1 |
B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Tofetti, "Reservoir - When One Cloud Is Not Enough," IEEE Computer, Vol. 44, Issue 3, pp. 44-51, Mar. 2011.
|
2 |
S. Lee, I. Ong, H. T. Lim, and H. J. Lee, "Two Factor Authentication for Cloud Computing," Journal of Information and Communication Convergence Engineering, 8(4), pp. 427-432, Aug. 2010.
과학기술학회마을
DOI
ScienceOn
|
3 |
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, pp. 109-116, Sept. 2009.
|
4 |
B. Satzger, W. Hummer, C. Inzinger, P. Leitner, and S. Dustdar, "Winds of Change: From Vendor Lock-In to the Meta Cloud," IEEE Internet Computing, Vol. 17, Issue 1, pp. 69-73, Jan.-Feb. 2013.
DOI
ScienceOn
|
5 |
S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing," Journal of network and Computer Applications, Vol. 34, Issue 1, pp. 1-11, Jan. 2011.
DOI
ScienceOn
|
6 |
J. S. Babu, K. Kishore, and K. E. N. Kumar, "Migration from Single-Cloud to Multi-Cloud Computing," International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 4, pp. 1218-1225, Apr. 2013.
|
7 |
S. Sundararajan, H. Narayanan, V. Pavithran, K. Vorungati, and K. Achuthan, "Preventing Insider Attacks in the Cloud," Advances in Computing and Communications, Springer Berlin Heidelberg, Vol. 190, pp. 488-500, 2011.
|
8 |
M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, "Cloud Computing Security: From Single to Multi-Clouds," 45th Hawaii International Conference on System Sciences (HICSS), pp. 5490-5499, Jan. 2012.
|
9 |
B. Zwateendorfer and A. Tauber, "Secure Cross-Cloud Single Sign-On (SSO) using eIDs," International Conference for Internet Technology and Secured Transactions, pp. 150-155, Dec. 2012.
|
10 |
F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, "NIST Cloud Computing Reference Architecture," NIST Special Publication 500 (2011): 292.
|
11 |
B. P. Rimal, E. M. Choi, and L. Lan, "A Taxonomy and Survey of Cloud Computing Systems," International Joint Conference on INC, IMS and IDC, pp. 44-51, Aug. 2009.
|
12 |
M. Jensen, J. Schwenk, J. M. Bohli, N. Gruschka, and L. L. Iacono, "Security Prospects through Cloud Computing by Adopting Multiple Clouds," IEEE International Conference on Cloud Computing (CLOUD), pp. 565-572, July. 2011.
|
13 |
P. Murukutla, and K. C. Shet, "Single Sign On For Cloud," International Conference on Compupting Sciences (ICCS), pp. 176-179, Sept. 2012.
|
14 |
M. Kretzschmar and S. Hanigk, "Security Management Interoperability Challenges for Collaboration Clouds," 4th International DMTF Academic Alliance Workshop on Systems and Virtualization Management (SVM), pp. 43-49, Oct. 2010.
|
15 |
M. Hojabri and K. V. Rao, "Innovation in Cloud computing: Implementation of Kerberos version5 in Cloud Computing in Order to Enhance the Security Issues," International Conference on Information Communication and Embedded Systems (ICICES), pp. 452-456, Feb. 2013.
|
16 |
P. Urien, E. Marie, and C. Kiennert, "An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards," International Conference on Digital Telecommunications (ICDT), pp. 22-27, June. 2010.
|