/ Home /
References
- [AWStraining] https://www.aws.training/Details/eLearning?id=49720
- [Bernabe] Bernabe J. B., Perez G. M., Gomez A. F. S. Intercloud trust and security decision support system: an ontology-based approach //Journal of Grid Computing. – 2015. – Т. 13. – №. 3. – С. 425-456.
- [BDU] https://bdu.fstec.ru/
- [Casola] Casola V. et al. A security metric catalogue for cloud applications //Conference on Complex, Intelligent, and Software Intensive Systems. – Springer, Cham, 2017. – С. 854-863.
- [CSA10] Top Threats to Cloud Computing The Egregious 11 - 2020.
- [Dawoud] Dawoud W., Takouna I., Meinel C. Infrastructure as a service security: Challenges and solutions //2010 the 7th International Conference on Informatics and Systems (INFOS). – IEEE, 2010. – С. 1-8.
- [ENISA] Catteddu D., Hogben G. Cloud computing risk assessment //European Network and Information Security Agency (ENISA). – 2009. – С. 583-592.
- [Fernandez] Fernandez E. B., Monge R., Hashizume K. Building a security reference architecture for cloud systems //Requirements Engineering. – 2016. – Т. 21. – №. 2. – С. 225-249.
- [Gonzalez] Gonzalez N. et al. A quantitative analysis of current security concerns and solutions for cloud computing //Journal of Cloud Computing: Advances, Systems and Applications. – 2012. – Т. 1. – №. 1. – С. 11.
- [Hendre] Hendre A., Joshi K.P. A semantic approach to cloud security and compliance //2015 IEEE 8th International Conference on Cloud Computing. – IEEE, 2015. – С. 1081-1084.
- [Janulevičius] Janulevičius J. et al. Enterprise architecture modeling based on cloud computing security ontology as a reference model //2017 Open Conference of Electrical, Electronic and Information Sciences (eStream). – IEEE, 2017. – С. 1-6.
- [Menzel] Menzel M. et al. The service security lab: A model-driven platform to compose and explore service security in the cloud //2010 6th World Congress on Services. – IEEE, 2010. – С. 115-122.
- [Modi] Modi C. et al. A survey on security issues and solutions at different layers of Cloud computing //The Journal of Supercomputing. – 2013. – Т. 63. – №. 2. – С. 561-592.
- [OWASP10] https://owasp.org/www-project-top-ten/
- [OWASPCSS] OWASP Cheat Sheet Series https://cheatsheetseries.owasp.org/
- [Paladi] Paladi N., Gehrmann C., Michalas A. Providing user security guarantees in public infrastructure clouds //IEEE Transactions on Cloud Computing. – 2016. – Т. 5. – №. 3. – С. 405-419.
- [QUIRC] Saripalli P., Walters B. Quirc: A quantitative impact and risk assessment framework for cloud security //2010 IEEE 3rd International Conference on Cloud Computing. – Ieee, 2010. – С. 280-288.
- [Rath] Rath A. et al. Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure //Computers. – 2019. – Т. 8. – №. 2. – С. 34.
- [Schluga] Schluga O. et al. Operations Security Evaluation of IaaS-Cloud Backend for Industry 4.0 //CLOSER. – 2018. – С. 392-399.
- [SECCRIT] https://www.seccrit.eu
- [Sethi] Sethi C., Pradhan S. K. Trusted-Cloud: A Cloud Security Model for Infrastructure as a Service (IaaS) //International Journal of Advanced Research in Computer Science and Software Engineering. – 2016. – Т. 6. – №. 3.
- [Shu] Shu R., Gu X., Enck W. A study of security vulnerabilities on docker hub //Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. – 2017. – С. 269-280.
- [Soltys] Soltys M. Cybersecurity in the AWS Cloud //arXiv preprint arXiv:2003.12905. – 2020.
- [Takahashi] Takahashi T., Kadobayashi Y., Fujiwara H. Ontological approach toward cybersecurity in cloud computing //Proceedings of the 3rd international conference on Security of information and networks. – ACM, 2010. – С. 100-109.
- [Wonjiga] Wonjiga A. T., Rilling L., Morin C. Defining Security Monitoring SLAs in IaaS Clouds: the Example of a Network IDS : – Inria Rennes Bretagne Atlantique, 2019.
- [Yin] Yin X. et al. Research of security as a service for VMs in IaaS platform //IEEE Access. – 2018. – Т. 6. – С. 29158-29172.
/ Home /