Quellen

Autoren: Philipp Viertel, André Kaleja

  1. http://www.datacenterknowledge.com/archives/2015/02/23/openstack-vs-cloudstack-the-platforms-and-the-cloud-apis/ (Abgerufen am 30.06.2017).
  2. https://opennebula.org/eucalyptus-cloudstack-openstack-and-opennebula-a-tale-of-two-cloud-models/ (Abgerufen am 30.06.2017).
  3. https://docs.openstack.org/admin-guide/ (Abgerufen am 30.06.2017).
  4. https://docs.openstack.org/ocata/install-guide-ubuntu/InstallGuide.pdf (Abgerufen am 30.06.2017).
  5. https://docs.openstack.org/security-guide/ (Abgerufen am 30.06.2017).
  6. http://docs.cloudstack.apache.org/en/latest/ (Abgerufen am 30.06.2017).
  7. http://docs.opennebula.org/5.2/index.html (Abgerufen am 30.06.2017).
  8. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf (Abgerufen am 02.07.2017)
  9. Handbook on Securing Cyber-Physical Critical Infrastructure, Foundations and Challenges Sajal Das, Krishna Kant, Nan Zhang ISBN: 978-0-12-415815-3
  10. Security, Privacy and Trust in Cloud Systems Surya Nepal, Mukaddim Pathan ISBN 978-3-642-38586-51010
  11. Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations Abould Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad ISBN 978-3-662-43616-5
  12. Zhou M, Zhang R, XieW, QianW, Zhou A (2010) Security and privacy in cloud computing: a survey. In: 6th international conference on semantics knowledge and grid (Ningbo, China,2010), pp 105–112
  13. ZissisD, LekkasD(2012) Addressing cloud computing security issues. FutureGener ComputSys 28(2012):583–592
  14. Xiao Z, XiaoY(2012) Security and privacy in cloud computing. IEEECommunSurvTutorials 2012:1–17
  15. Rong C, Nguyen ST, Jaatun MG (2012) A survey on security challenges in cloud computing Comput Elect Engi Beyond Lightning
  16. KhorshedMT,Ali ABMS,Wasimi SA(2012)Asurvey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gen Comput Sys 28(2012):833–851
  17. Gartner (2008) Assessing the security risks of cloud computing. http://cloud.ctrls.in/files/assessing-the-security-risks.pdf. White Paper
  18. ENISA (2009) Cloud computing: benefits, risks and recommendations for infomarion security. http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment . White Paper
  19. CSA (2010) Top threats to cloud computing. https://cloudsecurityalliance.org/research/topthreats/ . White paper
  20. Subashini S, Kavitha V (2011) A survey on security issues in service deliverymodels of cloud computing. J Netw Comput Appl 34(2011):1–11

results matching ""

    No results matching ""