参考文献
|
-
and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility,” Future Generation Computer Systems, Vol. 25, No. 6, pp. 599-616, June 2009.
連結:
-
[8] B. P. Rimal, E. Choi, and I. Lumb, “A Taxonomy and Survey of Cloud
連結:
-
[9] P. Hofmann and D. Woods, “Cloud Computing: the Limits of Public Clouds for
連結:
-
Business Applications,” IEEE Internet Computing, Vol. 14, No. 6, pp.90-93,
連結:
-
November 2010.
連結:
-
Infrastructure Management in Private and Hybrid Clouds,” IEEE Internet Computing, Vol. 13, No. 5, pp. 14-22, September 2009.
連結:
-
Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility”, Future Generation Computer Systems, Volume 25, Issue 6, June 2009.
連結:
-
[37] “Introduction to Cloud Computing architecture White Paper”, Sun Microsystems,
連結:
-
[40] Wikipedia (2012, June 22). Cloud computing. Retrieved June 22, 2012,
連結:
-
April 5, 2011.
連結:
-
[44] A Platform Computing Whitepaper, ‘Enterprise Cloud Computing:Transforming
連結:
-
IT’, Platform Computing, pp6, viewed 13 March 2010.
連結:
-
[45] Dooley B, 2010, ‘Architectural Requirements Of The Hybrid Cloud’,
連結:
-
Information Management Online, viewed 10 February 2010, from
連結:
-
[47] Wikipedia(2012, February 9). Data feed. Retrieved February 9, 2012,
連結:
-
[53] Wikipedia(2012, May 12). MIME. Retrieved May 12, 2012,
連結:
-
[54] Wikipedia(2012, June 23). Atom(standard). Retrieved June 23, 2012,
連結:
-
February 14, 2012, http://commons.apache.org/net/.
連結:
-
[59] Wikipedia(2012, June 15). EBCDIC. Retrieved June 15, 2012,
連結:
-
[64] Wikipedia(2012 June 22). Ajax (programming). Retrieved June 22, 2012,
連結:
-
[65] 劉家驊, 洪士凱, “雲端運算資料安全防護機制”, Proc. of the 2010
連結:
-
Conference on Computer Vision, Image Processing and Information Technology, Ching Yun University, Zhongli, Jun. 9, 2010.
連結:
-
[67] Ramgovind S, Eloff MM, Smith E. “The Management of Security in Cloud
連結:
-
[70] Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in
連結:
-
[71] 蔡一郎, ”雲端運算與雲端安全架構”, Cloud computing and Network security,
連結:
-
[74] Dimitrios Zissis, Dimitrios Lekkas, “Addressing cloud computing security
連結:
-
Computing and Communications, Dalian, China, 2008. Los Alamitos, CA, USA:
-
IEEE CS Press, 2008:5-13.
-
[7] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud omputing
-
Computing Systems,” the fifth International Joint Conference on INC, IMS and IDC (NCM '09), 2009.
-
[10] B. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, ”Virtual
-
[11] IDC. IT Cloud Services User Survey, pt.2: Top Benefits & Challenges[R/OL].
-
(2008-10-2)[2009-01-21]. http://blogs.idc.com/ie/?p=210.
-
[12] CERT/CC. Full Statistics[R/OL]. (2009-02-12)[2010-01-14].
-
111
-
http://www.cert.org/stats.
-
cloud-computing-to-bring-security-app-shift-report-says.aspx.
-
[33] Turner T. Hey! You! Get Off My Cloud: Computing Security Policies in the
-
Virtual Environment[R/OL]. (2008-12-15)[2009-02-18].
-
http://www.wwpi.com/software-/software/6460-hey-you-get-off-my-cloud-computing-security-policies-in-the-virtual-environment.
-
[34] Global Secure Systems. Cloud Computing Concerns over Malware Hosting
-
[R/OL]. (2009-01-26)[2009-02-17]. http://www.prosecurityzone.com/Customisa
-
tion/News/IT_Security/Anti-virus_and_anti-malware_software/Cloud_computing_concerns_over_malware_hosting.asp.
-
[35] “Google App Engine”, http://code.google.com/intl/zh-TW/appengine.
-
[36] RajkumarBuyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona
-
June 2009.
-
[38] Axel Buecker, Koos Lodewijkx, Harold Moss, Kevin Skapinetz and Michael
-
Waidner, Cloud Security Guidance‖ IBM Recommendations for the Implementation of Cloud Security, November 2, 2009.
-
[39] ProductionScale (2008, April 24). Cloud Computing: Get Your Head in
-
the Clouds. Retrieved April 3, 2009, from
-
http://www.productionscale.com/home/2008/4/24/cloud-computing-getyour-
-
head-in-the-clouds.html.
-
113
-
http://en.wikipedia.org/wiki/Cloud_computing.
