1 |
http://www.kisa.or.kr/jsp/common/downloadAction.jsp? bno=4&dno=1236&fseq=1
|
2 |
정현준, "가상화 기술의 동향 및 주요 이슈(II)," 한국정보통신정책연구원, vol. 25, no. 5(550), Mar. 2013.
|
3 |
강원영, "최근 클라우드 컴퓨팅 서비스 동향," 한국인터넷진흥원, no. 3, pp. 20-24, 2011.
|
4 |
Tyson T. Brooks, C. Caicedo and J.S. Park, "Security Vulnerability Analysis in Virt ualized Computing Environments," International Journal of Intelligent Computing Research, vol. 3, pp. 227-291, Mar. 2012.
|
5 |
A. Mishra, R. Mathurm and J.S. Rathore, "Cloud Computing Security," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 1(1), pp. 36-39, Jan. 2013.
|
6 |
은성경, 외 3인, "클라우드 보안기술," 한국전자통신동향분석, vol. 24, no. 4, pp. 79-88, Aug. 2009.
|
7 |
Johnson, "http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/," Jun. 2010.
|
8 |
B. Williams and T. Cross, "Virtualization System Security," IBM Advanced Research, Apr. 2010.
|
9 |
J. Archer, D. Cullinane, N. Puhlmann , A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1," Cloud Security Alliance, Dec. 2009.
|
10 |
Md.T. Khorshed, A.B.M. S. Ali, S. A.Wasimi "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing," Future Generation Computer System, vol. 28(6), pp. 833-851, Jun. 2012.
DOI
ScienceOn
|
11 |
이향진, "안전한 클라우드 서비스 제공.이용을 위한 보안 고려사항," KISA, CloudSEC, 2012.
|