1 |
Gartner says cloud computing will be as influential as e-business, 2008. http://ww w.gartner.com/it/page.jsp?id = 707508.
|
2 |
Asia Pacific End-user Cloud Computing Survey, IDC, 2009.
|
3 |
정제호, 클라우드 컴퓨팅의 현재와 미래 그리고 시장 전략, 한국소프트웨어진흥원, 2008.
|
4 |
Gartner, Assessing the Security Risks of Cloud Computing, 2008. 6, http://www.gar tner.com/DisplayDocument?id=685308.
|
5 |
임철수, "클라우드 컴퓨팅 보안 기술", 정보보호학회지, 2009.
과학기술학회마을
|
6 |
NIST, Cryptographic hash algorithm competition, http://csrc.nist.gov/groups/ST/hash /sha-3/index.html.
|
7 |
jaehoon. sun, A Study on the Enhanced Security Technique of BGP for DRDoS Attack, ICISA2010, 2010.
|
8 |
Amazon Web Service : Overview of Security Process, Amazon, 2008.
|
9 |
김현승, 박춘식, "클라우드 컴퓨팅과 개인 인증 서비스", 정보보호학회지, 2010.
과학기술학회마을
|
10 |
Malware, Man-in-the-Middile and Other Online Mischief, Entrust, 2009.
|