Outlining Imminent Areas and Possible Schemes of Cloud Security
Abstract
Keywords
Full Text:
PDFReferences
Amazon Web Services, Amazon Elastic Compute Cloud (Amazon EC2), www.amazon.com/ec2
Samiljan, Tom; ―You Must Remember This,‖ Hemisphere Magazine, August 2009
Cloud Security Alliance (CSA): http://cloudsecurityalliance.org/
A Security Analysis of Cloud Computing: (http://cloudcomputing.sys- on.com/node/ 1203943
Cloud Security Questions? Here are some answers (http://cloudcomputing.sys-con.com/node/1330353)
FTC questions cloud-computing security. http://news.cnet.com/8301-13578_3-10198577-38.html?part=rss&subj=news&tag=2547-1_3-0-20.
Facebook users suffer viral surge. http://news.bbc.co.uk/2/hi/technology/7918839.stm.
David Binning, Top Five Cloud Computing Security Issues, Computer Weekly, April 24, 2009.
Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Atanu Rakshit, Cloud Security Issues, IEEE International Conference on Services Computing, Bangalore, India, September 21-25, 2009.
Stephanie Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010.
James Maguire, How Cloud Computing Security Resembles the Financial Meltdown, Datamation, internet.com, April 27, 2010.
USA Patriot Act Comes under Fire in B.C. Report, CBC News, October 30, 2004.
Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In STOC. 2009 .
Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M. Private Information Retrieval. J. ACM, 45, 6 (1998), 965-981.
Trusted Computing Group (TCG): http://www.trustedcomputinggroup.org/
Sven Bugiel, Stefan Nurnberger, Ahmad-Reza Sadeghi, Thomas Schneider Twin Clouds: An Architecture for Secure Cloud Computing http:/www. zurich.ibm.com/~cca/csc2011
SW99. S. W. Smith and S. Weingart. Building a high- performance, programmable secure coprocessor. Computer Networks, 31(8):831{860, April 1999.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.