communication of the ACM 53(11):16–18, ACM digital library, New York
-
(2010)
Communication of the ACM
, vol.53
, Issue.11
, pp. 16-18
-
-
Anthes, G.1
-
2
-
-
85006206390
-
Cloud computing. Accessed 11th February
-
Schneier B (2009) Cloud computing. Accessed 11th February, 2014 from http://www.schneier.com/blog/archives/2009/06/cloud_computing.html
-
(2009)
2014 from
-
-
Schneier, B.1
-
3
-
-
84902309935
-
Essential Elements of an SME-specific Search of Trusted Cloud Services
-
Springer, Heidelberg
-
Horch A, Christmann C, Kett H, Falkner J, Anette Weisbecker A (2013) Essential Elements of an SME-specific Search of Trusted Cloud Services. In: Proceedings of CLOSER. Springer, Heidelberg, pp 88–94
-
(2013)
Proceedings of CLOSER
, pp. 88-94
-
-
Horch, A.1
Christmann, C.2
Kett, H.3
Falkner, J.4
Anette Weisbecker, A.5
-
4
-
-
84857373304
-
Commentary: Cloud computing – A security problem or solution? Information Security Technical Report, 16 (3–4), pp. 89–96
-
Dorey P.G., Leite A. (2011) Commentary: Cloud computing – A security problem or solution? Information Security Technical Report, 16 (3–4), pp. 89–96, Elsevier
-
(2011)
Elsevier
-
-
Dorey, P.G.1
Leite, A.2
-
5
-
-
84902324713
-
Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review
-
Springer, Berlin
-
El-Gazzar RF (2013) Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review. In: Proceedings of CLOSER. Springer, Berlin, pp 78–87
-
(2013)
Proceedings of CLOSER
, pp. 78-87
-
-
El-Gazzar, R.F.1
-
6
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Elsevier
-
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11, Elsevier
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
-
-
Subashini, S.1
Kavitha, V.2
-
7
-
-
78650558794
-
Secure virtualization for cloud computing
-
Elsevier
-
Lombardi F, Di Pietro R (2011) Secure virtualization for cloud computing. J Netw Comput Appl 34(4):1113–22, Elsevier
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Di Pietro, R.2
-
8
-
-
84855993467
-
Building safe PaaS clouds: a survey on security in multitenant software platforms
-
Rodero-Merino L, Vaquero LM, Caron E, Muresan A, Desprez F (2012) Building safe PaaS clouds: a survey on security in multitenant software platforms. Computers & Security 31(1):96–108
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 96-108
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Caron, E.3
Muresan, A.4
Desprez, F.5
-
9
-
-
79751493181
-
Locking the sky: a survey on IaaS cloud security
-
Springer, Vienna
-
Vaquero LM, Rodero-Merino L, Morán D (2011) Locking the sky: a survey on IaaS cloud security. Computing 91(1):93–118, Springer, Vienna
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
-
10
-
-
85006232565
-
What’s New About Cloud Computing Security? Report EECS Department, University of California, Berkeley. Accessed September 13
-
Chen Y, Paxson V, Katz RH (2010). What’s New About Cloud Computing Security? Report EECS Department, University of California, Berkeley. Accessed September 13, 2012 from http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
-
(2010)
2012 from
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
11
-
-
84863337547
-
A review on cloud computing: design challenges in architecture and security
-
Hu F, Qiu M, Li J, Grant T, Tylor D, McCaleb S, Butler L, Hamner R (2011) A review on cloud computing: design challenges in architecture and security. J Comput Info Technol 19(1):25–55
-
(2011)
J Comput Info Technol
, vol.19
, Issue.1
, pp. 25-55
-
-
Hu, F.1
Qiu, M.2
Li, J.3
Grant, T.4
Tylor, D.5
McCaleb, S.6
Butler, L.7
Hamner, R.8
-
13
-
-
79952483316
-
User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium
-
IEEExplore, Indianapolis
-
Oza NV, Karppinen K, Savola R (2010) User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium. In: Proceeding of CloudCom. IEEExplore, Indianapolis, pp 621–628
-
(2010)
Proceeding of CloudCom
, pp. 621-628
-
-
Oza, N.V.1
Karppinen, K.2
Savola, R.3
-
15
-
-
84857359528
-
Internet cloud security: the illusion of inclusion
-
Elsevier
-
Teneyuca D (2011) Internet cloud security: the illusion of inclusion. Info Security Technical Report 16(3–4):102–7, Elsevier
-
(2011)
Info Security Technical Report
, vol.16
, Issue.3-4
, pp. 102-107
-
-
Teneyuca, D.1
-
16
-
-
85006211871
-
Top Threats to Cloud Computing
-
Cloud Security Alliance (2010) Top Threats to Cloud Computing. Accessed 21 March 2014 from https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
-
(2010)
Accessed 21 March 2014 from
-
-
Alliance, C.S.1
-
17
-
-
84937458588
-
-
Ouedraogo M, Islam S (2015) Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems, In proceedings of CAiSE Workshops 2015: 495-506, Lecture Notes in Business Information Processing Springer International Publishing Switzerland.
