|
AltheideC., & CarveyH. (2011). Digital Forensics with Open Source Tools. USA: Elsevier Inc. Chang, R. (2012). Personal data protection act goes into effect, though certain clauses exempted. Retrieved from Taipei Times: http://www.taipeitimes.com/News/taiwan/archives/2012/10/ CSA. (2011). Security guidance for critical areas of focus in cloud computing v3.0. USA: Cloud Security Alliance. Retrieved from CSA: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf CSA. (2013). Top Threats Working Group The Notorious Nine Cloud Computing Top Threats in 2013. USA: Cloud Security Alliance (CSA). DoD, DoE, NRC, & CIA. (1995). DoD 5220.22-m, National Industrial Security Program Operating Manual. Washington: U.S. Government Printing Office. Eaton, C., DeRoos, D., Deutsch, T., Lapis, G., & Zikopoulos, P. (2012). Understanding Big Data. USA: IBM. GutmannP. (1996). Secure deletion of data from magnetic and solid-state memory. Paper presented at the Sixth USENIX conference on Security Symposium Proceedings, California. 6th conference on USENIX Security Symposium. 6, Page 8 - 8. CA: Creative Commons. Hintemann& Faßnacht, C.R.,. (2008). Leitfaden zum Sicheren Datenlöschen Vers. 2.0. Bundesverband Informationswirtschaft. Albrechtstraße: BITKOM. HonanM. (2012). How Apple and Amazon Security Flaws Led to My Epic Hacking. Wired. KisselScholl, M., Skolochenko, S., & Li, X.R.,. (2006). Guidelines for media sanitization. National Institute of Standards and Technology . Gaithersburg, MD: U.S. GOVERNMENT PRINTING OFFICE . Kortchinsky, K. (2009). Cloudburst: A VMware Guest to Host Escape Story. Black Hat. Lombardi& Di Pietro, R.F.,. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 4(34), Page 1113-1122. Manzoor& Nefti, S.U.,. (2009). An agent based system for activity monitoring on network – ABSAMN. Expert Systems with Applications, 36, Page 10987–10994. Dayton, OH. MarinescuDan C. (24 May 2013). Cloud Computing : Theory and Practice. USA: Elsevier Inc. McAfee. (2012). Database Security in Virtualization and Cloud Computing Environments. CA: McAfee, Inc. Retrieved from McAfee: http://www.mcafee.com/tw/ McAfee. (2011). Database Security in Virtualization and Cloud Computing Environments. McAfee. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Retrieved from NIST: http://www.nist.gov NicolaeB., & CappelloF. (2013). BlobCR: Virtual disk based checkpoint-restart for HPC applications on IaaS clouds. Journal of Parallel and Distributed Computing, 5(73), Page 698–711. RistenpartTromer, E., Shacham, H., & Savage, S.T.,. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM conference on Computer and communications security. SchneierB. (2004). Secrets & Lies : Digital Security in a Networked World. USA: John Wiley & Sons Inc. Shao, J., Wei, H., Wang, Q., & Mei, H. (2010). A Runtime Model Based Monitoring Approach for Cloud. IEEE International Conference on Cloud Computing, (pp. 313-320). Stallings, W. (2011). Cryptography and Network Security, Principles and Practices (Fifth ed.). Prentice Hall. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), pp. 1-11. VMware. (2011). VMware vSphere 5 Competitive Reviewer's Guide. Retrieved from VMware: www.vmware.com WangTao, J., Ranjan, R., Marten, H., Streit, A., Chen, J., & Chen, D.L.,. (2012). G-Hadoop: MapReduce across distributed data centers for data-intensive computing. Future Generation Computer Systems, 29(3). White, T. (2012). Hadoop: The Definitive Guide (Third ed.). USA: O'Reilly. YangMoore, P., & Chong, S.K.X.,. (2009). Intelligent products: From lifecycle data acquisition to enabling product-related services. Computers in Industry, 60(3), Page 184-194. Zhou, M., Mu, Y., Susilo, W., Yan, J., & Dong, L. (2012). Privacy enhanced data outsourcing in the cloud. JournalofNetworkandComputerApplications, 35(4), pp. 1367-1373. Zhu, Y., Hu, H., Ahn, G.-J., & Yau, S. (2012). Efficient audit service outsourcing for data integrity in clouds. The Journal of Systems and Software, 85(5), pp. 1083-1095. Zissis& Lekkas, D.D.,. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), Page 583-592.
|