메뉴 건너뛰기




Volumn 12, Issue 2, 2016, Pages 226-233

Mitigating threats and security metrics in cloud computing

Author keywords

Dynamic Access Control; Risk Assessment; Security Intelligence

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; RISK MANAGEMENT; SECURITY SYSTEMS;

EID: 85013625591     PISSN: 1976913X     EISSN: 2092805X     Source Type: Journal    
DOI: 10.3745/JIPS.03.0049     Document Type: Article
Times cited : (29)

References (11)
  • 6
    • 84893634359 scopus 로고    scopus 로고
    • Provably secure online/off-line identity-based signature scheme for wireless sensor network
    • J. Kar, "Provably secure online/off-line identity-based signature scheme for wireless sensor network," IJ Network Security, vol. 16, no. 1, pp. 29-39, 2014.
    • (2014) IJ Network Security , vol.16 , Issue.1 , pp. 29-39
    • Kar, J.1
  • 7
    • 84925445012 scopus 로고    scopus 로고
    • Practical deployment of one-pass key establishment protocol on wireless sensor networks
    • M. R. Mishra, J. Kar, and B. Majhi, "Practical deployment of one-pass key establishment protocol on wireless sensor networks," International Journal of Pure and Applied Mathematics, vol. 100, no. 4, pp. 531-542, 2015.
    • (2015) International Journal of Pure and Applied Mathematics , vol.100 , Issue.4 , pp. 531-542
    • Mishra, M.R.1    Kar, J.2    Majhi, B.3
  • 8
    • 84937028103 scopus 로고    scopus 로고
    • A novel construction of certificateless signcryption scheme for smart card
    • Boca Raton, FL: Taylor and Francis
    • J. Kar, "A novel construction of certificateless signcryption scheme for smart card," in Case Studies in Secure Computing Achievements and Trends. Boca Raton, FL: Taylor and Francis, 2014, pp. 437-456.
    • (2014) Case Studies in Secure Computing Achievements and Trends , pp. 437-456
    • Kar, J.1
  • 10
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 11
    • 84873376451 scopus 로고    scopus 로고
    • Security risk assessment: toward a comprehensive practical risk management
    • D. V. Bernardo, "Security risk assessment: toward a comprehensive practical risk management," International Journal of Information and Computer Security, vol. 5, no. 2, pp. 77-104, 2012.
    • (2012) International Journal of Information and Computer Security , vol.5 , Issue.2 , pp. 77-104
    • Bernardo, D.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.