Threat analysis and misuse patterns of federated inter-cloud systems
Author:
Publisher
ACM Press
Reference14 articles.
1. D. Bernstein and D. Vij, "Intercloud security considerations", In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, IEEE, 2010, 537--544.
2. D. Bernstein, D. Vij, and S. Diamond. "An intercloud cloud computing economy-technology, governance, and market blueprints". In SRII Global Conference (SRII), 2011 Annual, pages 293--299. IEEE, 2011.
3. J. Bohli, N. Gruschka, M. Jensen, L. Iacono, and N. Marnau. "Security and Privacy-Enhancing Multicloud Architectures". IEEE Trans. Dependable Secur. Comput. 10, 4 (July 2013), 212--224.
4. R. Buyya, R. Ranjan, and R. N. Calheiros, "Intercloud: Utility-oriented federation of Cloud computing environments for scaling of application services". In algorithms and architectures for parallel processing, Springer, 2010, 13--31.
5. E. Carlini, M. Coppola, P. Dazzi, L. Ricci and G. Righetti, "Cloud federations in contrail". In Euro-Par 2011: Parallel Processing Workshops, pages 159--168. Springer, 2012.
Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC;Human-Centered Software Engineering;2022
2. Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges;Future Generation Computer Systems;2018-01
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3