Cloud security

Mueller, Peter, Huang, Chin-Tser, Yu, Shui, Tari, Zahir and Lin, Ying-Dar 2016, Cloud security, IEEE cloud computing, vol. 3, no. 5, Special issue: cloud security, pp. 22-24, doi: 10.1109/MCC.2016.117.

Attached Files
Name Description MIMEType Size Downloads

Title Cloud security
Author(s) Mueller, Peter
Huang, Chin-Tser
Yu, ShuiORCID iD for Yu, Shui
Tari, Zahir
Lin, Ying-Dar
Journal name IEEE cloud computing
Volume number 3
Issue number 5
Season Special issue: cloud security
Start page 22
End page 24
Total pages 3
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2016-09
ISSN 2325-6095
Keyword(s) cloud platforms
cloud computing
cloud infrastructure
Summary Cloud computing systems and services have become major targets for cyberattackers. To provide strong protection of cloud platforms, infrastructure, hosted applications, and data stored in the cloud, we need to address the security issue from a range of perspectives-from secure data and application outsourcing, to anonymous communication, to secure multiparty computation. This special issue on cloud security aims to address the importance of protecting and securing cloud platforms, infrastructures, hosted applications, and data storage.
Language eng
DOI 10.1109/MCC.2016.117
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C4 Letter or note
ERA Research output type X Not reportable
Copyright notice ©2016, IEEE
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 28 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Fri, 09 Dec 2016, 14:22:27 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact