Database Reference
In-Depth Information
6. Mark A. Beyer and Douglas Laney. The importance of “big data”: A Definition.
Gartner, Available online at http://www.gartner.com/DisplayDocument?ref=clientFriendly
Url&id=2057415, 2012.
7. Sara Bouchenak, Gregory Chockler, Hana Chockler, Gabriela Gheorghe, Nuno Santos,
and Alexander Shraer. Verifying cloud services: Present and future. Operating Systems
Review , 48, 2013.
8. Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. How
to tell if your cloud files are vulnerable to drive crashes. In Proceedings of the 18th ACM
Conference on Computer and Communications Security , CCS'11, pages 501-514, New
York, 2011. ACM.
9. Jon Brodkin. Seven cloud-computing security risks. Report by Gartner, 2008.
10. Yanpei Chen, Vern Paxson, and Randy H. Katz. What's new about cloud computing
security. University of California, Berkeley Report No. UCB/EECS-2010-5 January ,
20(2010):2010-5, 2010.
11. Clavister. Security in the cloud. http://www.clavister.com/documents/resources/white
papers/clavister-whp-security-in-the-cloud-gb.pdf. [Accessed July 5, 2012.]
12. Juan Du, Wei Wei, Xiaohui Gu, and Ting Yu. Runtest: Assuring integrity of dataflow pro-
cessing in cloud computing infrastructures. In Proceedings of the 5th ACM Symposium
on Information, Computer and Communications Security , ASIACCS'10, pages 293-304,
New York, 2010. ACM.
13. GAE. Google app engine. http://appengine.google.com. [Accessed July 5, 2012.]
14. Gartner. Worldwide cloud services market to surpass $68 billion in 2010. http://www.
gartner.com/it/page.jsp?id=1389313, 2010. [Accessed July 5, 2012.]
15. Google. Google calendar. https://www.google.com/calendar/. [Accessed July 5, 2012.]
16. Google. Google drive. https://drive.google.com/start#home. [Accessed July 5, 2012.]
17. Bernd Grobauer and Thomas Schreck. Towards incident handling in the cloud:
Challenges and approaches. In Proceedings of the 2010 ACM Workshop on Cloud
Computing Security Workshop , CCSW'10, pages 77-86, New York, 2010. ACM.
18. Joseph Idziorek, Mark Tannian, and Doug Jacobson. Detecting fraudulent use of cloud
resources. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security
Workshop , CCSW'11, pages 61-72, New York, 2011. ACM.
19. INPUT. Evolution of the cloud: The future of cloud computing in government. http://
iq.govwin.com/corp/library/detail.cfm?ItemID=8448&cmp=OTC-cloudcomputing
ma042009, 2009. [Accessed July 5, 2012.]
20. Ari Juels and Burton S. Kaliski. Pors: Proofs of retrievability for large files. In
Proceedings of the 14th ACM Conference on Computer and Communications Security ,
pages 584-597. ACM, 2007.
21. Ali Khajeh-Hosseini, David Greenwood, and Ian Sommerville. Cloud migration: A case
study of migrating an enterprise it system to iaas. In Proceedings of the 3rd International
Conference on Cloud Computing (CLOUD) , pages 450-457. IEEE, 2010.
22. F. John Krautheim. Private virtual infrastructure for cloud computing. In Proceedings
of the 2009 Conference on Hot Topics in Cloud Computing , pages 1-5. USENIX
Association, 2009.
23. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin (Sherman) Shen. Secure
provenance: The essential of bread and butter of data forensics in cloud computing. In
Proceedings of the 5th ACM Symposium on Information, Computer and Communications
Security , ASIACCS'10, pages 282-292, New York, 2010. ACM.
24. Market Research Media. Global cloud computing market forecast 2015-2020. http://
www.marketresearchmedia.com/2012/01/08/global-cloud-computing-market/.
[Accessed July 5, 2012.]
25. Peter Mell and Timothy Grance. Draft NIST working definition of cloud computing-
v15. 21 Aug 2009, 2009.
Search WWH ::




Custom Search