Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MBB_2015_10_2_a1, author = {E. A. Isaev and D. V. Dumsky and V. A. Samodurov and V. V. Kornilov}, title = {Cloud computing: information security concerns}, journal = {Matemati\v{c}eska\^a biologi\^a i bioinformatika}, pages = {567--579}, publisher = {mathdoc}, volume = {10}, number = {2}, year = {2015}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/} }
TY - JOUR AU - E. A. Isaev AU - D. V. Dumsky AU - V. A. Samodurov AU - V. V. Kornilov TI - Cloud computing: information security concerns JO - Matematičeskaâ biologiâ i bioinformatika PY - 2015 SP - 567 EP - 579 VL - 10 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/ LA - ru ID - MBB_2015_10_2_a1 ER -
%0 Journal Article %A E. A. Isaev %A D. V. Dumsky %A V. A. Samodurov %A V. V. Kornilov %T Cloud computing: information security concerns %J Matematičeskaâ biologiâ i bioinformatika %D 2015 %P 567-579 %V 10 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/ %G ru %F MBB_2015_10_2_a1
E. A. Isaev; D. V. Dumsky; V. A. Samodurov; V. V. Kornilov. Cloud computing: information security concerns. Matematičeskaâ biologiâ i bioinformatika, Tome 10 (2015) no. 2, pp. 567-579. http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/
[1] Lakhno V. D., Isaev E. A., Pugachev V. D., Zaitsev A. Yu., Fialko N. S., Rykunov S. D., Ustinin M. N., “Razvitie informatsionno-kommunikatsionnykh tekhnologii v Puschinskom nauchnom tsentre RAN”, Matematicheskaya biologiya i bioinformatika, 7:2 (2012), 529–544 | DOI
[2] Antonopoulos N., Gillam L., Cloud Computing: Principles, Systems and Applications, Springer-Verlag, London, 2010, 379 pp. | Zbl
[3] Kornilov V. V., Isaev E. A., Isaev K. A., “Perspektivy ispolzovaniya tsentrov obrabotki dannykh pri reshenii zadach matematicheskoi biologii i bioinformatiki”, Matematicheskaya biologiya i bioinformatika, 10:1 (2015), 60–71 | DOI | Zbl
[4] Oplachko E. S., Ustinin D. M., Ustinin M. N., “Oblachnye tekhnologii i ikh primenenie v zadachakh vychislitelnoi biologii”, Matematicheskaya biologiya i bioinformatika, 8:2 (2013), 449–466 | DOI
[5] Isaev E. A., Kornilov V. V., “Problema obrabotki i khraneniya bolshikh ob'emov nauchnykh dannykh i podkhody k ee resheniyu”, Matematicheskaya biologiya i bioinformatika, 8:1 (2013), 49–65 | DOI
[6] Amazon Web Services Customer Agreement. Website of Amazon Web Services, , 2008 (data obrascheniya: 21.12.2015) http://aws-portal.amazon.com/gp/aws/developer/terms-and-conditions.html
[7] Jansen W., Grance T., Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, , 2011, 80 pp. (data obrascheniya: 09.10.2015) http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
[8] White J. S., Pilbeam A. W., A survey of virtualization technologies with performance testing, Cornell University Library, arXiv: (data obrascheniya: 22.10.2015) 1010.3233v1 [cs.DC]
[9] Mell P., Grance T., The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, , 2011, 7 pp. (data obrascheniya: 09.10.2015) http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[10] Xavier M. G., Neves M. V., Rossi F. D., Ferreto T. C., Lange T., De Rose C. A. F., “Performance Evaluation of Container-Based Virtualization for High Performance Computing Environments”, 21st Euro. Int. Conf. on Parallel, Distrib. Networkbased Processing, IEEE, 2013, 233–240
[11] Bardac M., Deaconescu R., Florea A. M., “Scaling Peer-to-Peer testing using Linux Containers”, Roedunet International Conference (RoEduNet), IEEE, 2010, 287–292
