1 |
J. H. Jeong. (2017). Current status and challenges of cloud computing, INARS issue report, 313, 17-21.
|
2 |
C. J. Lee. (2017). A Study on Security Requirements for Privacy in a Home Cloud Environment. Master's Thesis. Graduate School of Soon Chun Hyang University, Asan.
|
3 |
ENSI-MARIA. (2017). IaaS, PaaS, SaaS - What do they mean?, Cloud on move (Online). http://cloudonmove.com/iaas-paas-saas-what-do-they-mean
|
4 |
Cloud Security Alliance. (2016). Cloud Computing Top Threats in 2016. The Threacherous 12.
|
5 |
S. H. Cho. (2018). A Study on Security Management Method for Hybrid Cloud Computing Environment. Master's Thesis, Graduate School of Dongguk University, Seoul.
|
6 |
Cloud Security Alliance. (2019). Top Threats to Cloud Computing in 2019. The Egregious 9.
|
7 |
Y. G. Lee. (2019). A Study on Improvement of Cloud Security Assurance Program. Master's Thesis, Graduate Schoolof Dongguk University, Seoul.
|
8 |
P. Mell & T. Grance. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce Version 15.
|
9 |
Multi-Cloud Blog. (2020). SaaS vs PaaS vs IaaS: What's the difference and how to choose. Accessed Time (Online). https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-what's-difference-and-how-to-choose
|
10 |
T. Wang et al. (2016). Fog-based storage technology to fight to fight with cyber threat. Future Generation Computer Systems, 83, 208-218. DOI : 10.1016/j.future.2017.12.036
DOI
|