Cloud System Security Technology Trend
[web] / 2012 / http://www.ciokorea.com/news/13908 / http://www.ciokorea.com/news/13908
[report] Cloud Security Alliance / 2010 / Top Threats to Cloud Computing V1.0
[other] / 2008 / IDC Enterprise Panel, n=244
[journal]
김진형
/ 2011
/
Study of Trade-off Model Considering Privacy Protection Level and Privacy Violation Level
/ 보안공학연구논문지
/ 보안공학연구지원센터
8
(2)
: 215~226
[report] Cloud Computing Use Case Discussion Group / 2010 / Cloud Computing Use Case White Paper Version 4.0
[journal] D. Zissis / 2012 / Addressing cloud computing security issues / Future Generation Computer Systems 28 (3)
[other] Cloud Security Alliance / 2009 / Security Guidance for Critical Areas of Focus in Cloud Computing V2.1
[other] W. Jansen / 2011 / Guidelines on Security and Privacy in Public Cloud Computing
[web] / REDWARE / http://www.radware.com/
[web] / vAmour / http://www.varmour.com/
[report] Tal Garfinkel / 2003 / A Virtual Machine Introspection Based Architecture for Intrusion Detection
[report] Ibrahim, A.S / 2011 / CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model
[other] X. Chen / 2008 / Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
[book] S. B. Suh / 2007 / Secure architecture and implementation of xen on arm for mobile devices
[other] F. Zhang / 2011 / CloudVisor : Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization
[journal] Seongmong Lee / 2010 / Information System Security / Inforever Consulting
[journal]
조대균
/ 2013
/
Development and Implementation of Monitoring System for Management of Virtual Resource Based on Cloud Computing
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
18
(2)
: 41~47
[web] / Novel / http://novellkorea.co.kr/bbs/edm_forge
[web] / IBM / http://www-935.ibm.com/services/kr/ko/it-services
[confproc] David Recordon / 2006 / OpenID 2.0: a platform for user-centric identity management / Proceedings of the second ACM workshop on Digital identity management : 11~16
[journal] Jorge Fontenla Gonzalez / 2010 / Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems
[report] Gaoyuan Pan / 2012 / Securing RESTful WCF Services with XAuth and Service Authorization Manager - A Practical Way for User Authorization and Server Protection
[journal] Gabriel Lo'peza / 2005 / A network access control approach based on the AAA architecture and authorization attributes
[other] Markku-Juhani O. Saarinen / 2013 / Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
[journal]
박중오
/ 2012
/
A Study on Parallel AES Cipher Algorithm based on Multi Processor
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
17
(1)
: 171~181
[confproc] C. Wang / 2010 / Privacy-preserving public auditing for data storage security in cloud computing / Proc. of the 29th conference on Information communications : 525~533
[report] E. Rescorla / 2006 / Datagram Transport Layer Security