-
Ouedraogo M, Islam S (2015) Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems, In proceedings of CAiSE Workshops 2015: 495-506, Lecture Notes in Business Information Processing Springer International Publishing Switzerland.
-
-
-
-
20
-
-
85006204181
-
rd October
-
rd October, 2014 from http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
-
(2011)
2014 from
-
-
Alliance, C.S.1
-
21
-
-
85006229746
-
rd March
-
rd March, 2014 from http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
-
(2009)
2014 from
-
-
Alliance, C.S.1
-
23
-
-
85006224896
-
Cloud computing outages: Amazon customers the latest to suffer downtime
-
Brodkin J. (2009) Cloud computing outages: Amazon customers the latest to suffer downtime. Accessed 12th March 2014 from: http://www.networkworld.com/community/node/48961
-
(2009)
Accessed 12th March 2014 from:
-
-
Brodkin, J.1
-
24
-
-
85006204966
-
The Notorious Nine Cloud Computing Top Threats in 2013
-
Cloud Security Alliance. (2013) The Notorious Nine Cloud Computing Top Threats in 2013. Accessed 20 October 2014 from https://cloudsecurityalliance.org/download/the-notorious-nine-cloud-computing-top-threats-in-2013/
-
(2013)
Accessed 20 October 2014 from
-
-
Alliance, C.S.1
-
25
-
-
85006224901
-
Cybercriminals move to the cloud, Accessed 12th December
-
Mills E. (2012) Cybercriminals move to the cloud, Accessed 12th December, 2013 from: http://news.cnet.com/8301-1009_3-57464177-83/cybercrime-moves-to-the-cloud/
-
(2012)
2013 from:
-
-
Mills, E.1
-
26
-
-
85006221059
-
Dissecting Operation High Roller
-
McAfee and Guardian Analytics. (2012) Dissecting Operation High Roller. Accessed 10 February 2014 from: http://www.mcafee.com/mx/resources/reports/rp-operation-high-roller.pdf
-
(2012)
Accessed 10 February 2014 from:
-
-
-
27
-
-
84866131522
-
State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment
-
ACM digital library, New York
-
Srinivasan MK, Sarukesi K, Rodrigues P, Manoj SM, Revathy P (2012) State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. In: Proceeding of ICACCI. ACM digital library, New York, pp 470–476
-
(2012)
Proceeding of ICACCI
, pp. 470-476
-
-
Srinivasan, M.K.1
Sarukesi, K.2
Rodrigues, P.3
Manoj, S.M.4
Revathy, P.5
-
28
-
-
84873879352
-
Securing the cloud- cloud computer security techniques and tactics
-
Winkler V. (2011) Securing the cloud- cloud computer security techniques and tactics. Syngress
-
(2011)
Syngress
-
-
Winkler, V.1
-
29
-
-
4444318660
-
-
Proceedings of SOSP: ACM
-
Garfinkel T., Pfaff B, Chow J, Rosenblum M, Boneh D. (2003) Terra: a virtual machine-based platform for trusted computing. In: Proceedings of SOSP 2003, ACM
-
(2003)
(2003) Terra: a virtual machine-based platform for trusted computing. In
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
32
-
-
83255176185
-
Towards an architecture for monitoring private clouds
-
IEEE
-
De Chaves SA, Uriarte RB, Westphall CB (2011) Towards an architecture for monitoring private clouds. IEEE Commun Mag 49(12):130–7, IEEE
-
(2011)
IEEE Commun Mag
, vol.49
, Issue.12
, pp. 130-137
-
-
De Chaves, S.A.1
Uriarte, R.B.2
Westphall, C.B.3
-
33
-
-
78649624954
-
Towards wider cloud service applicability by security, privacy and trust measurements
-
IEEE, Tashkent
-
Savola R, Juhola A, Uusitalo I (2010) Towards wider cloud service applicability by security, privacy and trust measurements. In: Proceedings of the 4th Int. Conf. on Application of Information and Communication Technologies (AICT’10). IEEE, Tashkent, pp 45–50
-
(2010)
Proceedings of the 4th Int. Conf. on Application of Information and Communication Technologies (AICT’10)
, pp. 45-50
-
-
Savola, R.1
Juhola, A.2
Uusitalo, I.3
-
35
-
-
84899752948
-
