Author:
Prasad Ramjee,Rohokale Vandana
Publisher
Springer International Publishing
Reference21 articles.
1. Abdullah S, Bakar KAA (2018) Security and privacy challenges in cloud computing. In: Cyber resilience conference (CRC)
2. Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: IEEE 4th international conference on cyber security and cloud computing
3. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616
4. Cable P (2018) How to create a threat model for cloud infrastructure security. Threat Stack AWS SECURITY Blog.
https://www.threatstack.com/blog/how-to-create-a-threat-model-for-cloud-infrastructure-security
5. Feller E, Rilling L, Morin C (2012) Snoze: a scalable and automatic virtual machine management framework for private clouds. In: Proceedings of CCGrid’12, Ottawa, Canada, pp 482–489 (2012)