2013 IEEE Sixth International Conference on Cloud Computing 2013
DOI: 10.1109/cloud.2013.125
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Cloud Computing Models: Domains and Proposals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Among the other systematic mapping studies found, [17] aimed to examine the state-ofthe-art in cloud computing and to identify the gaps, issues and challenges in producing obtainable evidence in both its development and use. In addition, [18] described the metrics regarding the publication of security threats in cloud computing, while [19] presented accounting models for cloud computing, focusing on price schemes [19].…”
Section: Related Surveysmentioning
confidence: 99%
“…Among the other systematic mapping studies found, [17] aimed to examine the state-ofthe-art in cloud computing and to identify the gaps, issues and challenges in producing obtainable evidence in both its development and use. In addition, [18] described the metrics regarding the publication of security threats in cloud computing, while [19] presented accounting models for cloud computing, focusing on price schemes [19].…”
Section: Related Surveysmentioning
confidence: 99%
“…With the popularity of mobile and ubiquitous uses of computing infrastructures, such as the cloud [2], both technical and social contexts in which software applications operate are increasingly dynamic. By context we mean the properties of the environment in which a cloud application operates that have an effect in its behavior.…”
Section: Adaptive Information Security In the Cloudmentioning
confidence: 99%