The Community for Technology Leaders
RSS Icon
Issue No.07 - July (2012 vol.45)
pp: 73-78
Jianyong Chen , Shenzhen University, China
Yang Wang , Shenzhen University, China
Xiaomin Wang , Shenzhen University, China
An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.
cloud computing, security architecture, on-demand services
Jianyong Chen, Yang Wang, Xiaomin Wang, "On-Demand Security Architecture for Cloud Computing", Computer, vol.45, no. 7, pp. 73-78, July 2012, doi:10.1109/MC.2012.120
1. H. Takabi, J.B.D. Joshi, and G.J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” Computer, June 2010, pp. 24-31.
2. S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” J. Network and Computer Applications, vol. 34, no. 1, 2011, pp. 1-11.
3. C. Wang et al., “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, 2010, pp. 19-24.
4. Q. Wang et al., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, 2011, pp. 847-859.
5. L.K. Hu, S. Yi, and X.Y. Jia, “A Semantics-Based Approach for Cross Domain Access Control,” J. Internet Technology, vol. 11, no. 2, 2010, pp. 279-288.
6. G. Pallis, “Cloud Computing: The New Frontier of Internet Computing,” IEEE Internet Computing, vol. 14, no. 5, 2010, pp. 70-73.
7. R.P. Lua and K.C. Yow, “Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network,” IEEE Network, vol. 25, no. 4, 2011, pp. 28-33.
8. V.H. Pham and M. Dacier, “Honeypot Trace Forensics: The Observation Viewpoint Matters,” Future Generation Computer System—Int'l J. Grid Computing and E-science, vol. 27, no. 5, 2011, pp. 539-546.
75 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool