1 |
The NIST Definition of Cloud Computing, Sep 2011 https://csrc.nist.gov/publications/detail/sp/800-145/final
|
2 |
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0, July 2017 https://cloudsecurityalliance.org/download/security-guidance-v4/
|
3 |
Sin, Young-Sang. Hypervisor-based virtualization security technology trend in cloud environment. OSIA Standards & Technology Review, 2012.7, 25(2), 22-36
|
4 |
Park, Jun-Hyun; Park, Jae-Seun; Jo, Jeong-Hwan; Jeon, Hwan-Ung; Jeon, Eun-Jeong; Kim, Hak-Bum. Leveraging Hybrid Cloud Technology and Security Trends. Korea Institute Of Information Security And Cryptology, 2016, 26(1), 79-91
|
5 |
Min, Sang-Sig; Sung, Jae-Mo. Cloud computing application model and security technology research in financial sector. Korea Institute Of Information Security And Cryptology, 2011.12, 21(8), 40-45
|
6 |
ITU-T X.1601 Security Framework for cloud computing, Oct 2015 https://www.itu.int/rec/T-REC-X.1601-201510-I/en
|
7 |
Cloud Computing Top Threats in 2016, February 2016 https://cloudsecurityalliance.org/download/the-treacherous-twelve-cloud-computing-top-threats-in-2016/
|
8 |
T. Kittel. "Design and Implementation of a Virtual Machine Introspection based Intrusion detection System." Master Thesis, Technische universitat munchen 2010
|
9 |
Jung, Won-Joon. A Legal Study on Personal Data Protection Issues Caused by Cloud Computing Environment, A journal of Law/DanKook Univ. 2016.03.
|
10 |
Kim, Hyung-Seok; Lee, Jong-Yong; Jung, Kye-Dong, "The Design of Data Hub System for Integration of Group In the Cloud Environment", International journal of advanced smart convergence, Vol 4, Issue 2, 2015, pp. 61-68 DOI: https://doi.org/10.7236/IJASC.2015.4.2.61
DOI
|