A Unique Token based Approach for Secure Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
Wang, Lizhe; von Laszewski, Gregor; Kunze, Marcel; Tao, Jie. Cloud computing: A Perspective study, Proceedings of the Grid Computing Environments (GCE) workshop. Held at the Austin Civic Center: Austin, Texas: 16 November 2008.
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia. A view of cloud computing. Communications of the ACM , Volume 53 Issue 4, pages 50-58. April 2010.
The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory (www.csrc.nist.gov)
Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks and Compliance, O'Reilly Media, Inc., 2009
Open Security Architecture http://www.opensecurityarchitecture.org/
Discovering Identity: Cloud Computing: Identity and Access Management DOI = http: // blogs. sun. com/ identity/entry/cloud _ computing _identity_and_access
Siani Pearson. Taking Account of Privacy when Designing Cloud Computing Services. CLOUD '09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pages 44-52. May 2009
Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. DOI =http :// www. Cloudsecurityalliance .org/ topthreats / csathreats.v1.0.pdf
Weichao Wang, Zhiwei Li, Rodney Owens, Bharat Bhargava. Secure and Efficient Access to Outsourced Data. CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security, pages 55-65. November 2009
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.