References
- I. Y. Jung, I. Jo, and Y. Yu, "Trust assurance of data in cloud computing environment," J. KICS, vol. 36, no. 9, pp. 1066-1072, Sep. 2011. https://doi.org/10.7840/KICS.2011.36B.9.1066
- HP(Analyst report), IDG Tech Dossier: Security in the New V-Era(2012), Retrieved June, 27, 2012, from http://www8.hp.com/h20195/v2/GetDocument. aspx?docname=4AA4-6716EEW.
- Intel, Intel Virtualization Technology(2006), Retrieved June, 30, 2012, from http://www.intel.com/technology/itj/2006/v10i3 /1-hardware/5-architecture.htm.
- Advanced Micro Devices, AMD-VTM NestedPaging(2008), Retrieved June, 25, 2012, from http://developer.amd.com/wordpress/media/201 2/10/NPT-WP-1%201-final-TM.pdf.
- T. Grance and W. Jansen, "Guidelines on security and privacy in public cloud computing," NIST Special Publication 800-144, Dec. 2011.
- CSA(Cloud Security Alliance), "CSA Guidance Version 3," Security Guidance for Critical Areas of Focus in Cloud Computing, Nov. 2011.
- S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," J. Network Comput. Applicat., vol. 34, no. 1, pp. 1-11, Jan. 2010.
- N. Gruschka and M. Jason, "Attack surfaces : a taxonomy for attacks on cloud services," in Proc. 2010 IEEE 3rd Int. Conf. Cloud Comput. (CLOUD), pp. 276-279, Miami, U.S.A., July 2010.
- KISA(Korea Internet Security Agency) Research and Developer Team, "Cloud Service Information Security Guideline," KISA Guideline and Explanation, Oct. 2011.
- TTA(Telecommunication Technology Association), Intrusion Detection Framework in Collaborative Cloud Environment, TTAK.KO-10.0534, Dec. 2011.