Author:
Deshpande Prachi S.,Sharma Subhash C.,Peddoju Sateesh K.
Reference57 articles.
1. Vouk, M.: Cloud computing-issues, research and implementations. In: 30th International Conference on Information Technology Interface (ITI-08), Dubrovnik, June 2008, pp. 31–40
2. Wang, L., Laszewski, G., Younge, A., et al.: Cloud computing: a perspective study. New Gener. Comput. 28(2), 137–146 (2010)
3. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
4. Chow, R., Golle, P., Jakobsson, M., et al.: Controlling data in the Cloud: outsourcing computation without outsourcing control. In: Proceedings of ACM Workshop on Cloud Computing Security, Chicago, Nov 2009, pp. 85–90
5. Liu, K., Ma, K., Abraham, A.: Introducing secure data transmission scheme in a heterogeneous environment. In: 3rd World Congress on Information and Communication Technologies (WICT), Hanoi, Dec 2013, pp. 13–18