emergence of cloud computing

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 639

This Paper With 16 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

MOCONF05_171

تاریخ نمایه سازی: 21 شهریور 1395

Abstract:

The recent emergence of cloud computing has drastically altered everyone’s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats

Keywords:

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • JK. Stanoevska- Slabeva, T. Wozniak Grid and Cloud Computing-A Business ...
  • National Institute of Standards and Technology, The NIST Definition of ...
  • _ Naone, Technology overview, conjuring clouds, MIT Technology Review, July- ...
  • billion at stake, Merrill Lynch, 2008. +100؟ [4]Merrill Lynch, The ...
  • [E]G. ReeseCloud Application Architectures Building Applications and Infrastructure in the ...
  • _ Rajkumar, C. Yeo, S. Venugopal, S. MalpaniCloud computing and ...
  • D. Artz, Y. GilA survey of trust in computer science ...
  • DoD Computer Security Center, Trusted computer system evaluation criteria, DoD ...
  • nd Intl. Conf. on Entrepreneu _ & Open Innovation ع ...
  • http ://dx.doi .org/10. 1016/i .future.2010 10.008 ...
  • l nternational T el e communicatio n Union, X-509 _ ...
  • infrastructure Computer C ommunicatio nS, 26 (16) (2003) ...
  • _ GiddensThe Consequences of M O dernityPolity Press, UK (1991] ...
  • _ Tserpes, F. Aisopos, D. Kyriazis, T. VarvarigouS ervice selection ...
  • R. Sh erman Distributed systems S ecurityCo mputers & Security, ...
  • [L21National Institute of Standards and Technology. Guide for mapping types ...
  • Cloud Security Alliance. Top threats to cloud computing, Cloud Security ...
  • _ Sh erman Distributed systems S ecurityCo mputers & Security, ...
  • D. P olemiTrusted third party services for health Care in ...
  • lS. Castell, Code of practice and management guidelines for trusted ...
  • Co mmission of the European Community. Green paper on the ...
  • VeriSign. Directories and public-key infrastructure (PKI), Directories and Public Key ...
  • S]A. Alshamsi, T. SaitoA technical comparison of IPSec and S ...
  • ZlInternet _ Shibboleth [Unline] 2007, Retrieved On 10/11/2010 from: http ...
  • Internet 2, FAQ on SAML and Shibboleth relationship, Shibboleth, Internet ...
  • UK Federation Information Centre, UK federation information centre, 2007. [3]C.P. ...
  • J31]B. Lang, I. Foster, F. Siebenlist, R. An anth akrishnan, ...
  • ]ames B.D. Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. ...
  • نمایش کامل مراجع