Security Management Model in Cloud Computing Environment
- Published: 27 Nov 2016
[1] Khan, A.U.R.; Othman, M.; Feng Xia; Khan, A.N. Context-Aware Mobile Cloud Computing and Its Challenges[J], IEEE Cloud Computing, 2015, 2(3): 42- 49
[2] Jain, R.; Paul, S. Network virtualization and software defined networking for cloud computing: a survey[J], IEEE Communications Magazine. 2013, 51(11): 24-31
[3] Wei, Z., Xiaolin, G., Wei, H. R., & Si, Y. (2012). TCP DDOS attack detection on the host in the KVM virtual machine environment. 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. doi:10.1109/icis.2012.105
[4] YamunaDevi, L.; Aruna, P.; Sudha, D.D.; Priya, N. Security in Virtual Machine Live Migration for KVM[A], YamunaDevi, 2011 International Conference on Process Automation, Control and Computing (PACC)[C], USA:IEEE Computer Society Press,2011.1-6
[5] Danev B, Jayaram M R,Karame G O, et al. Enabling secure VM-vTPM migration in private clouds[A], Danev, 240 the 27th Annual Computer Security Applications Conference[C],USA: ACM Press, 2011.187-196.
[6] Fen Y, Yiqun C, Hao H, et al. Detecting DDoS attack based on compensation non-parameter CUSUM algorithm[J]. Journal on Communications, 2008, 29(6): 126-132.
[7] Pu Xl. On the improving of cumulative sum chart[J]. ACTA Mathematicae Applicatae SINICA, 2003,26(2):226−241. 245
[8] Moustakides GV. Performance of CUSUM tests for detecting changes in continuous time processes[A].Moustakides,IEEE International Symposium on Information Theory[C]. USA:IEEE Computer Society Press,2002.186−187
[9] Hussein, Nidal Hassan, and Ahmed Khalid. "A survey of Cloud Computing Security challenges and solutions." International Journal of Computer Science and Information Security 14.1 (2016): 52.
[10] Guana, Zhi-Tao, and Ting-Ting Yangb. "Research on challenges and security of access control models for mobile cloud computing." Wireless Communication and Network: Proceedings of 2015 International Workshop on Wireless Communication and Network (IWWCN2015). World Scientific, 2015.
[11] Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13.18 (2013): 1587-1611.
Related research
[1] Khan, A.U.R.; Othman, M.; Feng Xia; Khan, A.N. Context-Aware Mobile Cloud Computing and Its Challenges[J], IEEE Cloud Computing, 2015, 2(3): 42- 49
[2] Jain, R.; Paul, S. Network virtualization and software defined networking for cloud computing: a survey[J], IEEE Communications Magazine. 2013, 51(11): 24-31
[3] Wei, Z., Xiaolin, G., Wei, H. R., & Si, Y. (2012). TCP DDOS attack detection on the host in the KVM virtual machine environment. 2012 IEEE/ACIS 11th International Conference on Computer and Information Science. doi:10.1109/icis.2012.105
[4] YamunaDevi, L.; Aruna, P.; Sudha, D.D.; Priya, N. Security in Virtual Machine Live Migration for KVM[A], YamunaDevi, 2011 International Conference on Process Automation, Control and Computing (PACC)[C], USA:IEEE Computer Society Press,2011.1-6
[5] Danev B, Jayaram M R,Karame G O, et al. Enabling secure VM-vTPM migration in private clouds[A], Danev, 240 the 27th Annual Computer Security Applications Conference[C],USA: ACM Press, 2011.187-196.
[6] Fen Y, Yiqun C, Hao H, et al. Detecting DDoS attack based on compensation non-parameter CUSUM algorithm[J]. Journal on Communications, 2008, 29(6): 126-132.
[7] Pu Xl. On the improving of cumulative sum chart[J]. ACTA Mathematicae Applicatae SINICA, 2003,26(2):226−241. 245
[8] Moustakides GV. Performance of CUSUM tests for detecting changes in continuous time processes[A].Moustakides,IEEE International Symposium on Information Theory[C]. USA:IEEE Computer Society Press,2002.186−187
[9] Hussein, Nidal Hassan, and Ahmed Khalid. "A survey of Cloud Computing Security challenges and solutions." International Journal of Computer Science and Information Security 14.1 (2016): 52.
[10] Guana, Zhi-Tao, and Ting-Ting Yangb. "Research on challenges and security of access control models for mobile cloud computing." Wireless Communication and Network: Proceedings of 2015 International Workshop on Wireless Communication and Network (IWWCN2015). World Scientific, 2015.
[11] Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13.18 (2013): 1587-1611.