Effective Methodologies for Enhancing Cloud Management in New Modern Enterprises
Abstract
Full Text:
PDFReferences
K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” Internet Computing, IEEE, vol. 16, no. 1, jan.-feb. 2012, pp. 69 –73.
P. Silva, C. Westphall, C. Westphall, M. Mattos, and D. Santos, “An architecture for risk analysis in cloud,” in ICNS 2014, The Tenth International Conference on Networking and Services, 2014, pp. 29–33.
F. Shaikh and S. Haider, “Security threats in cloud computing,” in Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, 2011, pp. 214–219.
R. B. Uriarte and C. B. Westphall, “Panoptes: A monitoring architecture and framework for supporting autonomic clouds,” in Network Operations and Management Symposium (NOMS), 2014 IEEE. IEEE, 2014, pp. 1–5.
D. Fernandes, L. Soares, J. Gomes, M. Freire, and P. Incio, “Security issues in cloud environments: a survey,” International Journal of Information Security, vol. 13, no. 2, 2014, pp. 113–170. [Online]. Available: http://dx.doi.org/10.1007/s10207-013-0208-7 [retrieved: Sept, 2014]
T. T. W. Group et al., “The notorious nine: cloud computing top threats in 2013,” Cloud Security Alliance, 2013.
M. Mukhtarov, N. Miloslavskaya, and A. Tolstoy, “Cloud network security monitoring and response system,” vol. 8, no. Special Issue on Cloud Computing and Services. sai: itssa.0008.2012.020 ITSSA, 2012, pp. 71–83.
B. Grobauer, T. Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” Security Privacy, IEEE, vol. 9, no. 2, marchapril 2011, pp. 50 –57.
X. Tan and B. Ai, “The issues of cloud computing security in high-speed railway,” in Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, vol. 8, 2011, pp. 4358–4363.
F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, pp. 245–249.
K. Vieira, A. Schulter, C. Westphall, and C. Westphall, “Intrusion detection for grid and cloud computing,” IT Professional, vol. 12, no. 4, 2010, pp. 38–43.
https://cloudacademy.com/blog/aws-best-practices.
https://www.slideshare.net/AmazonWebServices/best-practices-for-security-at-scale.
Aljawarneh, S., 2011. Cloud Security Engineering. International Journal of Cloud Applications and Computing, Volume 1(2), pp. 64–70.
L.Aruna and Dr.M.Aramudhan, text book for ”Fundamentals of Cloud Computing”, ISBN No: 978-93- 5137- 266-0.
L.Aruna & Dr.M.Aramudhan,”A Novel Survey on SLA based Load leveling in Cloud Computing “ International Journal of Research in Computer and Communication Technology, Vol 3, Issue 6, June- 2014-ISSN (Online) 2278- 5841and ISSN No 2320- 5156.
http://cloudcomputing.sys-con.com/node/2261725.
XuX,WangH, MaoJ, NewmanST, KramerTR, ProctorFM, MichaloskiJ L, STEP CompliantNC. Research:the search for intelligent CAD / CAPP / CAM / CNC integration.InternationalJournalofProductionResearch.2005;43(17): 3703–43.
XuX,NeeAYC, editors.Advanced design and manufacturing based on STEP. Springer Verlag; 2010. ISBN:978-1-84882-738-7.
TaoF, HuY, ZhouZ .Application and modelling ofres our service trust- QoS evaluation in manufacturing grid system. International Journal of Production Research 2009; 47(6): 1521 –50.
DOI: https://doi.org/10.23956/ijarcsse.v7i8.39
Refbacks
- There are currently no refbacks.