1 |
F. Samimi, P. Mckinley, S. Masoud Sadjadi, "Mobile Service Clouds : A Self-managing Infrastructure for Autonomic Mobile Computing Sevices", Lecture Notes in Computer Science, Vol. 3996, pp.130-141, 2006.
|
2 |
H.-Y. Kim, O.-G. Min, G.-H. Nam, "The Technology Trend of Mobile Cloud", Electronics and Telecommunications Research Institute Bimonthly, Vol. 25, No. 3, pp.40-51, 2010.
과학기술학회마을
|
3 |
Sun-Sil Yoo, "A Trend of Personal Cloud Service", International Telecommunications Policy Review, Vol. 24, No. 12, pp.43-48, 2012.
|
4 |
Seung-Ik Baek, Ji-Yeon Shin, Jong-Woo Kim, "Exploring the Korean Government Policies for Cloud Computing Service", Journal of Society for e-Business Studies, Vol. 18, No. 3, pp.1-15, 2013.
과학기술학회마을
DOI
ScienceOn
|
5 |
Eun-Young Jang, Hyung-Jong Kim, Choon-Sik Park, Joo-Young Kim, Jae-il Lee, "The study on a threat countermeasure of mobile cloud services", Korea Institute of Information Security & Cryptology, Vol. 21, No. 1, pp.176-186, 2011.
과학기술학회마을
|
6 |
Dan Hubbard , Michael Sutton, "Top Threats to Cloud Computing V1.0", Cloud Security Alliance, 2010.
|
7 |
Glenn Brunette, Rich Mogull, "Security Guidance for Critical Areas of Focust in Cloud Computing V2.1", Cloud Security Alliance, 2009.
|
8 |
Z. Cheng, "Mobile Malware : Threats and Prevenion", McAfee Avert Labs., 2007.
|
9 |
Jon Brodkin, "Gartner: Seven Cloud-computing securit risks", Network World, July, 2008.
|
10 |
Michal Armbrust, "Above the Clouds: A Berkeley View of Cloud Computing", UC at Berkeley, Feburary, 2009.
|
11 |
Wayne Jansen, Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", NIST, January, 2011.
|