SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Towards a Security Architecture for Vehicular Ad Hoc Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
An Analysis of the Security Patterns Landscape
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Dryad: distributed data-parallel programs from sequential building blocks
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
MapReduce: simplified data processing on large clusters
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Applying patterns to build a lightweight middleware for embedded systems
Proceedings of the 2006 conference on Pattern languages of programs
On building secure SCADA systems using security patterns
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Search-as-a-service: Outsourced search over outsourced storage
ACM Transactions on the Web (TWEB)
IEEE Internet Computing
An enhanced security architecture for wireless sensor network
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Towards an Approach of Semantic Access Control for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Identity-Based Authentication for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Cloud Computing: A Statistics Aspect of Users
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Access Control of Cloud Service Based on UCON
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Hi-index | 0.00 |
Cloud computing has become a hot topic both in research and in industry, and when making decisions on deploying/adopting cloud computing related solutions, security has always been a major concern. This article summarizes security related issues in cloud computing and proposes five service deployment models to address these issues. The proposed models provide different security related features to address different requirements and scenarios and can serve as reference models for deployment.