References
- J.T. Song, H.S. Park, J.D. Park, S.K. KIM, "Safe Network Technologies", Electronics and Telecommunications Trends, ETRI, Vol. 28, No. 6, pp.28-36, 2013.
- IBM Virtualization White Paper, IBM, 2006.
- Future Internet: Terminology, TTAK.KO-01.0142, November 2011.
- Seonho Kang, Hwangkyu Choi, "Design and Implementation of Scalable Webhard API Based on Storage Virtualization for Groupware Systems", Journal of Digital Contents Society, Vol. 15, No. 3, pp.395-403, Jun. 2014. https://doi.org/10.9728/dcs.2014.15.3.395
- Guidelines for the administration cloud construction and office environment, Ministry of Security and Public Administration, September 2012.
- S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
- S.J. Jung, M.G. Sin, H.J. Kim, "Development trends of network virtualization standard techniques for the future Internet", TTA Journal No. 132, 2012.
- NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
- C.S. Kim, B.I. Jang, H.K. Jung, "A Study on the Security Technology for Introduction the Secure Cloud Computing Service", Journal of Security Engineering, Vol, No.5, pp.568-579, 2013.
- J. Archer, D. Culliname, N. Puhlmann, A. Boehme, P. Kurtz, and J. Reavis, "Security Guidance for critical areas of focus in cloud computing v2.1", Cloud Security Alliance, Dec. 2009.
- Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, "A survey on gaps, threat remediation challenges and some thoughts for proactive attackdetectgion in cloud computing", Future Generation Computer System, vol. 28, no. 6, June.2012.
- J.H. Jeon, "A study on the vulnerability and corresponding technique trends of the cloud computing service", Journal of Korea Convergence Security Association, Vol 13, No 6, Dec. 2013.
- S.J. Jung, Y.M. Bae, "Trend analysis of Threats and Technologies for Cloud Security", Journal of Security Engineering, Vol. 10, No. 2, pp.199-212, 2013(in Korea).
- NIST, Guide to Security for Full Virtualization Technologies, Jan. 2011.
- Security Guidance for Critical Areas of focus in Cloud Computing v3.0, CSA, 2011.
- A guide to information security for cloud services, KISA, October 2011.
Cited by
- A Study on the Highly Trust Network for Personal Information Protection of IoT Environment vol.21, pp.3, 2015, https://doi.org/10.9728/dcs.2020.21.3.609