Security assurance assessment methodology for hybrid clouds
Tài liệu tham khảo
Aceto, 2013, Cloud monitoring: a survey, Comput Netw, 57, 2093, 10.1016/j.comnet.2013.04.001
Anisetti
Anisetti, 2014
Anisetti
Anisetti
Auradkar
Aversa
Bleikertz
Brinkmann
Caron
Casola
Cimato
da Cunha
Drago
Esposito, 2016, Encryption-based solution for data sovereignty in federated clouds, IEEE Cloud Comput, 3, 12, 10.1109/MCC.2016.18
Fatema, 2014, A survey of cloud monitoring tools: taxonomy, capabilities and objectives, J Parallel Distrib Comput, 74, 2918, 10.1016/j.jpdc.2014.06.007
Garcia, 2011
González
Groß
Guttman, 1995
Herrmann, 2002
Heyman
Hudic
I. O. for Standardization, I. E. Commission
I. O. for Standardization, I. E. Commission, 2008
I. O. for Standardization, I. E. Commission, 2008
I. O. for Standardization, I. E. Commission, 2010
Jensen
Juliadotter, 2015, Cloud attack and risk assessment taxonomy, IEEE Cloud Comput, 2, 14, 10.1109/MCC.2015.2
Katopodis
Khajeh-Hosseini
Khan
Kotenko, 2013
Krotsiani, 2014
Krotsiani, 2013
Lins
Maeder, 2000
Martini, 2012, An integrated conceptual digital forensic framework for cloud computing, Digital Investig, 9, 71, 10.1016/j.diin.2012.07.001
Martini, 2013, Cloud storage forensics: ownCloud as a case study, Digital Investig, 10, 287, 10.1016/j.diin.2013.08.005
Martini, 2014, Distributed filesystem forensics: XtreemFS as a case study, Digital Investig, 11, 295, 10.1016/j.diin.2014.08.002
Massonet
Naik, 2013
Nguyen
Nist, E. Aroms, 2012
OWASP
P. S. S. Council
Quick, 2014, Google drive: forensic analysis of data remnants, J Netw Comput Appl, 40, 179, 10.1016/j.jnca.2013.09.016
Quick, 2013, Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?, Digital Investig, 10, 266, 10.1016/j.diin.2013.07.001
Quick, 2013, Digital droplets: Microsoft SkyDrive forensic data remnants, Future Gener Comput Syst, 29, 1378, 10.1016/j.future.2013.02.001
Rahman, 2015, A survey of information security incident handling in the cloud, Comput Secur, 49, 45, 10.1016/j.cose.2014.11.006
Rahman, 2016, Forensic-by-design framework for cyber-physical cloud systems, IEEE Cloud Comput, 3, 50, 10.1109/MCC.2016.5
Rak
Ranjan, 2014, Streaming big data processing in datacenter clouds, IEEE Cloud Comput, 1, 78, 10.1109/MCC.2014.22
Rannenberg, 1993
Rinaldi, 2001, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Contr Syst, 21, 11, 10.1109/37.969131
Santos
Savola, 2007
Savola, 2009
Savola
Scarfone, 2007
Scarfone, 2010
Schneider
Schöller
Shao
Spanoudakis
Such, 2016, Information assurance techniques: perceived cost effectiveness, Comput Secur, 60, 117, 10.1016/j.cose.2016.03.009
Sun, 2011
Sunyaev, 2013, Cloud services certification, Commun ACM, 56, 33, 10.1145/2408776.2408789
Takabi, 2010, Security and privacy challenges in cloud computing environments, IEEE Secur Priv, 8, 24, 10.1109/MSP.2010.186
Toshniwal
van Renesse, 2003, Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining, ACM Trans Comput Syst, 21, 164, 10.1145/762483.762485
Vaarandi, 2014
Wang, 2015, Building a replicated logging system with Apache Kafka, Proceedings VLDB Endowment, 8, 1654, 10.14778/2824032.2824063
Windhorst