1 |
D. Zissis, and D. Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, vol. 28(3), 2012
|
2 |
W. Jansen, and T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing", 2011.
|
3 |
M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, "Unicorn: Two-factor Attestation for data Security", Proc. of the 18th ACM conference on Computer and Communications Security. 2011
|
4 |
F. Zhang, J. Chen, H. Chen, and B. Zang, "CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization", Proc. of 23rd ACM Symposium on Operating Systems Principles. 2011
|
5 |
K. C. Lee, S and Y. Lee, "Mobile Cloud Standard Trend and strategy", Information and Commnunications Magazine, Vol. 28, No. 10, pp. 44-49. 2011.
|
6 |
Y. H. Bang, S. J. Jeong, S. M. Hwang, "Security Requirement Development Tools of Mobile Cloud System", Information and Commnunications Magazine, Vol. 28, No. 10, pp. 19-29. 2011.
|
7 |
I. Y. Jeong, C. Y. Lee, J. Y. Kim, H. K. Kim and Y. C. Jeong,, "Context Awareness Dynamic Authentication and Authorization Management Service in Mobile Cloud Multi-tenancy Environment", Information Security Magazine, Vol 21, No. 8, pp. 14-22. 2011.
|
8 |
ABIresearch, "Mobile Cloud Computing". 2009
|
9 |
Security for Access to Device APIs from the Web - W3C Workshop, http://www.w3.org/2008/security -ws/.
|
10 |
T. H. Kim, I. H. Kim, C. W. Min and Y. I. Yeom, "Security Technical Trend of Cloud Computing", Computer Science Managine 30(1), pp. 30-38, Jan. 2012.
|