Establishment of the security risks taxonomy in cloud computing environment

被引:0
|
作者
Grubor, Gojko [1 ]
Njeguš, Angelina [3 ]
Regodić, Dušan [2 ]
机构
[1] Singidunum University, Belgrade, Serbia
[2] Sinergija University, Bijeljina, Bosnia and Herzegovina
[3] Department of Informatics and Computing, Singidunum University, Belgrade, Serbia
来源
Metalurgia International | 2013年 / 18卷 / 12期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Taxonomies
引用
收藏
页码:75 / 79
相关论文
共 50 条
  • [1] Model of assessment of risks of information security in the environment of cloud computing
    Djuraev, R. X.
    Umirzakov, B. M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,
  • [2] The Security Risks of Cloud Computing
    Choi, Myeonggil
    [J]. 2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 330 - 330
  • [3] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    [J]. VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [4] Security Risks and their Management in Cloud Computing
    Khan, Afnan Ullah
    Oriol, Manuel
    Kiran, Mariam
    Jiang, Ming
    Djemame, Karim
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [5] The Establishment of Security Strategies for Introducing Cloud Computing
    Yoon, Young Bae
    Oh, Junseok
    Lee, Bong Gyou
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 860 - 877
  • [6] Big-data in cloud computing: a taxonomy of risks
    Miller, Holmes E.
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2013, 18 (01):
  • [7] Evaluating Risks in Cloud Computing: Security Perspective
    Dhingra, Amit Kumar
    Rai, Dinesh
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 533 - 536
  • [8] Cloud Computing: Potential Risks and Security Approaches
    Ben Rebah, Hassen
    Ben Sta, Hatem
    [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 69 - 78
  • [9] Mitigation for cloud computing security risks and governance
    Jabez, J.
    Narmadha, R.
    Porkodi, S.
    Devi, L.
    [J]. International Journal of Cloud Computing, 2022, 11 (5-6) : 560 - 567
  • [10] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776