Security as a Service Using an SLA-based Approach via SPECS. In:Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), pp, 1 – 6
-
Rak M, Luna J, Petcu D, Casola V, Suri N, Villano U. (2013) Security as a Service Using an SLA-based Approach via SPECS. In:Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), pp, 1 – 6, IEEE
-
(2013)
IEEE
-
-
Rak, M.1
Luna, J.2
Petcu, D.3
Casola, V.4
Suri, N.5
Villano, U.6
-
36
-
-
84864212650
-
-
(eds), Springer-Verlag, New York
-
Wieder P, Butler JM, Theilmann W, Yahyapour R (eds) (2011) Service Level Agreements for Cloud Computing. Springer-Verlag, New York
-
(2011)
Service Level Agreements for Cloud Computing
-
-
Wieder, P.1
Butler, J.M.2
Theilmann, W.3
Yahyapour, R.4
-
40
-
-
85119707452
-
-
Proceedings of the 2nd International Workshop on CrossCloud Systems, ACM, New York
-
Kohne A, Spohr M, Nagel L, Spinczyk O (2014) FederatedCloudSim: a SLA-aware federated cloud simulation framework. Proceedings of the 2nd International Workshop on CrossCloud Systems, ACM, New York
-
(2014)
FederatedCloudSim: a SLA-aware federated cloud simulation framework
-
-
Kohne, A.1
Spohr, M.2
Nagel, L.3
Spinczyk, O.4
-
41
-
-
84925854020
-
Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms
-
IEEExplore, New York
-
Maity S, Chaudhuri A (2014) Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms. In: Proceedings of CLOUDNET 2014. IEEExplore, New York, pp 269–271
-
(2014)
Proceedings of CLOUDNET 2014
, pp. 269-271
-
-
Maity, S.1
Chaudhuri, A.2
-
43
-
-
84928617949
-
A taxonomy for SLA-based monitoring of cloud security
-
Petcu D (2014) A taxonomy for SLA-based monitoring of cloud security. COMPSAC 2014:640–1
-
(2014)
COMPSAC
, vol.2014
, pp. 640-641
-
-
Petcu, D.1
-
44
-
-
77955515611
-
From infrastructure delivery to service management in clouds
-
Rodero-Merino L, Vaquero LM, Gil V, Galán F, Fontán J, Montero RS, Llorente IM (2010) From infrastructure delivery to service management in clouds. Future Generation of ComputerSystems 26(8):1226–40
-
(2010)
Future Generation of ComputerSystems
, vol.26
, Issue.8
, pp. 1226-1240
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Gil, V.3
Galán, F.4
Fontán, J.5
Montero, R.S.6
Llorente, I.M.7
-
45
-
-
84873696561
-
Cloud services certification
-
ACM digital Library, New York
-
Sunyaev A, Schneider S (2013) Cloud services certification. Communication of the ACM 56(2):33–36, ACM digital Library, New York
-
(2013)
Communication of the ACM
, vol.56
, Issue.2
, pp. 33-36
-
-
Sunyaev, A.1
Schneider, S.2
-
47
-
-
85006205022
-
-
TÜV Rheinland’s. (2014) certification for cloud providers, Accessed on 20th October 2014 from: //
-
TÜV Rheinland’s. (2014) certification for cloud providers, Accessed on 20th October 2014 from: //www.tuv.com/en/corporate/business_customers/information_scuriy_cw/strategic_information_security/cloud_security_certification/cloud_security_certification.html
-
-
-
-
49
-
-
85006183974
-
Statement on Auditing Standards (SAS) n°70. Accessed October 20, 2013
-
AICPA. (2012) Statement on Auditing Standards (SAS) n°70. Accessed October 20, 2013. from http://sas70.com/sas70_overview.html
-
(2012)
from
-
-
-
51
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
IEEE, San Diego
-
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proceedings of the 29th conference on Information Communications (INFOCOM 2010). IEEE, San Diego, pp 525–533
-
(2010)
Proceedings of the 29th conference on Information Communications (INFOCOM 2010)
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
52
-
-
84883065229
-
Searching over encrypted data in cloud systems, in: Proceedings of SACMAT 2013, pp.87-88
-
Kerschbaum F.(2013) Searching over encrypted data in cloud systems, in: Proceedings of SACMAT 2013, pp.87-88, ACM ditigal library
