Beyond lightning: A survey on security challenges in cloud computing
Tài liệu tham khảo
Mell Peter, Grance Tim. Effectively and securely using the cloud computing paradigm; 2011. <http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt> [retrieved 18.04.11].
National Institute of Standards and Technology. The NIST definition of cloud computing; 2011. <http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf> [retrieved 14.04.11].
Baek, 2010, Efficient server virtualization using grid service infrastructure, J Inform Process Syst, 6, 553, 10.3745/JIPS.2010.6.4.553
Rong Chunming, Nguyen Son T. Cloud trends and security challenges. In: Proceedings of the 3rd international workshop on security and computer networks (IWSCN 2011); 2011.
Klyuev, 2011, Semantic retrieval: an approach to representing, searching and summarising text documents, Int J Inform Technol Commun Converg, 1, 221, 10.1504/IJITCC.2011.039287
Nyre, 2010, A probabilistic approach to information control, J Internet Technol, 11, 407
Wlodarczyk, 2009, Industrial cloud: toward inter-enterprise integration, vol. 5931, 460
Ling, 2011, Selection of model in developing information security criteria for smart grid security system, J Converg, 2, 39
Hsu, 2011, Two-layer security scheme for AMI system, J Converg, 2, 47
Kryvinska, 2010, Integrated management platform for seamless services provisioning in converged network, Int J Inform Technol Commun Converg, 1, 77, 10.1504/IJITCC.2010.035228
Siemens IT Solutions and Services. Community clouds: supporting business ecosystems with cloud computing; 2011. <http://www.it-solutions.siemens.com/b2b/it/en/global/Documents/-Publications/Community-Clouds-Whitepaper_PDF_e.pdf> [retrieved 18.04.11].
Google, Google Apps. <http://www.google.com/apps/>.
Salesforce. Salesforce CRM applications and software solutions. <http://www.salesforce.com/eu/crm/products.jsp>.
Microsoft. Microsoft Windows Azure. <http://www.microsoft.com/windowsazure/>.
Google. Google App Engine. <http://code.google.com/appengine/>.
Amazon. Amazon Elastic Compute Cloud (EC2). <http://aws.amazon.com/ec2/>.
Dropbox, Where Are My Files Stored?; 2011. <http://www.dropbox.com/help/7> [retrieved 26.04.11].
Salesforce. Groupon expands throughout the US and beyond with salesforce; 2011. <http://www.salesforce.com/showcase/stories/groupon.jsp> [retrieved 26.04.11].
Lee, 2011, Analysis of business attributes in information technology environments, J Inform Process Syst, 7, 385, 10.3745/JIPS.2011.7.2.385
IDC Blogs. IT cloud services user survey, pt.2: top benefits & challenges; 2011. <http://blogs.idc.com/ie/?p=210> [retrieved 20.04.11].
Secunia. Xen multiple vulnerabilities; 2011. <http://secunia.com/advisories/26986/> [retrieved 20.04.11].
Dropbox’s Blog. Privacy, security & your dropbox; 2011. <http://blog.dropbox.com/?p=735> [retrieved 25.04.11].
European Union. Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data; 1995.
IEEE Cloud Computing Standard Study Group. <http://www.computer.org/portal/web/sab/cloud>.
ITU Cloud Computing Focus Group. <http://www.itu.int/en/ITU-T/focusgroups/cloud/Pages/default.aspx>.
Cloud Security Alliance. <http://www.cloudsecurityalliance.org/>.
Distributed Management Task Force. <http://www.dmtf.org/>.
Storage Networking Industry Association. <http://www.snia.org/>.
Open Grid Forum. <http://www.gridforum.org/>.
Open Cloud Consortium. <http://www.opencloudconsortium.org/>.
Organization for the Advancement of Structured Information Standards. <http://www.oasis-open.org/>.
Fogarty Kevin. Cloud computing standards: too many, doing too little; 2011. <http://www.cio.com/article/679067/Cloud_Computing_Standards_Too_Many_Doing_Too_Little> [retrieved 15.09.11].
Bernsmed Karin, Jaatun Martin Gilje, Meland Per Håkon, Undheim Astrid. Security SLAs for federated cloud services. In: Proceedings of the 6th international conference on availability, reliability and security (AReS 2011); 2011.
Bernsmed Karin, Jaatun Martin Gilje, Undheim Astrid. Security in service level agreements for cloud computing. In: Proceedings of the 1st international conference on cloud computing and services science (CLOSER 2011); 2011.
Gentry Craig. A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University; 2009. <http://crypto.stanford.edu/craig/craig-thesis.pdf> [retrieved 21.04.11].
Bellare, 1994, Incremental cryptography: the case of hashing and signing, 216
Bellare, 1995, Incremental cryptography and application to virus protection, 45
Zhao Gansen, Rong Chunming, Li Jin, Zhang Feng, Tang Yong. Trusted data sharing over untrusted cloud storage providers. In: Proceedings of the 2nd IEEE international conference on cloud computing technology and science (CloudCom 2010); 2010.
Rong Chunming, Zhao Gansen. Incremental encryption. Norwegian Patent No. P3683NO00-DT (Pending).
Pearson, 2009, Accountability as a way forward for privacy protection in the cloud, vol. 5931, 131
Pearson, 2011, Toward accountability in the cloud, EEE Internet Comput, 15, 64, 10.1109/MIC.2011.98