참고문헌
- D. V. Bernardo, "Utilizing security risk approach in managing cloud computing services," in Proceedings of 2013 16th International Conference on Network-Based Information Systems (NBiS), Gwangju, Korea, 2013, pp. 119-125.
- E. Datta and N. Goyal, "Security attack mitigation framework for the cloud," in Proceedings of 2014 Annual Reliability and Maintainability Symposium (RAMS), Colorado Springs, CO, 2014, pp. 1-6.
- D. R. Dos Santos, C. Merkle Westphall, and C. Becker Westphall, "A dynamic risk-based access control architecture for cloud computing," in Proceedings of 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 2014, pp. 1-9.
- P. Wang, K. M. Chao, and C. C. Lo, "A novel threat and risk assessment mechanism for security controls in service management," in Proceedings of 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE), Coventry, UK, 2013, pp. 337-344.
- I. Kotenko and E. Doynikova, "Security metrics for risk assessment of distributed information systems," in Proceedings of 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin, 2013, pp. 646-650.
- J. Kar, "Provably secure online/off-line identity-based signature scheme for wireless sensor network," IJ Network Security, vol. 16, no. 1, pp. 29-39, 2014.
- M. R. Mishra, J. Kar, and B. Majhi, "Practical deployment of one-pass key establishment protocol on wireless sensor networks," International Journal of Pure and Applied Mathematics, vol. 100, no. 4, pp. 531-542, 2015.
- J. Kar, "A novel construction of certificateless signcryption scheme for smart card," in Case Studies in Secure Computing Achievements and Trends. Boca Raton, FL: Taylor and Francis, 2014, pp. 437-456.
- P. K. Manadhata and J. M. Wing, "An attack surface metric," IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371-386, 2011. https://doi.org/10.1109/TSE.2010.60
- B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security & Privacy, vol. 9, no. 2, pp. 50-57, 2011. https://doi.org/10.1109/MSP.2010.115
- D. V. Bernardo, "Security risk assessment: toward a comprehensive practical risk management," International Journal of Information and Computer Security, vol. 5, no. 2, pp. 77-104, 2012. https://doi.org/10.1504/IJICS.2012.051775
피인용 문헌
- A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments vol.7, pp.1, 2017, https://doi.org/10.1186/s13673-017-0109-2
- A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform vol.2018, pp.2090-0155, 2018, https://doi.org/10.1155/2018/8309450