Journal of Engineering and Applied Sciences
Year:
2012
Volume:
7
Issue:
8
Page No.
468 - 482
An Adaptive Security Framework Delivered as a Service for Cloud Environment
Authors :
S. Subashini
and
V. Kavitha
References
Akhawe, D., A. Barth, P.E. Lam, J.C. Mitchell and D. Song, 2010. Towards a formal foundation of web security. Proceeding of the 2010 23rd IEEE Computer Society Foundation Symposium, May, 2010, IEEE Computer Society Washington, DC, USA., pp: 290-304.
Bertino, E., 2004. Selective and authentic third party distribution of XML documents. IEEE Transactions Knowledge Data Eng., 16: 1263-1278.
CrossRef | Choudhary, V., 2007. Software as a service: Implications for Investment in software development. Proceedings of the 40th Annual Hawaii International Conference on System Sciences, January 3-6, 2007, Waikoloa, HI., USA., 209a-.
Clavister, 2009. Security in the cloud, clavister white paper. IDC Enterprise Panel, http://www.clavister.com/documents/resources/white-papers/clavister-whp-security-in-the-cloud-gb.pdf.
Gentry, C. and M. Szydlo, 2002. Cryptanalysis of the revised NTRU signature scheme. Proceedings of the Eurocrypt'02 International Confrence on the Theory and Applications of Cryptographic Techniques: Advance in Cryptology, April 28-May 2, 2002, Springer-Verlag, London, pp: 299-320.
Gentry, C., C. Peikert and V. Vaikuntanathan, 2008. Trapdoors for hard lattices and new cryptographic constructions. Proceeding of the 40th ACM Symposium on Theory of Computing, May 17-20, 2008, New York, USA., pp: 197-206.
Gruschka, N. and L.L. Iacono, 2009. Vulnerable cloud: SOAP security revisited. Proceedings of the IEEE International Conference on Web Services, July 6-10, 2009, IEEE Computer Society, Sankt Augustin, Germany, pp: 625-631.
Jung, Y. and M. Chung, 2010. Adaptive security management model in cloud computing environment. Proceeding of the 12th International Conference on Advanced Communication Technology, February 7-10, 2010, Busan, South Korea, pp: 1664-1669.
Molnar, D. and S. Schechter, 2010. Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. Proceedings of the 9th Workshop on the Economics of Information Security, June 7-8, 2010, Microsoft Research -.
Paryasto, M.W., Kuspriyanto, S. Sutikno and A. Sasongko, 2009. Issues in elliptic curve cryptography implementation. Internetworking Indonesia J., 1: 29-33.
Direct Link | Simon, D.R., 1997. On the power of quantum computation. SIAM J. Comput., 26: 1474-1483.
Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef | Wang, C., Q. Wang, K. Ren and W. Lou, 2009. Ensuring data storage security in cloud computing. Proc. Int. Workshop Quality Serv., 186: 1-9.
Yunis, M.M., 2009. A cloud-free security model for cloud computing. Int. J. Services Standards, 5: 354-375.
CrossRef |