[12] Yuhao Z., David M. N., “A Virtual Time System for OpenVZ-Based Network Emulations”, Proceeding PADS '11 Proceedings of the 2011 IEEE Workshop on Principles of Advanced and Distributed Simulation (2011), 1–10
[13] Bui T., Analysis of Docker Security, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1501.02967v1 [cs.CR]
[14] Morabito R., Power Consumption of Virtualization Technologies: an Empirical Investigation, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1511.01232v1 [cs.DC]
[15] Cacciatore K., Czarkowski P., Dake S., Garbutt J., Hemphill B., Jainschigg J., Moruga A., Otto A., Peters C., Whitaker B. E., Exploring Opportunities: Containers and OpenStack, OpenStack White Paper, , 2015, 19 pp. (data obrascheniya: 21.12.2015) https://www.openstack.org/assets/pdf-downloads/Containers-and-OpenStack.pdf
[16] Reshetova E., Karhunen J., Nyman T., Asokan N., Security of OS-level virtualization technologies, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1407.4245v1 [cs.CR] | Zbl
[17] Patel A., Taghavi M., Bakhtiyari K., Junior J. C., “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of Network and Computer Applications, 36 (2013), 25–41 | DOI
[18] Brenton C., The basics of virtualization security, , Cloud Security Alliance, 2011, 17 pp. (data obrascheniya: 09.10.2015) https://cloudsecurityalliance.org/wp-content/uploads/2011/11/virtualization-security.pdf
[19] Kelley D., How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Security Curve, Website of Cloud Security Alliance, , 2011, 6 pp. (data obrascheniya: 09.10.2015) https://cloudsecurityalliance.org/wpcontent/uploads/2011/11/DataCentricProtection_intheCloud.pdf
[20] Berdnik A. V., “Problemy bezopasnosti oblachnykh vychislenii. Analiz metodov zaschity oblakov ot cloud security alliance”, Almanakh sovremennoi nauki i obrazovaniya, 10, Gramota, Tambov, 2013, 35–38
[21] Lubacz J., Mazurczyk W., Szczypiorski K., “Principles and Overview of Network Steganography”, Communications Magazine. IEEE, 52:5 (2014), 225–229, arXiv: (data obrascheniya: 09.10.2015) 1207.0917v1 [cs.CR] | DOI
[22] Bishop M., Introduction to Computer Security, 1st ed., Pearson Education, Boston, 2004, 747 pp.
[23] Prescott E. Small, Defense in Depth: An Impractical Strategy for a Cyber World, , SANS Institute, 2011, 24 pp. (data obrascheniya: 21.12.2015) https://www.sans.org/readingroom/whitepapers/assurance/defense-depth-impractical-strategy-cyber-world-33896
[24] Harris S., CISSP All-in-One Exam Guide, 6th Edition, McGraw-Hill, Osborne, 2012, 1456 pp.
[25] Rzhabi V., Izbavtes ot opasenii otnositelno bezopasnosti dannykh v oblake, , IBM developerWorks, 2015, 16 pp. (data obrascheniya: 09.10.2015) https://www.ibm.com/developerworks/ru/library/dm-1408datasecuritycloud/dm-1408datasecuritycloud-pdf.pdf
[26] Avoiding the hidden Costs of the Cloud: report of Symantec Corporation, , 2013, 11 pp. (data obrascheniya: 21.12.2015) http://www.symantec.com/content/en/us/about/media/pdfs/b-state-of-cloud-globalresults-2013.en-us.pdf
[27] The Challenges of Cloud Information Governance: A Global Data Security Study, Ponemon Institute Research Report, , 2014, 30 pp. (data obrascheniya: 21.12.2015) http://www2.safenetinc.com/cloud-security-research/SafeNet-Cloud-Governance.pdf
[28] Sultan N., “Making use of cloud computing for healthcare provision: Opportunities and challenges”, International Journal of Information Management, 34 (2014), 177–184 | DOI
[29] Hoff Ch., Security guidance for critical areas of focus in cloud computing, 2011, 12–20 (data obrascheniya: 21.12.2015) https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf