The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2010 vol.12)
pp: 29-37
Rajarshi Chakraborty , University at Buffalo,
Srilakshmi Ramireddy , University at Buffalo,
T.S. Raghu , Arizona State University,
H.Raghav Rao , SUNY at Buffalo University at Buffalo, Buffalo Buffalo
<p>Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, and company size?</p>
Cloud computing, information assurance, cloud vendors, information technology, security and privacy, cybersecurity
Rajarshi Chakraborty, Srilakshmi Ramireddy, T.S. Raghu, H.Raghav Rao, "The Information Assurance Practices of Cloud Computing Vendors", IT Professional, vol.12, no. 4, pp. 29-37, July/August 2010, doi:10.1109/MITP.2010.44
1. P. Mell and T. Grance, "Effectively and Securely Using the Cloud Computing Paradigm," Nat'l Inst. of Standards and Technology (NIST), 2009; .
2. R.L. Grossman, "The Case for Cloud Computing," IT Professional, vol. 11, no. 2, 2009, pp. 23–27.
3. R. Westervelt, "Cloud Computing Security Group Releases Report Outlining Trouble Areas,", 22 Apr. 2009; article0,289142,sid14_gci1354553,00. html .
4. "F5 Study Shows Cloud Computing Gaining Critical Mass Among Large Enterprises," F5 Networks, Aug. 2009; .
5. L.M. Vaquero et al., "A Break in the Clouds: Towards a Cloud Definition," ACM Sigcomm Computer Comm. Rev., vol. 39, no. 1, 2009, pp. 50–55.
6. S. Bhardwaj, L. Jain, and S. Jain, "Cloud Computing: A Study of Infrastructure as a Service (IaaS)," Int'l J. Eng and Information Technology, vol. 2, no. 1, 2010, pp. 60–63.
7. K.S. Swaminathan, "Computing in the Clouds," Outlook J., May 2008; 0OutlookPDF_Edge_01.pdf .
8. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 2009.
9. R. Buyya et al., "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility," Future Generation Computer Systems, vol. 25, no. 6, 2009, pp. 599–616.
10. E. Chabrow, "Rules Make Adoption of Cloud Computing Challenge for Agencies,", Apr. 2009; www.govinfosecurity.comarticles.php?art_id=1348 .
11. A.B. Howard, "FISMA Compliance for Federal Cloud Computing on the Horizon in 2010,", 18 Dec. 2009; article0,289142,sid195_gci1377298,00.html .
12. J.N. Hoover, "Microsoft Seeks New Legal Framework for Cloud," Information Week,22 Jan. 2010; .
13. C. Wang, "Forrester: A Close Look At Cloud Computing Security Issues," CSO,1 July 2009; .
14. J. Staten et al., "Is Cloud Computing Ready For The Enterprise?" Forrester Research, Mar. 2008; q/id/44229/ t2.
15. D. Hakala, "The Top 10 New Cloud Computing Vendors," Focus Magazine,30 Apr. 2009; top-10-new-cloud-computing-vendors.
16. L. McLaughlin, "11 Cloud Computing Vendors to Watch," CIO,11 Mar. 2008; .
17. D.J. Kim, N. Sivasailam, and H.R. Rao, "Information Assurance in B2C Websites," Electronic Markets, vol. 14, no. 4, 2004.
18. N. Sivasailam, D.J. Kim, and H.R. Rao, "What Companies Are(n't) Doing about Web Site Assurance," IT Professional, vol. 4, no. 3, 2002, pp. 33–40.
19. S.L. Jarvenpaa, N. Tractinsky, and M. Vitale, "Consumer Trust in an Internet Store," Information Technology and Management, vol. 1, nos 1–2, 2000, pp. 45–71.
20. R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An Integrative Model of Organizational Trust," Academy of Management Rev., vol. 20, no. 3, 1995, pp. 709–734.
21. R. Chakraborty et al., "A Comparative Study of Cloud Computing Vendors and Their Information Assurance Practices," Proc. 3rd Int'l Conf. Virtual Computing Initiative (ICVCI 09), IBM Univ. Days, 2009.
22. P. Kumaraguru and L. Cranor, "Privacy in India: Attitudes and Awareness," Privacy Enhancing Technologies, LNCS 3856, Springer, 2006, pp. 243–258.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool