[1]
L.M. Kaufman and B. Potter, Can public-cloud security meet its unique challenges?, IEEE Computer and reliability societies, (2010), pp.55-57.
DOI: 10.1109/msp.2010.120
Google Scholar
[2]
J.W. Rittinghouse and J.F. Ransome, Cloud Computing implementation, management, and security, (2010), p.68–73.
Google Scholar
[3]
T. Dierks, and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1. 2, IETF RFC5246, August 2008. http: /tools. ietf. org/html/rfc5246.
DOI: 10.17487/rfc5246
Google Scholar
[4]
S.A. Chaves, C.B. Westphall and F.R. Lamin, SLA perspective in security management for cloud computing", Proc. 6th International Conference on Networking and Services (ICNS, 10), China, (2010), p.212–217.
DOI: 10.1109/icns.2010.36
Google Scholar
[5]
M. Swanson, N. Bartol, J. Sabato, J. Hash and L. Graffo, Security metrics guide for information technology systems, National Institute of Standards and Technology Special Publication 800-55, July, (2003).
DOI: 10.6028/nist.sp.800-55
Google Scholar
[6]
M. Siebenhaar, T.A.B. Nguyen, U. Lampe, D. Schuller and R. Steinmetz, Concurrent negotiations in cloud-based systems, LNCS, Vol. 7150/2012, pp.17-31.
DOI: 10.1007/978-3-642-28675-9_2
Google Scholar
[7]
J. Hui and A. Klein , A benchmark of transparent data encryption for migration of web application in the cloud", Proc. 8th International Conference on Dependable, Autonomic and Secure Computing (DASC, 09), (2009), p.735–740.
DOI: 10.1109/dasc.2009.85
Google Scholar
[8]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data possession at untrusted stores", Proc. 14th ACM Conf. Computer and Comm. Security (CCS, 07), (2007), pp.598-609.
DOI: 10.1145/1315245.1315318
Google Scholar
[9]
A. Juels and B. S. Kaliski Jr., Pors: proofs of retrievability for large files", Proc. 14th ACM Conf. Computer and Comm. Security (CCS, 07), (2007), pp.584-597.
DOI: 10.1145/1315245.1315317
Google Scholar
[10]
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Lin, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Transactions on parallel and distributed system, Vol. 22, (2011), pp.847-858.
DOI: 10.1109/tpds.2010.183
Google Scholar