References
- M. Armbrust, "A View of Cloud Computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010. Article (CrossRef Link)
- S. J. Kim, "Information Security Plan on Cloud Computing: Information Security Management System," Management Consulting Review, vol. 1, no. 2, pp. 194-208, 2010. http://www.dbpia.co.kr/Journal/ArticleDetail/1366259
- S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang and A. Ghalsasi, "Cloud Computing - The Business Perspective," Decision Support Systems, vol. 51, no. 1, pp. 176-189, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.dss.2010.12.006
- S. Y. Shin, "Master Plan for Vitalization of Cloud Computing," Local Information Magazine, vol. 61, pp. 46-51, 2010. http://www.klid.or.kr/section/board/bbs_view.html?PID=localdata&seq=1195
- Korea Communications Commission and Korea Internet Security Agency, "Information Security guide for Cloud Services," Korea Communications Commissions and Korea Internet Security Agency, October, 2011. http://www.nipa.kr/know/trandInformationView.it?identifier=02-004-111020-000021&menuNo=26&page=5
- S. K. Eun, "Cloud Computing Security Technology Trends," Review of Korea Institute of Information Security and Cryptology, vol. 20, no. 2, pp. 27-31, 2010. http://ocean.kisti.re.kr/is/mv/showPDF_ocean.jsp?pYear=2010&koi=KISTI1.1003%2FJNL.JAKO201027463260075&sp=32&CN1=JAKO201027463260075&poid=kiisc&kojic=JBBHBD&sVnc=v20n2&sFree
- E. Y. Choi, B. J. Han, D. H. Shin, H. C. Jung and KISA Security R&D Team, "A Study for Enhancing Mobile Cloud Computing Security," in Proc. of 2011 Korean Society for Internet Information Summer Conference, vol. 12, no. 1, pp. 221-222, 2011.
- Korea Communications Commission Press, "KCC Open the Cloud Service Test Bed," Korea Communications Commission, November, 2010.
- F. Gens, R. Mahowald, R. L. Villars, D. Bradshaw, C. Morris, "Cloud Computing 2010 An IDC Update," International Data Corporation, 2010.
- J. Heiser and M. Nicolett, "Assessing the Security Risks of Cloud Computing," Gartner, 2008. http://www.gartner.com/DisplayDocument?id=685308
- S. Gorniak, D. Ikonomou, P. Saragiotis, P. Belimpasakis, B. Bencsath, M. Broda, L. Buttyan, G. Clemo, P. Kijewski, A. Merle, K. Mitrokotsa, A. Munro, O. Popov, C. W. Probst, L. Romano, C. Siaterlis, V. Siris, I. Verbauwhede, and C. Vishik, "Priorities for Research on Current and Emerging Network Trends," European Network and Information Security Agency, 2010.
- J. S. Ryu, "Cloud Computing as Green IT and Security Issues," The Graduate School of Computer Information Communications, Korea University, Aug.2010. http://naver.nanet.go.kr/SearchDetailView.do?cn=KDMT1201072878&sysid=nhn
- S. K. Eun, N. S. Cho, Y. H. Kim and D. S. Choi, "Cloud Computing Security Technology," Electronics and Telecommunications Trends, Electronics and Telecommunications Research Institute, vol. 24, no. 4, pp. 79-88, 2009. http://ettrends.etri.re.kr/PDFData/24-4_079_088.pdf
- Y. J. Rho, "A Study on the Private Information Technologies using Cloud Computing," Department of Mechanical Engineering, Korea University, 2010.
- C. S. Lim, "Cloud Computing Security Technology," Review of Korea Institutes of Information Security and Cryptology, vol. 19, no. 3, pp. 14-17, 2009. http://ocean.kisti.re.kr/is/mv/showPDF_ocean.jsp?pYear=2009&koi=KISTI1.1003%2FJNL.JAKO200922951807082&sp=14&CN1=JAKO200922951807082&poid=kiisc&kojic=JBBHBD&sVnc=v19n3&sFree
- Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1," December 2009. https://cloudsecurityalliance.org/research/security-guidance/
- K. J. Lee, "The Study on the Issue of Cloud Computing Security and the Plans for the Personal Information Protection," Department of Information Security, The Graduate School of Information & Communications, Sungkyunkwan University, 2010. http://naver.nanet.go.kr/SearchDetailView.do?cn=KDMT1201130607&sysid=nhn
- D. H. Kim, "A Study on the improvement and application of Information Security Management System for Cloud Computing Security," Department of Information Security, The Graduate School of Information and Communication, Sungkyunkwan University, 2011. http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=2de2b4752a6b263dffe0bdc3ef48d419&naverYN=Y
- K. E. Train, "Discrete Choice Methods with Simulation", Cambridge University Press 2 edition, USA, 2009.
- W. E. Greene and D. A. Hensher, "Modeling Ordered Choices: A Primer and Recent Developments," Social Science Research Network, 2010.
- Y. H. Cho, "Defect Management System Plan for ISMS Certification," Dept. of Information Security, The Graduate School of Information and Communications, Konkuk University, 2010. http://naver.nanet.go.kr/SearchDetailView.do?cn=KDMT1201130607&sysid=nhn
- J. S. Oh,, Y. B. Yoon, J. R. Seo and B. G. Lee, "The Difference of Awareness between Public institutions and Private Companies for Cloud Computing Security", International Journal of Security and Its Applications, Vol.6, No.3, pp.1-10, 2012.http://www.sersc.org/journals/IJSIA/vol6_no3_2012/1.pdf
- Y. B. Yoon, J. S. Oh and B. G. Lee, "The Important Factors in Security for Introducing the Cloud Services", Journal of Korean Society for Internet Information, Vol.13, No.6, pp.21-28, 2012. Article (CrossRef Link).
Cited by
- MetricsCloud: Scaling-Up Metrics Dissemination in Large Organizations vol.2014, pp.None, 2013, https://doi.org/10.1155/2014/905431
- Dynamic and Quantitative Method of Analyzing Service Consistency Evolution Based on Extended Hierarchical Finite State Automata vol.2014, pp.None, 2014, https://doi.org/10.1155/2014/793271
- An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage vol.8, pp.10, 2013, https://doi.org/10.3837/tiis.2014.10.019
- Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration vol.8, pp.11, 2013, https://doi.org/10.3837/tiis.2014.11.014
- An Exploratory Study of Cloud Service Level Agreements - State of the Art Review vol.9, pp.3, 2013, https://doi.org/10.3837/tiis.2015.03.001
- A Hybrid Multi-Criteria Decision-Making Model for a Cloud Service Selection Problem Using BSC, Fuzzy Delphi Method and Fuzzy AHP vol.86, pp.1, 2013, https://doi.org/10.1007/s11277-015-2976-z
- Exploring users’ experiences of using personal cloud storage services: a phenomenological study vol.37, pp.3, 2013, https://doi.org/10.1080/0144929x.2018.1435722
- Password‐based encryption approach for securing sensitive data vol.3, pp.5, 2020, https://doi.org/10.1002/spy2.121
- How risk perception influences CEOs' technological decisions: extending the technology acceptance model to small and medium-sized enterprises' technology decision makers vol.24, pp.3, 2013, https://doi.org/10.1108/ejim-09-2019-0253