-
Computer Cloud Security System
-
-
-
Reference
Gartner Inc: Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: . Accessed: 15-Jul-2011 http://www.gartner.com/it/page.jsp?id=1454221 Online. Available: . Accessed: 15-Jul-2011
Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N: Cloud Computing: A Statistics Aspect of Users. In First International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer Berlin; 2009:347–358.
Google Scholar
Zhang S, Zhang S, Chen X, Huo X: Cloud Computing Research and Development Trend. In Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China. Washington, DC, USA: IEEE Computer Society; 2010:93–97.
View ArticleGoogle Scholar
Cloud Security Alliance: Security guidance for critical areas of focus in Cloud Computing V3.0.. 2011. Available: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf Available:
Google Scholar
Marinos A, Briscoe G: Community Cloud Computing. In 1st International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer-Verlag Berlin; 2009.
Google Scholar
Centre for the Protection of National Infrastructure: Information Security Briefing 01/2010 Cloud Computing. 2010. Available: http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf Available:
Google Scholar
Khalid A: Cloud Computing: applying issues in Small Business. International Conference on Signal Acquisition and Processing (ICSAP’10) 2010, 278–281.
View ArticleGoogle Scholar
KPMG: From hype to future: KPMG’s 2010 Cloud Computing survey.. 2010. Available: http://www.techrepublic.com/whitepapers/from-hype-to-future-kpmgs-2010-cloud-computing-survey/2384291 Available:
Google Scholar
Rosado DG, Gómez R, Mellado D, Fernández-Medina E: Security analysis in the migration to cloud environments. Future Internet 2012, 4(2):469–487.
View ArticleGoogle Scholar
Mather T, Kumaraswamy S, Latif S: Cloud Security and Privacy. Sebastopol, CA: O’Reilly Media, Inc.; 2009.
Google Scholar
Li W, Ping L: Trust model to enhance Security and interoperability of Cloud environment. In Proceedings of the 1st International conference on Cloud Computing. Beijing, China: Springer Berlin Heidelberg; 2009:69–79.
Google Scholar
Rittinghouse JW, Ransome JF: Security in the Cloud. In Cloud Computing. Implementation, Management, and Security, CRC Press; 2009.
Google Scholar
 
-
-
-
ABSRACT - [ Total Page(s): 1 ]Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security ... Continue reading---
-
ABSRACT - [ Total Page(s): 1 ]Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security ... Continue reading---