-
[41] Network World (2008, September 9). Cloud computing hype spurs
-
confusion. Retrieved April 3, 2009, from
-
http://www.networkworld.com/news/2008/092908-cloud-computing-de
-
finitions.html?fsrc=netflash-rss.
-
[42] Information Age (2008, June 16). What Is Cloud Computing? Retrieved
-
April 3, 2009, from
-
http://www.infoage.idg.com.au/index.php/id;909486215;fp;4;fpid;1051
-
515815.
-
[43] 葉建偉, 雲計算系統中作業安全技術研究, 中國學術期刊電子雜誌出版社,
-
http://www.information-management.com/news/hybrid-cloudarchitectural-
-
requirements-10017152-1.html.
-
[46] Global Netoptex Incorporated , 2009, Demystifying the cloud. Important
-
opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13
-
December 2009.
-
http://en.wikipedia.org/wiki/Data_feed.
-
[48]Wikipedia(2012, June 23). Transport Layer Security. Retrieved June 23, 2012,
-
http://en.wikipedia.org/wiki/Secure_Socket_Layer.
-
[49] Wikipedia(2012, June 13). HTTP Secure. Retrieved June 13, 2012,
-
http://en.wikipedia.org/wiki/HTTP_Secure.
-
[50] Wikipedia(2012, June 21). Oauth. Retrieved June 21, 2012,
-
http://en.wikipedia.org/wiki/OAuth.
-
[51] Google(2012, April 20).ClientLogin for Installed Applications . Retrieved April
-
20, 2012, https://developers.google.com/accounts/docs/AuthForInstalledApps.
-
[52] Google(2012, April 20). AuthSub for Web Applications. Retrieved April 20,
-
2012 , https://developers.google.com/accounts/docs/AuthSub.
-
http://en.wikipedia.org/wiki/MIME.
-
http://en.wikipedia.org/wiki/Atom_(standard).
-
[55] Wikipedia(2012, May 13). Metadata. Retrieved May 13, 2012,
-
114
-
http://en.wikipedia.org/wiki/Metadata.
-
[56] Wikipedia(2012, June 5). HTTP ETag. Retrieved June 5, 2012,
-
http://en.wikipedia.org/wiki/HTTP_ETag.
-
[57] Widipedia(2012, June 7). Access control list. Retrieved June 7, 2012,
-
http://en.wikipedia.org/wiki/Access_control_list.
-
[58] Apache Commons(2012, February 14). Apache Commons Net. Retrieved
-
http://en.wikipedia.org/wiki/EBCDIC.
-
[60] github, Studio-42/elFinder. https://github.com/Studio-42/elFinder/wiki.
-
[61] jQuery. Documentation. http://docs.jquery.com/Main_Page.
-
[62] http://jqueryui.com/.
-
[63] Wikipedia(2012, June 8).Internationalization and localization. Retrieved June 8,
-
2012, http://en.wikipedia.org/wiki/Internationalization_and_localization.
-
http://en.wikipedia.org/wiki/Ajax_(programming).
-
[66] 楊文誌(民99)。雲端運算Cloud Computing 技術指南。台北市:松崗。
-
Computing”, 2010, IEEE.
-
[68] ISO. ISO 7498-2:1989. Information processing systems- Open Systems
-
Interconnection. ISO 7498-2.
-
[69] Dlamini M T, Eloff M M and Eloff J H P, ‘Internet of People, Things and
-
Services – The Convergence of Security, Trust and Privacy’, 2009.
-
Cloud Security V2.1”, December 2009, pp.13-69.
-
Communications of the CCISA, Vol. 16, No. 4, Oct. 2010.
-
[72] 彭秀琴,張念慈(2010),「雲端運算下資訊安全之探討」,經建會管制
-
考核處。
-
[73] 朱智強, 混合雲服務安全若干理論與關鍵技術研究, 中國學術期刊電子雜
-
誌出版社, March 18, 2011.
-
Issues”, Future Generation Computer Systems, Volume 28, Issue 3, March 2012, Pages 583–592.
-
[75] Ali Asghary Karahroudy, “Security Analysis and Framework of Cloud
-
115
-
Computing with Parity-Based Partially Distributed File System”, UMI Dissertation Publishing, July 2011.
-
[76] https://www.dropbox.com/tour.
-
[77] https://www.backupify.com/features.
-
[78] https://www.sugarsync.com/?source=myss.
-
[79] http://www.zmanda.com/cloud-backup-taiwan.html.
-
[80] http://www.chmost.com/index.php/astaro/mail-archiving.html.
-
[81] https://www.asuswebstorage.com/navigate/features/.
-
[82] http://www.hitachibackup.com/.
-
[83] http://www.asigra.com/.
-
[84] http://mozy.com/products/.
-
[85] http://aws.amazon.com/s3/.
|