لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
A. Abbas, S.U. Khan, A review on the state-of-the-art privacy ...
A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud ...
Syst. (2014), http ://dx.doi.org/ 1 0. 1 0 1 6/j.future.20 ...
R. Agrawal, Legal issues in cloud computing, in: IndicThreads .com, ...
K. Alhamazani, R. Ranjan, _ Mitra, F. Rabhi, S.U. Khan, ...
Dimensions, Design Issues, and S tate -of-the-Art, arXiv preprint arXiv:13 ...
M. Ali, R. Dhamotharan, E. Khan, S.U. Khan, A.V. Vasilakos, ...
Annual ACM Symposium on Applied Computing, 2012, pp. 1427-1434. ...
R. Bhadauria, R. Borgohain, A. Biswas, S. Sanyal, Secure Authenti ...
K. Bilal, S.U.R. Malik, S.U. Khan, A.Y. Zomaya, Trends and ...
R. Bobba, H. Khurana, M. Prabhakaran, Attribute-sets: a practically motivated ...
ESORICS, Springer, Berlin, Heidelberg, 2009, pp. 587-604. ...
S. Carlin, K. Curran, Cloud computing security, Int. J. Ambient ...
R. C handramouli, M. Iorga, S. Chokhani, Cryptographic key management ...
Springer, New York, 2014, pp. 1-30. doi: 1 0. 1 ...
S. Chaisiri, B. Lee, D. Niyato, Optimization of resource provisioning ...
D. Chen, H. Zhao, Data security and privacy protection issues ...
Engineering (ICCSEE, IEEE), vol. 1, 2012, pp. 647-651. ...
J. Che, Y. Duan, T. Zhang, J. Fan, Study on ...
S.M.S. Chow, Y. He, L.C.K. Hui, S.M. Yiu, Spicesimple privacy ...
Network Security, Springer, Berlin, Heidelberg, 2012, pp. 526-543. ...
A. Corradi, M. Fanelli, L. Foschini, VM consolidation: a real ...
Cloud security alliance, security guidelines for critical areas of focus ...
Q. Duan, Y. Yan, A.V. Vasilakos, A survey on service ...
A. Eghtesadi, Y. Jarraya, M. Debbabi, M. Pourzandi, Preservation of ...
Engineering (IC2E), 2014, pp. 17-26. ...
D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, ...
N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a ...
M. Ficco, M. Rak, Stealthy denial of service strategy _ ...
M.I. Gofman, R. Luo, P. Yang, K. Gopalan, Sparc: a ...
Annual ACM Workshop on Privacy in the Electronic Society, 2011, ...
J. Groth, Amit Sahai, Efficient non-interactive proof systems for bilinear ...
B. Guan, J. Wu, Y. Wang, S.U. Khan, CIVSched: a ...
K. Hashizume, D.G. Rosado, E. F ernnd ez-Medina, E.B. Fernandez, ...
B. Hay, K. Nance, M. Bishop, Storm clouds rising: security ...
T.D. Hoang, C. Lee, D. Niyato, P. Wang, A survey ...
M. Ali et al. / Information Sciences 305 (2015) 357-383 ...
Hewlett Packard, 5 cloud security concerns you must address, Business ...
Y. Hu, T. Li, P. Yang, K. Gopalan, An application- ...
W.A. Jansen, Cloud hooks: Security and privacy issues in cloud ...
P. Juncheng, D. Huimin, S. Yinghui, L. Dong, Potential attacks ...
Computer Science and its Applications, Springer, Berlin, Heidelberg, 2014, pp. ...
T. Jung, X. Li, Z. Wan, M. Wan, Control cloud ...
A.N. Khan, M.L.M. Kiah, M. Ali, S.A. Madani, S. Shamshirband, ...
environment, J. Supercomput. 70 (2) (2014) 946-976. ...
A.N. Khan, M.L.M. Kiah, S.A. Madani, M. Ali, S. Shamshirband, ...
A.N. Khan, M.L.M. Kiah, S.A. Madani, M. Ali, Enhanced dynamic ...
computing, J. Supercomput. 66 (3) (2013) 1687-1706. ...
A.N. Khan, M.L.M. Kiah, S.U. Khan, S.A. Madani, Towards secure ...
A.R. Khan, M. Othman, S.A. Madani, S.U. Khan, A survey ...
