Traditional security risk assessment methods in cloud computing environment: usability analysis
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used. However, due to the new structure of...
Main Authors: | Albakri, Sameer Hasan (Author), Shanmugam, Bharanidharan (Author), Samy, Ganthan Narayana (Author), Idris, Norbik Bashah (Author), Ahmed, Azuan (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press,
2015.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Standards and tools in production and maintenance of system documentation
by: Sulaiman, Shahida, et al.
Published: (2005) -
Secure cloud storage model to preserve confidentiality and integrity
by: Brohi, Sarfraz Nawaz
Published: (2015) -
State of the art survey on security issue in cloud computing architectures, approaches and methods
by: S. Aldeen, Yousra Abdul Alsahib, et al.
Published: (2015) -
A model to enhance security of live virtual machine migration in cloud computing
by: Hosseini, Kambiz Mohammad
Published: (2013) -
Client to client attacks protection in cloud computing by a secure virtualization model
by: Abadi, Ahad Akbar
Published: (2013)