Journal of Engineering and Applied Sciences

Year: 2012
Volume: 7
Issue: 8
Page No. 468 - 482

An Adaptive Security Framework Delivered as a Service for Cloud Environment

Authors : S. Subashini and V. Kavitha

References

Akhawe, D., A. Barth, P.E. Lam, J.C. Mitchell and D. Song, 2010. Towards a formal foundation of web security. Proceeding of the 2010 23rd IEEE Computer Society Foundation Symposium, May, 2010, IEEE Computer Society Washington, DC, USA., pp: 290-304.

Bertino, E., 2004. Selective and authentic third party distribution of XML documents. IEEE Transactions Knowledge Data Eng., 16: 1263-1278.
CrossRef  |  

Choudhary, V., 2007. Software as a service: Implications for Investment in software development. Proceedings of the 40th Annual Hawaii International Conference on System Sciences, January 3-6, 2007, Waikoloa, HI., USA., 209a-.

Clavister, 2009. Security in the cloud, clavister white paper. IDC Enterprise Panel, http://www.clavister.com/documents/resources/white-papers/clavister-whp-security-in-the-cloud-gb.pdf.

Gentry, C. and M. Szydlo, 2002. Cryptanalysis of the revised NTRU signature scheme. Proceedings of the Eurocrypt'02 International Confrence on the Theory and Applications of Cryptographic Techniques: Advance in Cryptology, April 28-May 2, 2002, Springer-Verlag, London, pp: 299-320.

Gentry, C., C. Peikert and V. Vaikuntanathan, 2008. Trapdoors for hard lattices and new cryptographic constructions. Proceeding of the 40th ACM Symposium on Theory of Computing, May 17-20, 2008, New York, USA., pp: 197-206.

Gruschka, N. and L.L. Iacono, 2009. Vulnerable cloud: SOAP security revisited. Proceedings of the IEEE International Conference on Web Services, July 6-10, 2009, IEEE Computer Society, Sankt Augustin, Germany, pp: 625-631.

Jung, Y. and M. Chung, 2010. Adaptive security management model in cloud computing environment. Proceeding of the 12th International Conference on Advanced Communication Technology, February 7-10, 2010, Busan, South Korea, pp: 1664-1669.

Molnar, D. and S. Schechter, 2010. Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. Proceedings of the 9th Workshop on the Economics of Information Security, June 7-8, 2010, Microsoft Research -.

Paryasto, M.W., Kuspriyanto, S. Sutikno and A. Sasongko, 2009. Issues in elliptic curve cryptography implementation. Internetworking Indonesia J., 1: 29-33.
Direct Link  |  

Simon, D.R., 1997. On the power of quantum computation. SIAM J. Comput., 26: 1474-1483.

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef  |  

Wang, C., Q. Wang, K. Ren and W. Lou, 2009. Ensuring data storage security in cloud computing. Proc. Int. Workshop Quality Serv., 186: 1-9.

Yunis, M.M., 2009. A cloud-free security model for cloud computing. Int. J. Services Standards, 5: 354-375.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved