Open Access
Issue |
MATEC Web Conf.
Volume 100, 2017
13th Global Congress on Manufacturing and Management (GCMM 2016)
|
|
---|---|---|
Article Number | 05068 | |
Number of page(s) | 7 | |
Section | Part 5: Management Engineering | |
DOI | https://doi.org/10.1051/matecconf/201710005068 | |
Published online | 08 March 2017 |
- Ashutosh Kumar Singh, Dr. Ramapati Mishra, Fuzail Ahmad, et al. A Review of Cloud Computing Open Architecture and Its Security Issues. International Journal of Scientific & Technology Research, Vol. 6, No. 1, 65–67 (2012) [Google Scholar]
- Fei Hu, Meikang Qiu, Li Jiayin, et al. A Review of Cloud Computing: Design Challenges in Architecture and Security. Journal of Computing and Information Technology, Vol. 1, No. 19, 25–55 (2011) [Google Scholar]
- Chen Ke-you, The Research On Data Security And Privacy Issues In Hybrid Cloud Computer. NanChang, JiangXi Normal University (2013) [Google Scholar]
- Chi Li-ying. Research on Security Architecture of Cloud Computing and Its Key Technologies. Computer Development & Applications, Vol. 6, No 25, 20–22 (2012) [Google Scholar]
- Zhang tao. The Cloud Computing Security Architecture Research Status Analysis Domestic and Foreign. Safety Broadcasting & Monitoring, No. 11, 123–127 (2011) [Google Scholar]
- JerichoForum. Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration. Version 1.0. www.JerichoForum.org (2009) [Google Scholar]
- Lin Chuang, Su WenBo, Meng Kun, Liu Qu, Liu WeiDong. Cloud Computing Security: Architecture, Mechanism and Modeling. Chinese Journal of Computers, Vol. 9, No. 36, 1765–1781 (2013) [Google Scholar]
- Sanjaya Dahal. Security Architecture for Cloud Computing Platform. Stockholm, Sweden: Master of Science Thesis (2012) [Google Scholar]
- Muthu Ramachandran. Component-Based Development for Cloud Computing Architectures. Computer Communications and Networks, No. 10, 91–114 (2011) [CrossRef] [Google Scholar]
- Masayuki Okuhara, Tetsuo Shiozaki, Takuya Suzuki. Security Architecture for Cloud Computing. Fujitsu Sci. Tech. J, Vol. 4, No. 46, 397–402 (2010) [Google Scholar]
- Vic (J.R.) Winkler. Securing the Cloud: Cloud Computer Security Techniques and Tactics. Edition 1, Publisher: Syngress (2011) [Google Scholar]
- Chen Chi, Yu Jing. Cloud computing security system. Edition 1, Science Press (2014) [Google Scholar]
- Zhang Wei, Dong Qunfeng. Design and implementation of cloud security comprehensive analysis system. Computer Engineering and Applications, Vol. 19, No. 50, 89–94 (2014) [Google Scholar]
- Dan Gonzales, Zeremy Caplan, Saltzman Evan, et al. Cloud-trust-a Security Assessment Model for Infrastructure as a Service(IaaS) Clouds.. IEEE Transactions on Cloud Computing. PP (99), 1–14 (2015) [CrossRef] [Google Scholar]
- Jinag Zheng-wei, Zhao Wen-rui, Liu Yu. Model for Cloud Computing Security Assessment Based on Classified Protection. Computer Science, Vol. 8, No. 40, 151–156 (2013) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.