Securing the Deployment of Cloud-Hosted Services for Guaranteeing Multitenancy Isolation
Author:
Charles Ochei Laud
Reference39 articles.
1. Bass L, Clements P, Kazman R. Software Architecture in Practice, 3/E. United States: Pearson Education; 2013
2. Bauer E, Adams R. Reliability and Availability of Cloud Computing. New Jersey: John Wiley & Sons; 2012
3. Buyya R, Broberg J, Goscinski A. Cloud Computing: Principles and Paradigms. New Jersey, United States: John Wiley & Sons, Inc.; 2011. DOI: 10.1002/9780470940105
4. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, et al. A view of cloud computing. Communications of the ACM. 2010;53(4):50-58
5. Srinivasan MK, Sarukesi K, Rodrigues P, Manoj MS, Revathy P. State-of-the-art cloud computing security taxonomies—A classification of security challenges in the present cloud computing environment. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics; ACM. 2012. pp. 470-476