Читать книгу Cyber Security and Network Security - Группа авторов - Страница 47

References

Оглавление

1. Khan, W.Z. et al., “Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things,” IEEE Consum. Electron. Mag., 8, 2, 35–38, 2019.

2. Khan, W.Z. et al., “Enabling Consumer Trust Upon Acceptance of IoT Technologies through Security and Privacy Model,” in: Advanced Multimedia and Ubiquitous Engineering, pp. 111–17, Springer, Jazan University, Jizan, Saudi Arabia, 2016.

3. Tripathi, A. and Mishra, A., “Cloud Computing Security Considerations”. IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2011.

4. Rahaman, M.A., Schaad, A., Rits, M., Towards secure SOAP message exchange in a SOA, in: SWS ‘06: Proceedings of the 3rd ACM workshop on Secure Web Services, New York, NY, USA, ACM Press, pp. 77–84, 2006.

5. Chomsiri, T., HTTPS Hacking Protection. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Niagara Falls, ON, Canada, May 21-23, 2007, vol. 1, pp. 590–594, 2007, doi:10.1109/ainaw.2007.200.

6. Sighom, J.R.N., Zhang, P., You, L., “Security Enhancement for Data Migration in the Cloud”. Multidisciplinary Digital Publishing Institute (MDPI), 9, 23, 1–13, 2017.

7. Kumari, S., Princy, Reema, Kumari, S., “Security in Cloud Computing using AES & DES,”. Int. J. Recent Innov. Trends Comput. Commun., 5, 4, 194–200, 2017.

8. Rochwerger, B. et al., “Reservoir—When One Cloud Is Not Enough,” Computer, 44, 44–51, Mar. 2011.

9. Keahey, K. et al., “Sky Computing,” IEEE Internet Comput., 13, 5, 43–51, 2009.

10. Ferrer, A.J. et al., “OPTIMIS: A Holistic Approach to Cloud Service Provisioning,” Future Gener. Comput. Syst., 28, 1, 66–77, 2012.

11. Petcu, D., “Portability and Interoperability between Clouds: Challenges and Case Study,” in: Lecture Notes in Computer Science, Institute e-Austria Timi¸ vol. 6994, pp. 62–74, Springer, Soara and West University of Timi, Soara, Romania, 2011.

12. Afzal, S. and Kavitha, G., Load balancing in cloud computing – A hierarchical taxonomical classification. J. Cloud Comput., 8, 22, 2019. https://doi. org/10.1186/s13677-019-0146-7.

13. White, J., Dougherty, B., Schmidt, D.C., Model-driven auto-scaling of green cloud computing infrastructure. Future Gener. Comput. Syst., 28, 2, 371–378, 2012.

14. Kumar, N.G., Polala, N., Kumari, D.A., New approach for securing cloud applications. 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, January 19-20, 2018, pp. 689–693, 2018, doi:10.1109/ICISC.2018.8398886.

15. Alabaichi, A., Ahmad, F., Mahmod, R., Security analysis of blowfish algorithm. 2013 Second International Conference on Informatics & Applications (ICIA), 2013, doi:10.1109/icoia.2013.6650222.

*Corresponding author: research.subhradip@gmail.com

Cyber Security and Network Security

Подняться наверх