Czasopismo
Tytuł artykułu
Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Wyzwania dla bezpieczeństwa przetwarzania w chmurze dla małych i średnich przedsiębiorstw
Języki publikacji
Abstrakty
Cloud computing is a model of leveraging IT resources offered by providers via the Internet. In this model, small and medium-sized enterprises are able to transfer the costs of building and maintaining IT infrastructure to third parties. The IT resources are available on demand, and the consumers pay merely for the resources actually used. A key factor limiting the adoption of cloud computing are security concerns. However, these concerns should be collated with the security benefits possible to achieve thanks to the cloud’s characteristics. This paper presents an analysis of the risks and benefits in the area of security related to cloud computing implementation in companies and an overview of initiatives aimed at increasing the awareness in this area.
Słowa kluczowe
Czasopismo
Rocznik
Numer
Strony
100-111
Opis fizyczny
Daty
wydano
2012
Twórcy
autor
- Uniwersytet Ekonomiczny w Poznaniu, rafal.wojciechowski@ue.poznan.pl
autor
- Uniwersytet Ekonomiczny w Poznaniu, sergiusz.strykowski@ue.poznan.pl
autor
- Uniwersytet Ekonomiczny w Poznaniu, daniel.wiliusz@ue.poznan.pl
autor
- Uniwersytet Ekonomiczny we Wrocławiu, jan.swierzowicz@ue.poznan.pl
Bibliografia
- Armbrust M. et al., Above the clouds: A Berkeley view of cloud computing, Technical Report No. UCB/EECS-2009-28, EECS Department, U.C. Berkeley 2009.
- Catteddu D., Hogben G., An SME perspective on Cloud Computing, European Network and Information Security Agency, 2010, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-sme-survey [accessed 19.01.2012].
- Cloud Computing: Benefits, risks and recommendations for information security, eds. D. Catteddu, G. Hogben, European Network and Information Security Agency, 2009, http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport [accessed 19.01.2012].
- CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/security-guidance/ [accessed 19.01.2012].
- CSA, Top Threats to Cloud Computing V1.0, Cloud Security Alliance, 2010, https://cloudsecurityalliance.org/research/top-threats/[ accessed 19.01.2012].
- Gartner, Gartner Identifies the Top 10 Strategic Technologies for 2011, Gartner Research, 2011, http://www.gartner.com/it/page.jsp?id=1454221 [accessed 19.01.2012].
- Geelan J. (2009), Twenty-One Experts Define Cloud Computing, “Cloud Computing Journal”, http://cloudcomputing.sys-con.com/node/612375 [accessed 19.01.2012].
- IDC, IDC IT Cloud Services Survey: Top Benefits and Challenges, IDC, 2009, http://blogs.idc.com/ie/?p=730 [accessed 20.01.2012].
- Mell P., Grance T., The NIST Definition of Cloud Computing, National Institute of Standards and Technology, 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [accessed 19.01.2012].
- SAJACC, Standards Acceleration to Jumpstart Adoption of Cloud Computing, National Institute of Standards and Technology, 2011, http://www.nist.gov/itl/cloud/sajacc.cfm [accessed 19.01.2012].
- SecaaS, Defined Categories of Service 2011, Cloud Security Alliance, 2011, https://cloudsecurityalliance.org/research/secaas/ [accessed 19.01.2012].
- Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing, “Journal of Network and Computer Applications” 2011, vol. 34, no. 1.
- Zissis D., Lekkas D., Addressing cloud computing security issues, “Future Generation Computer System” 2012, vol. 28, no. 3.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.desklight-e53f5096-6d54-4f3c-a6b8-184b121c23b6