References
- 한국인터넷진흥원, "모바일 클라우드 서비스 보안 침해 대응방안 연구," 2010.
- Armbrust, Michael, Armando Fox, and Rean Griffith, "Above the Clouds: A Berkeley View of Cloud Computing," Berkeley EECS Department, University of California, 2008.
- Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal, "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities," International Conference on High Performance Computing and Communications, 2008.
- CIO Council, "Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies', 2010.
- Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1," December 2009.
- Cloud Security Alliance SecaaS, "Defined Categories of Service 2011," 2011.
- Danish Jamil, and Hassan Zaki, "Cloud Computing Security," International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 3478- 3483, 2011.
- ENISA, "Cloud computing: benefits, risks and recommendations for information security," November 2009 (http://www.enisa.europa.eu)
- IDC, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges," 2008.
- J. Brodkin, "Gartner: Seven cloud-computing security risks," Infoworld, 2009.
- L Ertual, S Singhal, and G. Saldamli, "Security challenges in cloud computing," WORLDCOMP 2010, 2010.
- NIST Special Publication 500-293, "US Government Cloud Computing Technology Roadmap," 2011.
- NIST Special Publication 800-145, "The NIST Definition of Cloud Computing," 2011.
- NIST Special Publication 800-53A, "Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Building Effective Security Assessment Plans," 2010.
- Pearson, S., "Taking account of privacy when designing cloud computing services," In ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 2009, pp. 44-52.
- R. Chow, P. Golle, M. Jakobsson, E. Shi, et al., "Controlling data in the cloud: outsourcing computation without outsourcing control," Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), 2009.
- Vaquero, L., Rodero-Merino, L., and Mor, D., "Locking the sky: a survey on IaaS cloud security," Computing, 91, pp. 93-118, 2011. https://doi.org/10.1007/s00607-010-0140-x
- Wang, Wang, Tao Tao, and Marcel Kunze, "Scientific Cloud Computing: Early Definition and Experience," High Performance Computing and Communications, 2008.
- Yuefa, D. W. Bo, G. Yaqiang, Z. Quan, and T. Chaojing, "Data Security Model for Cloud Computing," Proceeding of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, 2009.