1 |
J. Brodkin, "Gartner: Seven Cloud-Computing Security Risks," Infoworld, 2008.
|
2 |
M. Zareapoor, P. Shamsolmoali and M.A. Alam, "Establishing Safe Cloud: Ensuring Data Security and Performance Evaluation," International Journal of Electronics and Information Engineering, vol. 1, no. 2, pp. 88-99, Dec. 2014.
|
3 |
M. Darwish, A. Ouda and L.F. Capretz, "A Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense Against Denial of Service (DoS) Attacks," Journal of Information Security and Applications, vol. 20, pp. 90-98, Feb. 2015.
DOI
|
4 |
G. Brunette and R. Mogull, "Security Guidance for Critical Areas of Focus in Cloud Computing," v2.1, Cloud Security Alliance, pp. 1-76, 2009.
|
5 |
D. Hubbard and M. Sutton, "Top Threats to Cloud Computing," v1.0, Cloud Security Alliance, 2010.
|
6 |
European Network and Information Security Agency, "Cloud Computing: Benefits, Risks and Recommendations for Information Security," ENISA, 2009.
|
7 |
D. Catteddu, "Cloud Computing: Benefits, Risks and Recommendations for Information Security," In Web Application Security Springer Berlin Heidelberg, pp. 17, 2010.
|
8 |
L. Badger, T. Grance, R. Patt-Corner and J. Voas, "DRAFT Cloud Computing Synopsis and Recommendations," SP 800-146, NIST, May. 2011.
|
9 |
M. Hogan, F. Liu, A. Sokol and J. Tong, "NIST Cloud Computing Standards Roadmap," NIST Cloud Computing Standards Roadmap Working Group, SP 500-291-v1.0, NIST, Jul. 2011.
|