References
- Daniel J. Abadi, Data Management in the Cloud: Limitations and Opportunities, Bulletin of the Technical Committee on Data Engineering, Vol. 32 No. 1, January 2009.
- Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon, Cloud Computing:Outsourcing Computation without Outsourcing Control, Palo Alto Research Center, 2009.
- Wiki-Pedia, http://en.wikipedia.org/wi ki/Cloud_computing
- David Drummond, SVP, Corporate Development and Chief Legal Officer, google, http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
- Elisa Bertino, Federica Paci, Rodolfo Ferrini and Ning Shang, Privacy- preserving Digital Identity Management for Cloud Computing, Bulletin of the Technical Committee on Data Engineering, Vol. 32 No. 1,January 2009.
- 이강찬, 클라우드 컴퓨팅 표준화 동향, 클라우드 컴퓨팅 포럼 워크샵 발표자료. 2009.12
- 은성경, 조남수, 김영호, 최대선, 클라우드 컴퓨팅 보안 기술, 전자통신동향분석 제24권 제4호 2009년 8월.
- TCG: https://www.trustedcomputinggroup.org.
- Malware, Man-in-the-Middle & Other Online Mischief , Entrust, 2009.
- Avivah Litan, Where Strong Authen tication Fails and What You Can Do About It, Gartner 2009, http://www.gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1245013.
- Jaikumar Vijayan, Hackers are defeating tough authentication, Gartner warns, http://www.computerworld.com, 2009.1.
- Moxie Marlinspike, http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf.
- Paul F. Roberts, RSA Lands ETrade for Risk-Based Authentication, http://www.eweek.com/c/a/Security/RSA-Lands-ETrade-for-RiskBased-Authentication/
- 김지연, 김형종, 박춘식, 김명주, "클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석 연구", 한국정보보호학회지, 제19권 제4호, 2009.8
- 박춘식, 김형종, 김명주, "클라우드컴퓨팅 보안 동향", 정보통신산업진흥원 주간기술동향, 제1432호, pp.26-35, 2010.2.10.
- 최주영, 김형종, 박춘식, 김명주, "클라우드 컴퓨팅 환경에서의 가상화 악성코드", 한국정보보호학회지, 제20권 2호, 2010.4.