Tài liệu tham khảo |
Loại |
Chi tiết |
[4] Ponemon Institute, Security of Cloud Computing Providers Study, Sponsored by CA Technologies, 31/12/2010 |
Sách, tạp chí |
Tiêu đề: |
Security of Cloud Computing Providers Study |
|
[5] Mohamed Al Morsy, John Grundy and Ingo Müller, An Analysis of The Cloud Computing Security Problem, Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 th Nov 2010 |
Sách, tạp chí |
Tiêu đề: |
An Analysis of The Cloud Computing Security Problem |
|
[6] Amani S. Ibrahim, James Hamlyn Amani S. Ibrahim, James Hamlyn-Harris and John Grundy, Emerging Security Challenges of Cloud Virtual Infrastructure, Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30 th Nov 2010 |
Sách, tạp chí |
Tiêu đề: |
Emerging Security Challenges of Cloud Virtual Infrastructure |
|
[7] James P. Durbano, Derek Rustvold, George Saylor và John Studarus, Cloud Computing: Principles, Systems and Applications - Chapter 17: Securing the Cloud, 2010 |
Sách, tạp chí |
Tiêu đề: |
Cloud Computing: Principles, Systems and Applications - Chapter 17: Securing the Cloud |
|
[8] Sok Chuob; Pokharel, M.; Jong Sou Park; Comput. Eng. Dept., Korea Aerosp. Univ., Goyang, South Korea, The future data center for e-governance, 2010 |
Sách, tạp chí |
Tiêu đề: |
The future data center for e-governance |
|
[9] Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad, Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review, 2010 |
Sách, tạp chí |
Tiêu đề: |
Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review |
|
[10] Cong Wang; Qian Wang; Kui Ren; Wenjing Lou, Ensuring data storage security in Cloud Computing, Dept. of ECE, Illinois Inst. of Technol., Chicago, IL, USA, 2009.[11] http://vi.wikipedia.org.[12] http://en.wikipedia.org |
Sách, tạp chí |
Tiêu đề: |
Ensuring data storage security in Cloud Computing |
|
[2] ISO/IEC 27001, first edition 2005-10-15, Information technology - Security techniques - Information security management systems - Requirements |
Khác |
|
[3] ISO/IEC 27002, second edition 2005-06-15, Information technology - Security techniques - Code of practice for information security management |
Khác |
|