-
(2013)
ACM ditigal library
-
-
Kerschbaum, F.1
-
53
-
-
84863498079
-
Efficient audit service outsourcing for data integrity in clouds
-
Elsevier
-
Zhu Y, Hu H, Ahn GJ, Yau SS (2012) Efficient audit service outsourcing for data integrity in clouds. J Syst Softw 85(5):108–1095, Elsevier
-
(2012)
J Syst Softw
, vol.85
, Issue.5
, pp. 108-1095
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yau, S.S.4
-
55
-
-
84862629748
-
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
-
ACM, New York
-
López-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of STOC 2012. ACM, New York, pp 1219–1234
-
(2012)
Proceedings of STOC 2012
, pp. 1219-1234
-
-
López-Alt, A.1
Tromer, E.2
Vaikuntanathan, V.3
-
56
-
-
79951785506
-
Cryptographic cloud storage
-
Workshop on Real-Life Cryptographic, Protocols and Standardization, Springer, Heidelberg
-
Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Proceedings of Financial Cryptography. Workshop on Real-Life Cryptographic, Protocols and Standardization, Springer, Heidelberg
-
(2010)
Proceedings of Financial Cryptography
-
-
Kamara, S.1
Lauter, K.2
-
57
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
ACM, New York
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson NJZ, Song D (2007) Provable Data Possession at Untrusted Stores. In: Proceedings of CCS’07, Alexandria, VA. ACM, New York, pp 598–609
-
(2007)
Proceedings of CCS’07, Alexandria, VA
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, N.J.Z.6
Song, D.7
-
58
-
-
58349118819
-
Compact proofs of retrievability
-
Springer, Heidelberg
-
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Advances in Cryptology (Asiacrypt ’08), vol. 5350, Lecture Notes in Computer Science. Springer, Heidelberg, pp 90–107
-
(2008)
Advances in Cryptology (Asiacrypt ’08), vol. 5350, Lecture Notes in Computer Science
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
59
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Springer, Heidelberg
-
Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In: Theory of Cryptography Conference, vol. 5444 of Lecture Notes in Computer Science. Springer, Heidelberg, pp 109–127
-
(2009)
Theory of Cryptography Conference, vol. 5444 of Lecture Notes in Computer Science
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
60
-
-
84886742288
-
Cloud Audits and Privacy Risks. In: Proceedings of OTM conferences, LNCS V8185, pp 403–4013
-
Rübsamen T., Reich C. (2013) Cloud Audits and Privacy Risks. In: Proceedings of OTM conferences, LNCS V8185, pp 403–4013, Springer
-
(2013)
Springer
-
-
Rübsamen, T.1
Reich, C.2
-
61
-
-
84926426274
-
An agent based business aware incident detection system for cloud environments
-
Springer-Verlag, Berlin
-
Doelitzscher F, Reich C, Knahl M, Clarke N (2012) An agent based business aware incident detection system for cloud environments. Journal of Cloud Computing:Advances, Systems and Applications 1(9):1–19, Springer-Verlag, Berlin
-
(2012)
Journal of Cloud Computing:Advances, Systems and Applications
, vol.1
, Issue.9
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
62
-
-
84856645725
-
A new approach to evaluating security assurance
-
IEEExplore, New York
-
Ouedraogo M, Mouratidis H, Hecker A, Bonhomme C, Khadraoui D, Dubois E, Preston D (2011) A new approach to evaluating security assurance. In: Proceedings of the 7th International Conference on Information Assurance and Security (IAS). IEEExplore, New York, pp 215–221
-
(2011)
Proceedings of the 7th International Conference on Information Assurance and Security (IAS)
, pp. 215-221
-
-
Ouedraogo, M.1
Mouratidis, H.2
Hecker, A.3
Bonhomme, C.4
Khadraoui, D.5
Dubois, E.6
Preston, D.7
-
63
-
-
84872680749
-
