메뉴 건너뛰기




Volumn Part F128005, Issue , 2017, Pages 424-430

Evidence-based security configurations for cloud datastores

Author keywords

Cloud storage; Data in transit security; Performance benchmarking; Security configurations; Trade offs

Indexed keywords

COST ENGINEERING; CRYPTOGRAPHY; DIGITAL STORAGE; ECONOMIC AND SOCIAL EFFECTS;

EID: 85020847809     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/3019612.3019654     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 1
    • 84863735077 scopus 로고    scopus 로고
    • Consistency tradeoffs in modern distributed database system design: CAP is only part of the story
    • D. Abadi. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story. IEEE Computer, 45(2):37-42, 2012.
    • (2012) IEEE Computer , vol.45 , Issue.2 , pp. 37-42
    • Abadi, D.1
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • R. Anderson and T. Moore. The economics of information security. Science, 314(5799):610-613, 2006.
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 3
    • 85015213231 scopus 로고    scopus 로고
    • Apache Software Foundation
    • Apache Software Foundation. Apache HBase reference guide, 2016. https://hbase.apache.org/book.html#security.example.config.
    • (2016) Apache HBase Reference Guide
  • 14
    • 78650003609 scopus 로고    scopus 로고
    • Security metrics and security investment models
    • Springer
    • R. Böhme. Security metrics and security investment models. In International Workshop on Security (IWSEC), pages 10-24. Springer, 2010.
    • (2010) International Workshop on Security (IWSEC) , pp. 10-24
    • Böhme, R.1
  • 15
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • H. Cavusoglu, S. Raghunathan, and H. Cavusoglu. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2):198-217, 2009.
    • (2009) Information Systems Research , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 21
    • 77955933052 scopus 로고    scopus 로고
    • Cassandra: A decentralized structured storage system
    • A. Lakshman and P. Malik. Cassandra: A decentralized structured storage system. SIGOPS Operating Systems Review, 44(2):35-40, 2010.
    • (2010) SIGOPS Operating Systems Review , vol.44 , Issue.2 , pp. 35-40
    • Lakshman, A.1    Malik, P.2
  • 25
    • 78651556127 scopus 로고    scopus 로고
    • Eventually consistent
    • Oct.
    • W. Vogels. Eventually consistent. ACM Queue, 6(6):14-19, Oct. 2008.
    • (2008) ACM Queue , vol.6 , Issue.6 , pp. 14-19
    • Vogels, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.