R. Latif, H. Abbas, S. Assar, Q. Ali, Cloud computing ...
C. Li, A. Raghunathan, N.K. Jha, A trusted virtual machine ...
H.Y. Lin, W.G. Tzeng, A secure erasure code-based cloud storage ...
B. Liu, E. Blasch, Y. Chen, A.J. Aved, A. Hadiks, ...
B. Liu, J. Bi, A. Vasilakos, Towards incentivizing anti-spoofing deployment, ...
F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, ...
Q. Liu, G. Wang, J. Wu, Time-based proxy re-encryption scheme ...
W. Lloyd, S. Pallickara, O. David, J. Lyon, M. Arabi, ...
Service clouds: towards performance modeling, Future Gener. Comput. Syst. 29 ...
S. Marston, Z. Li, S. B andyopadhyay, J. Zhang, A. ...
P. Mell, T. Grance, The NIST definition of cloud computing ...
M. Menzel, R. Ranjan, L. Wang, S.U. Khan, J. Chen, ...
clusters to public clouds, IEEE Trans. Comput. (2014), http ://dx.doi.org/ ...
C. Modi, D. Patel, B. Borisaniya, A. Patel, M. Rajarajan, ...
S.H. Na, E.N. Huh, A broker-based cooperative security-SLA evaluation methodology ...
Y. Neng-Hai, Z. Hao, J. Xu, W. Zhang, C. Zhang, ...
Open Web Application Security Project Top 10-2013, The ten most ...
Top1 0]OWASP> Top 10 for 2013 (accessed 08.04.14). ...
R.D. Pietro, F. Lombardi, M. Signorini, CloRExPa: cloud resilience via ...
A. Prasad, S. Rao, A mechanism design approach to resource ...
K.S. Rao, P.S. Thilagam, Heuristics based server consolidation with residual ...
Syst. (2014), http :/x.doi.org/1 0. 1 0 1 6/j.future.20 14.09.009. ...
M.R. Rahimi, J. Ren, C.H. Liu, A.V. Vasilakos, N. V ...
M.R. Rahimi, N. V e nka tasubramani an, S. Mehrotra, ...
in: Proceedings of the 2012 IEEE/ACM Fifth International Conference on ...
K. Ren, C. Wang, Q. Wang, Security challenges for the ...
_ Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, ...
Proceedings of the 16th ACM Conference on Computer and C ...
C. Rong, S.T. Nguyen, M.G. Jaatun, Beyond lightning: a survey ...
M.D. Ryan, Cloud computing security: the scientific challenge, and a ...
M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and ...
A. Sahai, B. Waters, Fuzzy identity-6ased encryption, in: Advances in ...
K. Salah, J.M.A. Calero, S. Zeadally, S. Al-Mulla, M. Alzaabi, ...
K. Sankar, S. Kannan, P. Jennifer, On-demand security architecture for ...
Z. Sanaei, S. Abolfazli, A. Gani, R. Buyya, Heterogeneity in ...
L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, ...
M.H. Song, Analysis of risks for virtualization technology, in: Applied ...
M. Sookhak, H. Talebian, E. Ahmed, A. Gani, M.K. Khan, ...
A. Srivastava, H. Raj, J. Gi_n, P. England, Trusted VM ...
S. Subashini, V. Kavitha, A survey on security issues in ...
Z. Tari, Security and privacy in cloud computing, IEEE Cloud ...
V. Varadharajan, U. Tupakula, Counteracting security attacks in virtual machines ...
V. Vladimir, Cloud adoption issues: interoperability and security, in: Cloud ...
B. Waters, Efficient identity-based encryption without random oracles, in: Advances ...
Y. Xia, Y. Liu, H. Chen, B. Zang, Defending against ...
Z. Xiao, Y. Xiao, Security and privacy in cloud computing, ...
Z. Yan, P. Zhang, A.V. Vasilakos, A survey on trust ...
S. Yazji, P. Scheuermann, R.P. Dick, G. Trajcevski, R. Jin, ...
Comput. 18 (1) (2014) 143-162. ...
Y.A. Younis, M. Merabti, K. Kifayat, Secure cloud computing for ...
United Kingdom, Tech. Rep. ISBN: 978-1 -902560-27-4, 2013. ...
H. Yu, N. Powell, D. Stembridge, X. Yuan, Cloud computing ...
M. Zalewski, Browser security handbook, Google Code, 2010. <https ://code ...
F. Zhang, H. Chen, S ec urity-preserving live migration of ...
نمایش کامل مراجع