Open Access
MATEC Web Conf.
Volume 224, 2018
International Conference on Modern Trends in Manufacturing Technologies and Equipment (ICMTMTE 2018)
Article Number 02071
Number of page(s) 9
Section General problems of mechanical engineering: design, optimization, maintenance
Published online 30 October 2018
  1. European Network and Information Security Agency. Cloud Computing: Benefits, risks and recommendations for information security. – ENISA, (2009). [Google Scholar]
  2. T. K. Damenu, C. Balakrishna. Cloud Security Risk Management: A Critical Review, Proceedings of the 9th IEEE International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 370–375, (2015). [Google Scholar]
  3. F. C. Ku, and T.C. Chen. The risk management strategy of applying cloud computing, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 9, pp. 18–27, (2012). [Google Scholar]
  4. J. O. Fitó, M. L. Macías, J. Guitart Fernández. Toward business-driven risk management for Cloud computing, Proceedings of the International Conference on Network and Service Management, pp. 238–241, (2010). [Google Scholar]
  5. S. M. Habib, S. Ries, M. Muhlhauser. Towards a Trust Management System for Cloud Computing, Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933–939, (2011). [Google Scholar]
  6. B. Grobauer, T. Walloschek, and E. Stocker, Understanding cloud computing vulnerabilities, Security & privacy, IEEE, vol. 9, no. 2, pp. 50–57, (2011). [Google Scholar]
  7. M. Ju. Ohtilev, N. G. Mustafin, B. V. Sokolov, The concept of proactive management of complex objects: theoretical and technological bases, Izvestija vuzov. Priborostroenie., vol. 57, no. 11, pp. 7–14, (2014). [Google Scholar]
  8. H. Takabi, J. B. Joshi, and G.-J. Ahn, Security and privacy challenges in cloud computing environments, Security & Privacy, IEEE, vol. 8, no. 6, pp. 24–31, (2010). [Google Scholar]
  9. P. Mosca, Y. Zhang, Z. Xiao, and Y. Wang, Cloud security: Services, risks, and a case study on amazon cloud services, International Journal of Communications, Network and System Sciences, vol. 7, no. 12, pp. 529–535, (2014). [CrossRef] [Google Scholar]
  10. S. Na, K. Kim and E. Huh, Threats Evaluation for SLAs in Cloud Computing, Proceedings of the IEEE International Conference on Convergence Technology, pp.1570–1571, (2013). [Google Scholar]
  11. N. Brender, I. Markov, Risk perception and risk management in cloud computing: Results from a case study of Swiss companies, International Journal of Information Management, vol. 33, no. 5, pp. 726–733, (2013). [CrossRef] [Google Scholar]
  12. P. Saripalli, B. Walters, QUIRC: A Quantitative Impact and Risk Assessment Framework, Proceedings of the IEEE 3rd International Conference on Cloud Computing (CLOUD 10), pp. 280–288, (2010). [Google Scholar]
  13. M. Theoharidou, N. Tsalis, D. Gritzalis, In cloud we trust: Risk-Assessment-as-a-Service, Proceedings of the International Conference on Trust Management, pp. 100–110, (2013). [Google Scholar]
  14. A. Sangroya, S. Kumar, J. Dhok, and V. Varma, Towards analyzing data security risks in cloud computing environments, Proceedings of the International Conference on Information Systems, Technology and Management, pp. 255–265, (2010). [CrossRef] [Google Scholar]
  15. A. Skatkov, E. Maschenko, V. Shevchenko and D. Voronin, Actors interactions research in cloud computing environments using system dynamics methodology, Proceedings of the 18th FRUCT & ISPIT Conference, pp.612–619, (2016). [Google Scholar]
  16. S. C. Zhu, Y. Xu, M. Y. Jin, L. Sheng, Cloud Computing Security Risk Assessment Based on Level Protection Strategy, Computer Security, vol.5, pp.39–42, (2013). [Google Scholar]
  17. V. Bellandi et al., Toward Economic-Aware Risk Assessment on the Cloud, Security & privacy, IEEE, vol. 13, no. 6, pp. 30–37, (2015). [Google Scholar]
  18. C. A. Chih, Y. L. Huang, An Adjustable Risk Assessment Method for a Cloud System, Proceedings of the IEEE International Conference on Software Quality, Reliability and Security, pp. 115–120, (2015). [Google Scholar]
  19. Z. W. Jiang, W. R. Zhao, Y. Liu, B. X. Liu. Model for Cloud Computing Security Assessment Based on Classified Protection, Computer Science, vol.8, pp.151–156, (2013). [Google Scholar]
  20. A. Skatkov, V. Shevchenko and D. Voronin, Game-theoretical management model for IT-services of ERP-systems guaranteed level assurance in cloud environments, Proceedings of the 5th IEEE International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka, Bangladesh, in press, (2016). [Google Scholar]
  21. M. Carroll, A. Van Der Merwe, P. Kotze, Secure cloud computing: Benefits, risks and controls, Proceedings of the IEEE International Conference on Information Security for South Africa, pp.1–9, (2011). [Google Scholar]
  22. E. Cayirci et al. A cloud adoption risk assessment model, Proceedings of the 7th IEEE International Conference on Utility and Cloud Computing, pp. 908–913, (2014). [Google Scholar]
  23. N. Poolsappasit, R. Dewri, I. Ray, Dynamic security risk management using Bayesian attack graphs, Transactions on Dependable and Secure Computing, IEEE, vol. 9, no. 1, pp. 61–74, (2012). [CrossRef] [Google Scholar]
  24. F. Al-Musawi, A. H. Al-Badi, S. Ali, A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman, Proceedings of the International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp. 417–422, (2015). [CrossRef] [Google Scholar]
  25. A. Almutairi, A. Ghafoor, Risk-aware virtual resource management for multitenant cloud datacenters, Cloud Computing, IEEE, vol. 1, no. 3, pp. 34–44, (2014). [CrossRef] [Google Scholar]
  26. A. Almutairi, M. Sarfraz, A. Ghafoor Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters, Transactions on Cloud Computing, IEEE, vol. 1, no. 1, (2015). [Google Scholar]
  27. A. Skatkov, E. Maschenko, V. Shevchenko and D. Voronin, Visual quality estimation technique for services in cloud environments, Proceedings of the 10th IEEE International Conference on Application of Information and Communication Technologies, Baku, Azerbaijan, in press, (2016). [Google Scholar]
  28. A. Mansaf, and K. A. Shakil, A decision matrix and monitoring based framework for infrastructure performance enhancement in a cloud based environment, arXiv preprint arXiv:1412.8029, (2014). [Google Scholar]
  29. Gupta, Smrati, et al. Cloud Service Offer Selection. Model-Driven Development and Operation of Multi-Cloud Applications. Springer International Publishing pp. 13–22, (2017). [CrossRef] [Google Scholar]
  30. K. Julia, D. Pachamanova, and A. Corbett. The role of data visualization and analytics in performance management: Guiding entrepreneurial growth decisions. Journal of Accounting Education, (2017). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.