1 |
최주영, 김형종, 박춘식, 김명주, "클라우드 컴퓨팅 환경에서의 가상화 악성코드", 한국정보보호학회지, 제20권 2호, 2010.4.
과학기술학회마을
|
2 |
Malware, Man-in-the-Middle & Other Online Mischief , Entrust, 2009.
|
3 |
Avivah Litan, Where Strong Authen tication Fails and What You Can Do About It, Gartner 2009, http://www.gartner.com/DisplayDocument?ref=clientFriendlyUrl&id=1245013.
|
4 |
Jaikumar Vijayan, Hackers are defeating tough authentication, Gartner warns, http://www.computerworld.com, 2009.1.
|
5 |
Moxie Marlinspike, http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf.
|
6 |
Paul F. Roberts, RSA Lands ETrade for Risk-Based Authentication, http://www.eweek.com/c/a/Security/RSA-Lands-ETrade-for-RiskBased-Authentication/
|
7 |
김지연, 김형종, 박춘식, 김명주, "클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석 연구", 한국정보보호학회지, 제19권 제4호, 2009.8
과학기술학회마을
|
8 |
박춘식, 김형종, 김명주, "클라우드컴퓨팅 보안 동향", 정보통신산업진흥원 주간기술동향, 제1432호, pp.26-35, 2010.2.10.
|
9 |
Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Elaine Shi, Jessica Staddon, Cloud Computing:Outsourcing Computation without Outsourcing Control, Palo Alto Research Center, 2009.
|
10 |
Wiki-Pedia, http://en.wikipedia.org/wi ki/Cloud_computing
|
11 |
David Drummond, SVP, Corporate Development and Chief Legal Officer, google, http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
|
12 |
Elisa Bertino, Federica Paci, Rodolfo Ferrini and Ning Shang, Privacy- preserving Digital Identity Management for Cloud Computing, Bulletin of the Technical Committee on Data Engineering, Vol. 32 No. 1,January 2009.
|
13 |
이강찬, 클라우드 컴퓨팅 표준화 동향, 클라우드 컴퓨팅 포럼 워크샵 발표자료. 2009.12
|
14 |
Daniel J. Abadi, Data Management in the Cloud: Limitations and Opportunities, Bulletin of the Technical Committee on Data Engineering, Vol. 32 No. 1, January 2009.
|
15 |
은성경, 조남수, 김영호, 최대선, 클라우드 컴퓨팅 보안 기술, 전자통신동향분석 제24권 제4호 2009년 8월.
|
16 |
TCG: https://www.trustedcomputinggroup.org.
|