1 |
P.Jain, D. Rane, and S. Patidar, "A Survey and Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Renal Environment," IEEE 2011 World Congress on Information and Communication Technologies, pp. 456-461, 2011.
|
2 |
M. Jensen, N. Gruschka, L. L. Iacono, and G. Horst, "On Technical Security Issues in Cloud Computing," IEEE International Conference on Cloud Computing, pp. 109-116, 2009.
|
3 |
K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Ensuring Data Storage Security in Cloud Comouting," IT Professional, Vol. 12, pp. 38-43, 2010.
|
4 |
선재훈, 김귀남, "Cloud Computing의 개인 정보 보안을 위한 취약점 분석," 한국사이버테러대응학회논문지, 제10권, 제4호, pp. 77-82, 2010.
|
5 |
은성경, 조남수, 김영호, 최대선, "클라우드 컴퓨팅 보안 기술," 한국전자통신연구원, 전자통신동향분석, 제 24권, pp. 81-82, 2009.
|
6 |
Y. Z. Guan, Z. F. Hao, "The MDR Algorithm for Edge Detection on Change-point Theory," IEEE International Symposium on Intelligent Information Technology Application, pp. 558-562, 2009.
|
7 |
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, "The Eucalyptus Open Source Cloud Computing System," in Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), pp. 124-131, 2009.
|
8 |
Hanqian Wu, Yi Ding, Winer, C., Li Yao, "Network Security for Virtual Machines in Cloud Computing," 5th Int'l Conference on Computer Sciences and Convergence Information Technology, pp. 18-21, 2010.
|