Добавлен: 16.02.2024
Просмотров: 53
Скачиваний: 0
-
Ramgovind S The Management of Security in Cloud Computing // Information Security for South Africa. Sandton, Johannesburg, South Africa: IEEE. 2010 ↑
-
Cyber Security Breaches Survey 2018: Statistical Release // Department for Digital, Culture, Media and Sport. 2018 ↑
-
Закон Российской Федерации "ФЕДЕРАЛЬНЫЙ ЗАКОН ОБ ИНФОРМАЦИИ, ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЯХ И О ЗАЩИТЕ ИНФОРМАЦИИ" от 8.07.2006 № N 149-ФЗ ↑
-
ISO/IEC 27001 "Информационные технологии — Методы обеспечения безопасности — Системы управления информационной безопасностью — Требования". Введ. 2005 ↑
-
ГОСТ Р ИСО/МЭК 27000-2012 Информационная технология (ИТ). Методы и средства обеспечения безопасности. Системы менеджмента информационной безопасности. Общий обзор и терминология. Введ. 2013-12-01 ↑
-
ISO 27002 “Информационные технологии - Методы защиты – Свод рекомендуемых правил для управления информационной безопасностью”. Введ. 2013-10-01. ↑
-
Disterer G. ISO/IEC 27000, 27001 and 27002 for Information Security Management // Journal of Information Security. - 2013. ↑
-
Cyber Security Breaches Survey 2018: Statistical Release // Department for Digital, Culture, Media and Sport // 2018 ↑
-
ГОСТ Р ИСО/МЭК 27002-2012 Информационная технология (ИТ). Методы и средства обеспечения безопасности. Свод норм и правил менеджмента информационной безопасности. Введ. 2014-01-01. ↑
-
Родичев Ю.А. Нормативная база и стандарты в области информационной безопасности. Учебное пособие. - СПб.: Питер, 2017. ↑
-
Open Cloud Manifesto - A call to action for the worldwide cloud community. 2009 ↑
-
Peter Mell, Timothy Grance The NIST Definition of Cloud Computing // National Institute of Standards and Technology. - 2011. ↑
-
Peter Mell Effectively and Securely Using the Cloud Computing Paradigm // NIST, Information Technology Laboratory. - 2009 ↑
-
Ferraiolo D. Cloud Computing [Электронный ресурс] // NIST - URL: https://csrc.nist.gov/projects/cloud-computing (дата обращения: 15.04.2019) ↑
-
The Notorious Nine Cloud Computing Top Threats in 2013 // Cloud Security Alliance, 2013. ↑
-
Cloud Computing: Benefits, risks and recommendations for information security // European Network and Information Security Agency (ENISA), 2014 ↑
-
Wayne Jansen, Timothy Grance Guidelines on Security and Privacy in Public Cloud Computing // NIST, 2014 ↑
-
Мультитенантная архитектура для SaaS приложений // Habr URL: https://habr.com/ru/company/microsoft/blog/145027/ (дата обращения: 08.05.2019). ↑
-
Meiko Jensen, Nils Gruschka, Jörg Schwenk, Luigi Lo Iacono On Technical Security Issues in Cloud Computing // IEEE International Conference on Cloud Computing. 2015. ↑
-
J.C. Roberts II, W. Al-Hamdani. Who Can You Trust in the Cloud? A Review of Security Issues Within Cloud Computing // Information Security Curriculum Development Conference. 2016 ↑
-
K. Zunnurhain and S. Vrbsky. Security Attacks and Solutions in Clouds // 3rd International Conference on Cloud Computing. 2016 ↑
-
I. M. Khalil, A. Khreishah, and M. Azeem. Cloud Computing Security: A Survey // Computers. 2014 ↑
-
M. Jensen, N. Gruschka, and Ralph Herkenh¨oner. A Survey of Attacks on Web Services // Computer Science - R&D. 2015 ↑
-
B. Grobauer, T. Walloschek, and E. Stocker. Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy. 2017 ↑
-
R. Bhadauria and S. Sanyal. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. 2015. ↑
-
A. Liu, Y. Yuan, and A. Stavrou. QLProb: A Proxybased Architecture towards Preventing SQL Injection Attacks. // SAC. 2015 ↑
-
F. Sabahi. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. // Int. Journal of Machine Learning and Computing. 2017 ↑
-
F. Lombardi and R. D. Pietro. Secure Virtualization for Cloud Computing. // Journal of Network and Computer Applications. 2016. ↑
-
M. Pearce, S. Zeadally, and R. Hunt. Virtualization: Issues, security threats, and solutions // ACM Comput. Surv. 2017. ↑
-
M.A. Morsy, J. Grundy, and I. Muller. An Analysis of the Cloud Computing Security Problem. // APSEC Cloud Workshop. 2015 ↑
-
S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen. Virtualization Security for Cloud Computing Services. // Int. Conf on Cloud and Service Computing. 2015. ↑
-
C. Dabrowski and K. Mills. VM Leakage and Orphan Control in Open-Source Clouds. // 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 2015. ↑
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. // ACM Conference on Computer and Communications Security. 2009. ↑
-
Y. Zhang, M. Ion, G. Russello, and B. Crispo. Cross-VM Side Channels and their Use to Extract Private Keys.
// ACM CCCS. 2012. ↑
-
R. Schwarzkopf, M. Schmidt, N. Fallenbeck, and B. Freisleben. Multi-layered Virtual Machines for Security Updates in Grid Environments. // EUROMICRO-SEAA. 2014. ↑
-
F. Sabahi. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. // Int. Journal of Machine Learning and Computing. 2017. ↑
-
M. Le and Y. Tamir. ReHype: Enabling VM Survival Across Hypervisor Failures. // VEE. 2016. ↑
-
A.S. Ibrahim, J. Hamlyn-Harris, and J. Grundy. Emerging Security Challenges of Cloud Virtual Infrastructure. // APSEC Cloud Workshop. 2016 ↑
-
W.A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. // 44th Hawaii International Conference on Systems Science. 2015. ↑
-
D. Reimer, A. Thomas, G. Ammons, T. W. Mummert, B. Alpern, and Vasanth Bala. Opening Black Boxes: Using Semantic Information to Combat Virtual Machine Image Sprawl. // VEE. 2014. ↑
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing Security of Virtual Machine Images in a Cloud Environment. // CCSW. 20016. ↑
-
W. Jansen and T. Grance. Guidelines on Security and Privacy in Public Cloud Computing Special Publication ↑
-
Ju J, Wang Y, Fu J, Wu J, Lin Z: Research on Key Technology in SaaS // In International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China. 2015 ↑
-
Rittinghouse JW, Ransome JF: Security in the Cloud. In Cloud Computing. Implementation, Management, and Security // CRC Press; 2016. ↑
-
Owens D: Securing elasticity in the Cloud // Commun ACM 2017 ↑
-
Zhang Y, Liu S, Meng X: Towards high level SaaS maturity model: methods and case study // In Services Computing conference. IEEE Asia-Pacific: APSCC; 2016 ↑
-
Mather T, Kumaraswamy S, Latif S: Cloud Security and Privacy // O’Reilly Media, Inc.; 2017 ↑
-
Morsy MA, Grundy J, Müller I: An analysis of the Cloud Computing Security problem. // APSEC 2016 Cloud Workshop. 2016 ↑