Knowledge management in cloud environments
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
Self-managing SLA compliance in cloud architectures: a market-based approach
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Security vulnerabilities from inside and outside the Eucalyptus cloud
Proceedings of the 6th Balkan Conference in Informatics
Hi-index | 0.00 |
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.