The Proceedings of the International Conference on Cloud Security and Management - ICCSM 2013

Page 127

Madhuri Revalla, Ajay Gupta and Vijay Bhuse Nitin, C. S. & Ashutosh, S., 2010. Energy Analysis of Security for Cloud Application. IEEE. Peter, M. & Timothy, G., 2011. The NIST Definition of Cloud Computing, s.l.: s.n. Priya, M. & Geeta, S., 2011. Privacy Issues and Challenges in Cloud computing. International Journal of Advanced Engineering Sciences and Technologies, 5(1), pp. 001 - 006. Rack space, 2011. Cloud Security and what vendors and customers need to do to stay secure, s.l.: Diversity Limited. Ramgovind, Eloff & Smith, 2010. The management of security in Cloud computing. s.l., s.n. Rumelioglu, S., 2005. Evaluation of The Embedded Firewall System , s.l.: s.n. Shengmei, L., Zhaoji, L., Xiaohua, C. & Zhuolin, Y. J. C., 2011. Virtualization security for cloud computing service. International Conference on Cloud and Service Computing, pp. 174-179. Siebert, E., 2011. How to connect virtual environments to DMZ network architecture. SearchNetworking. Thomas, R., Eran, T., Hovav, S. & Stefan, S., 2009. Hey, You, Get Off of My Cloud:Exploring Information Leakage in ThirdParty Compute Clouds. ACM. Vernier Networks, n.d. Stopping the Insider Threat with Network Access Control (NAC), s.l.: s.n. Xiangyang, L. et al., 2011. Virtualization Security Risks and Solutions of Cloud Computing via Divide-Conquer Strategy. s.l., s.n., pp. 637-641. Zhidong, S. & Qiang, T., 2010. The Security of Cloud Computing System enabled by Trusted Computing Technology. s.l., s.n., pp. V2-11 - V2-15.

114


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.