Industrial View of Security in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
J. Tidd, J. Bessant, and K. Pavitt, managing innovation. Hoboken. NJ: Wiley, 2013.
Y. Chen, V. Paxson, and R. H. Katz, “Handbook of Cloud Computing,” Handbook of Cloud Computing, vol. 20, no.2010, 2010, pp. 493–516.
P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST, Tech. Rep., 2011. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf [Last accessed: November 2017]
P. Drucker, Management Challenges for the 21st Century, ser. Management Challenges for the 21st Century. HarperCollins, 1999, no. pt. 794.
G. Weir and A. Aßmuth, “Strategies for Intrusion Monitoring in Cloud Services,” Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–5.
M. Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Que Publishing, 2008.
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing - The business perspective,” Decision Support Systems, vol. 51, no. 1, 2011, pp. 176–189.
K. Gai and S. Li, “Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends,” 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012, pp. 142–146.
S. Greengard, “Cloud computing and developing nations,” Communications of the ACM, vol. 53, no. 5, 2010, pp. 18–20.
V. Ratten, “Entrepreneurial and ethical adoption behaviour of cloud computing,” Journal of High Technology Management Research, vol. 23, no. 2, 2012, pp.155–164.
Y. Alshamaila, S. Papagiannidis, and F. Li, “Cloud computing adoption by SMEs in the north east of of England,” Journal of Enterprise Information Management, vol. 26, no. 3, 2013, pp. 250-275.
L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao, and C. Fu, “Cloud computing: A Perspective study,” New Generation Computing, vol. 28, no. 2, 2010, pp. 137–146.
D. C. Plummer, T. J. Bittman, T. Austin, D. W. Cearley, and D. M. Smith, “Cloud Computing: Defining and Describing an Emerging Phenomenon,” Gartner Research, vol. G00156220, no. June, 2008, pp. 1–9.
W. DeLone, “Determinants of Success for Computer Usage in Small Business,” MIS Quarterly, vol. 12, no. 1, 1988, pp. 51–61.
P. K. Ross and M. Blumenstein, “Cloud computing as a facilitator of SME entrepreneurship,” Technology Analysis & Strategic Management, vol. 27, no. 1, 2015, pp. 87–101.
M. Stern-Peltz and J. Armitage, “IT Firms Lose billions After NSA Scandal Exposed by Whistleblower Edward Snowden,” 2013. [Online]. Available: http://www.independent.co.uk/life-style/gadgets-and- tech/news/ it-firms-lose-billions-after-nsa-scandal-exposed-by-whistleblower-- edward-snowden-9028599.html [Last accessed: November 2017.
F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models Author,” Management Science, vol. 35, no. 8, 1989, pp. 982–1003.
A. Cooper, About Face: The Essentials of User Interface Design. IDG Books Worldwide, Inc., 1995.
E. M. Rogers, Diffusion of Innovations, 5th ed. New York: Free Press, 2003.
E. M. Rogers, Diffusion of Innovations, 3rd ed. London: The Free Press, 1983.
M. J. Gallivan, “Organizational adoption and assimilation of complex technological innovations,” ACM SIGMIS Database, vol. 32, no. 3, 2001, p. 51.
P. Walley and V. Amin, “Automation in a Customer Contact Environment,” International Journal of Operations & Production Management, vol. 14, no. 5, 1994, pp. 86–100.
R. G. Fichman, “Information Technology Diffusion: A Review of Empirical Research,” Proceedings of the Thirteenth International Conference on Information Systems ({ICIS} ’92), 1992, pp. 195–206.
EU, “EU General Data Protection Regulation,” 2017. [Online]. Available: http://www.eugdpr.org/[Last accessed: November 2017]
Verizon,“2012DataBreachInvestigationsReport,” Verizon,Tech.Rep., 2012.
Verizon, “2016 Verizon Data Breach Report,” Tech. Rep., 2016.
B. Duncan and M. Whittington, “Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail,” in Cloud Computing 2016: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, no. April. Rome: IEEE, 2016, pp. 125–130.
B. Duncan and M. Whittington, “Cloud cyber-security: Empowering the audit trail,” International Journal on Advances in Security, vol. 9, no. 3 & 4, 2016, pp. 169–183.
B. Duncan and M. Whittington, “Creating an Immutable Database for Secure Cloud Audit Trail and System Logging,” in Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization. Athens, Greece: IARIA, ISBN: 978-1-61208-529-6, 2017, pp. 54–59.
B. Duncan and M. Whittington, “Creating and Configuring an Immutable Database for Secure Cloud Audit Trail and System Logging,” International Journal On Advances in Security, no. 3&4, 2017.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.