Tài liệu tham khảo |
Loại |
Chi tiết |
1. James Michael Stewart and Mike Chapple and Darril Gibson (2015), “Certified Information Systems Security Professional Study Guide Seventh Edition”, John Wiley& Sons, Inc |
Sách, tạp chí |
Tiêu đề: |
Certified Information Systems Security Professional Study Guide Seventh Edition |
Tác giả: |
James Michael Stewart, Mike Chapple, Darril Gibson |
Nhà XB: |
John Wiley & Sons, Inc |
Năm: |
2015 |
|
2. Dave Shackleford (2011)“Virtualization Security”, John Wiley & Sons, Inc |
Sách, tạp chí |
Tiêu đề: |
Virtualization Security |
Tác giả: |
Dave Shackleford |
Nhà XB: |
John Wiley & Sons, Inc |
Năm: |
2011 |
|
3. Peter Mell and Timothy Grance (2011), “The NIST Definition of Cloud Computing”, Special Publication 800-145 |
Sách, tạp chí |
Tiêu đề: |
The NIST Definition of Cloud Computing” |
Tác giả: |
Peter Mell and Timothy Grance |
Năm: |
2011 |
|
4. Ronald L. Krutz and Russell, (2011)“A Comprehensive Guide to Secure Cloud Computing”, John Wiley & Sons, Inc |
Sách, tạp chí |
Tiêu đề: |
A Comprehensive Guide to Secure Cloud Computing |
Tác giả: |
Ronald L. Krutz, Russell |
Nhà XB: |
John Wiley & Sons, Inc |
Năm: |
2011 |
|
5. Wayne Jansen and Timothy Grance (December 2011) ,“Guidelines on Security and Privacy in Public Cloud Computing” |
Sách, tạp chí |
Tiêu đề: |
Guidelines on Security and Privacy in Public Cloud Computing |
|
6. Lee Newcombe (July 2012), “Securing Cloud Services”, IT Governance Publishing |
Sách, tạp chí |
Tiêu đề: |
Securing Cloud Services |
Tác giả: |
Lee Newcombe |
Nhà XB: |
IT Governance Publishing |
Năm: |
2012 |
|
9. Tebaa, M.; El Hajji, S.; El Ghazi, A., "Homomorphic encryption method applied to Cloud Computing," in Network Security and Systems (JNS2), 2012 National Days of , vol., no., pp.86-89, 20-21 April 2012 |
Sách, tạp chí |
Tiêu đề: |
Homomorphic encryption method applied to Cloud Computing |
Tác giả: |
M. Tebaa, S. El Hajji, A. El Ghazi |
Nhà XB: |
Network Security and Systems (JNS2) |
Năm: |
2012 |
|
7. Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing (2009),”Data Security Model for Cloud Computing”, ISBN 978-952-5726-06-0 |
Khác |
|
8. Craig Gentry, Fully Homomorphic Encryption Using Ideal Lattices, STOC ’09: Proceedings of the 41st annual ACM symposium on Theory of computing, DOI:10.1145/1536414.1536440 September 2009 |
Khác |
|
10. IDC Custom Solutions (Mar 2016), Server Security: Virtualization & Cloud Changes Everything |
Khác |
|