World of Cloud Computing & Security
Abstract
References
Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, from http://blogs.idc.com/ie/?p=73.
E. Grosse, “Security at Scale,” invited talk, ACM Cloud Security Workshop (CCSW), 2010; http://wn.com/2010_Google_Faculty_Summit_Security_at_Scale.
Ramgovind S, Eloff MM, Smith E “The Management of Security in Cloud Computing” in IEEE 2010.
http://en.wikipedia.org/wiki/Virtual_private_ cloud
A Platform Computing Whitepaper, ‘Enterprise Cloud Computing:Transforming IT’, Platform Computing, pp6, viewed 13 March 2010.
Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker Siemens “Understanding clouds vulnerabilities. In IEEE 2011.
Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou “Security and Privacy in Cloud Computing: A Survey” in IEEE 2010.
Farzad Sabahi , “Cloud computing threats and responses” in IEEE 2011.
Jianfeng Yang & Zhibin Chen “Cloud computing Research and security issues” in IEEE 2010.
Cloud Security Alliance Web site, http://www.cloudsecurityalliance.org/.
L. Wang et al., 1. “Scientific Cloud Computing: Early Definition and Experience,” Proc. 10th Int’l Conf. High-Performance Computing and Communications (HPCC 08), IEEE CS Press, 2008, pp. 825–830.
“US Federal Cloud Computing Market Forecast 2010–2015,” tabular analysis, publication: 05/2009.
Isaac Agudo , David Nuñez , Gabriele Giammatteo , Panagiotis Rizomiliotis, Costas Lambrinoudakis “ Cryptography goes to cloud”
Hongwei Li, Yuanshun Dai1, Ling Tian, and Haomiao Yang “Identity-Based Authentication for Cloud Computing” in Springer-Verlag Berlin Heidelberg 2009.
Liang Yan1, Chunming Rong1, and Gansen Zhao2 “Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography” in IEEE 2009.
Refbacks
- There are currently no refbacks.