1 |
Won-Young Kang, "Recently Trends in Cloud Computing Services," Internet & Security Issue, no. 3, pp. 20-24, Mar. 2012.
|
2 |
Tyson T. Brooks, Carlos Caicedo and Joon S. Park, "Security Vulnerability Analysis in Virtualized Computing Environments," International Journal of Intelligent Computing Research, vol. 3, pp. 227-291, Mar. 2012.
|
3 |
A. Mishra, R. Mathurm and J.S. Rathore, "Cloud Computing Security," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 1(1), pp. 36-39, Jan. 2013.
|
4 |
J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.
|
5 |
Bryan Williams and Tom Cross, "Virtu alization System Security," IBM X-Force Advanced Research, Apr. 2010.
|
6 |
Young-Jin Chio, Jong-Hei Ra and Sang-Hak Lee, "Vulnerability and Security Management System from the Perspective of the Cloud Service Users," Journal of Information Technology and Architecture, vol. 9, no. 4, pp. 401-411, Dec. 2012.
|
7 |
Seong-Kyung Un, "Trends in Cloud co mputing security technology," Korea Institute of Information Security and Cryptology, vol. 20, no. 2, pp. 27-31, Apr. 2010.
|
8 |
Md.Tanzim Khorshed, A.B.M. Shawkat Ali, and Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer System, vol. 28(6), pp. 833-851, Jun. 2012.
DOI
ScienceOn
|
9 |
Yang-Jin Lee, "The use of secure cloud services and security considerations," CloudSEC, 2012.
|
10 |
http://www.kisa.or.kr/jsp/common/downloadAction.jsp?bno=4&dno=1236&fseq=1
|
11 |
J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1," Cloud Security Alliance, Dec. 2009.
|
12 |
S.K. Un, N.S. Jho, Y.H Kim and D.S Choi, "Cloud Computing Security Technology," Electronics and Telecommunications Research Institute, vol. 24, no. 4, pp. 79-88, Aug. 2009.
|