1 |
Buyya, Rajkumar, Chee Shin Yeo,Srikumar Venugopal, Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, International Conference on High Performance Computing and Communications, 2008.
|
2 |
Armbrust, Michael, Armando Fox, Rean Griffith, Above the Clouds: A Berkeley View of Cloud Computing, Berkeley EECS Department, University of California, 2008.
|
3 |
IDC, IT Cloud Services User Survey, pt.2: Top Benefits & Challenges ,2008.
|
4 |
NIST Special Publication 800-145, The NIST Definition of Cloud Computing, 2011.
|
5 |
DANISH JAMIL, HASSAN ZAKI, CLOUD COMPUTING SECURITY," International Journal of Engineering Science and Technology, 3(4), pp3478-3483, 2011.
|
6 |
Vaquero L, Rodero-Merino L, Mor D, Locking the sky: a survey on IaaS cloud security, Computing, 91, pp93-118, 2011.
DOI
|
7 |
R. Chow, P. Golle, M. Jakobsson, E. Shi, et. al, Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009.
|
8 |
Pearson, S., Taking account of privacy when designing cloud computing services, In ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, pp44-52, 2009.
|
9 |
LG CNS, "Introduction of LG CNS Public Cloud", http://cloud.lgcns.com/
|
10 |
M.Balduzzi, J.Zaddach, D.Balzarotti, E.Kirda, and S.Loureiro, A Security Analysis of Amazon's Elastic Cloud Service.Proceeding SAC '12 Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp1427-1434, 2012.
|
11 |
Google, "Google's Approach to IT Security, https://cloud.google.com/files/Google- CommonSecurity-WhitePaper-v1.4.pdf"
|
12 |
https://cloud.google.com/files/Google-CommonSecurity-WhitePaper-v1.4.pdf
|