Cloud Computing and Storage Issues
Abstract
Full Text:
PDFReferences
Microsoft. Multi-Tenant Data Architecture 2006. 2010 Oct. Available from: http://msdn.microsoft.com/en-us/library/aa479086.aspx
Amazon. Amazon EC2 SLA. 2010 Oct. Available from: http://aws.amazon.com/ec2-sla/
Mell P, Grance T. The NIST Definition of Cloud Computing. USA: National Institute of Standards and Technology; 2009. Available from: http://www.wheresmyserver.co.nz/storage/media/faq-files/cloud-def-v15.pdf (accessed April 2010).
Jensen M, Schwenk J, Gruschka N, et al. On Technical Security Issues in Cloud Computing. Proceedings of the IEEE International Conference on Cloud Computing; 2009 Sep 21–25; Bangalore, India. 109–16p.
Wenjun Z. Integrated Security Framework for Secure Web Services. Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics; 2010 Apr 2–4; Jinggangshan, China. USA: IEEE. 178–83p.
Wang B, He H, Yuan LX, et al. Open Identity Management Framework for SaaS Ecosystem. Proceedings of the IEEE International Conference on e-Business Engineering; 2009 Oct 21–23; Macau, China. USA: IEEE. 512–17p.
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. vol. (In Press), Corrected Proof.
Fong E, Okun V. Web Application Scanners: Definitions and Functions. Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007); 2007 Jan 3–6; Waikoloa, USA. USA: IEEE. 280b-280b.
NIST. National Vulnerability Database (NVD). 2010 October. Available from: http://nvd.nist.gov/home.cfm
OWASP. The Ten Most Critical Web Application Security Vulnerabilities. 2010. Available from: http://www.owasp.org/index.php/OWASP_Top_Ten_Project
DOI: https://doi.org/10.37628/ijocspl.v1i2.832
Refbacks
- There are currently no refbacks.