1 |
Jeon Jeong Hoon, 'A study on the vulnerability and corresponding technique trends of the cloud computing service', Journal of Convergence Security, Vol. 13, Issue. 6, 2013.
|
2 |
CSA(Cloud Security Alliance), The Notorious Nine : Cloud Computing top Threats in 2013. 2013.
|
3 |
Lee Hyang Jin, Son Kyoung Ho, Lee Jae Il, 'Strategy for strengthening information security based on cloud service', Journal of The Korea Institute of Information Security and Cryptology, Vol. 23, Issue. 4, 2013.
|
4 |
NIST(National Institute of Standards and Technology), Guide to Security for Full Virtualization Technologies, 2010.
|
5 |
Dave Thomas, 'Enabling Application Agility Software as a Service, Cloud Computing and Dynamic Languages', Journal of Object Technology, Vol. 7, No. 4, 2008.
|
6 |
http://www.kisa.or.kr/jsp/common/downloadAction.jsp? bno=4&dno=1236&fseq=1
|