Taxonomy of quality metrics for assessing assurance of security correctness’
-
Springer, US
-
Ouedraogo M, Savola R, Mouratidis H, Preston D, Kadraoui D, Dubois E (2013) Taxonomy of quality metrics for assessing assurance of security correctness’. Softw Qual J 21(1):67–97, Springer, US
-
(2013)
Softw Qual J
, vol.21
, Issue.1
, pp. 67-97
-
-
Ouedraogo, M.1
Savola, R.2
Mouratidis, H.3
Preston, D.4
Kadraoui, D.5
Dubois, E.6
-
64
-
-
80755140556
-
Appraisal and reporting of security assurance at operational systems level
-
Elsevier
-
Ouedraogo M, Khadraoui D, Mouratidis H, Dubois E (2012) Appraisal and reporting of security assurance at operational systems level. Journal of software and system and software 85(1):193–208, Elsevier
-
(2012)
Journal of software and system and software
, vol.85
, Issue.1
, pp. 193-208
-
-
Ouedraogo, M.1
Khadraoui, D.2
Mouratidis, H.3
Dubois, E.4
-
65
-
-
84885175490
-
Selecting a cloud service provider in the age of cybercrime, Computers & Security, vol.38, pp.3-13 Special issue on Cybercrime in the Digital Economy
-
Ouedraogo M, Mouratidis M. (2013) Selecting a cloud service provider in the age of cybercrime, Computers & Security, vol.38, pp.3-13 Special issue on Cybercrime in the Digital Economy, Elsevier
-
(2013)
Elsevier
-
-
Ouedraogo, M.1
Mouratidis, M.2
-
66
-
-
78650059753
-
Cloud provider transparency: an empirical evaluation
-
IEEExplore, New York
-
Pauley W (2010) Cloud provider transparency: an empirical evaluation. IEEE Security & Privacy 8(6):32–3, IEEExplore, New York
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 32-33
-
-
Pauley, W.1
-
67
-
-
85006208320
-
Event Processing in Action. Manning Publications Company 2010, ISBN 978-1-935182-21-4, pp
-
Etzion O., Niblett P. (2010) Event Processing in Action. Manning Publications Company 2010, ISBN 978-1-935182-21-4, pp. I-XXIV, 1–360
-
(2010)
I-XXIV
-
-
Etzion, O.1
Niblett, P.2
-
69
-
-
84856946836
-
Real-time complex event recognition and reasoning-a logic programming approach
-
Anicic D, Rudolph S, Fodor P, Stojanovic N (2012) Real-time complex event recognition and reasoning-a logic programming approach. Appl Artif Intell 26(1–2):6–57
-
(2012)
Appl Artif Intell
, vol.26
, Issue.1-2
, pp. 6-57
-
-
Anicic, D.1
Rudolph, S.2
Fodor, P.3
Stojanovic, N.4
-
70
-
-
84861348392
-
Complex event processing with T-REX
-
Cugola G, Margara A (2012) Complex event processing with T-REX. J Syst Softw 85(8):1709–28
-
(2012)
J Syst Softw
, vol.85
, Issue.8
, pp. 1709-1728
-
-
Cugola, G.1
Margara, A.2
-
72
-
-
84892381477
-
-
National Institute of Standards and Technology, Gaithersburg, MD
-
Waltermire D, Schmidt C, Scarfone K, Ziring N (2011) Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2. National Institute of Standards and Technology, Gaithersburg, MD, pp 20899–893
-
(2011)
Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
, pp. 20893-20899
-
-
Waltermire, D.1
Schmidt, C.2
Scarfone, K.3
Ziring, N.4
-
73
-
-
85006228750
-
-
NIST, Gaithersburg
-
Waltermire D, Quinn S, Scarfone K, Halbardier A (2009) The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2., Special Publication 800–126. NIST, Gaithersburg
-
(2009)
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2., Special Publication 800–126
-
-
Waltermire, D.1
Quinn, S.2
Scarfone, K.3
Halbardier, A.4
-
74
-
-
36549031203
-
JADE: A software framework for developing multi-agent applications. lessons learned
-
Bellifemine F, Caire G, Poggi A, Rimassa G (2008) JADE: A software framework for developing multi-agent applications. lessons learned. Information & Software Technology 50(1–2):10–21
-
(2008)
Information & Software Technology
, vol.50
, Issue.1-2
, pp. 10-21
-
-
Bellifemine, F.1
Caire, G.2
Poggi, A.3
Rimassa, G.4
|