Secure Cloud Computing 2013
DOI: 10.1007/978-1-4614-9278-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…The workload partitioning problem has been used for risk based data processing over hybrid cloud architecture [16].The better understanding of structural components of an organization, economic and mathematical modeling helps in taking better decisions regarding risk [17].The cloud security risks taxonomy has been divided into compliance risks, architecture based risks and privacy risks as given in Fig. 1, 2, 3 [18].…”
Section: Risk Management Strategies In Cloud Computingmentioning
confidence: 99%
“…The workload partitioning problem has been used for risk based data processing over hybrid cloud architecture [16].The better understanding of structural components of an organization, economic and mathematical modeling helps in taking better decisions regarding risk [17].The cloud security risks taxonomy has been divided into compliance risks, architecture based risks and privacy risks as given in Fig. 1, 2, 3 [18].…”
Section: Risk Management Strategies In Cloud Computingmentioning
confidence: 99%