ANALISIS METODE PENGAMANAN DATA PADA LAYANAN CLOUD COMPUTING
Abstract
Full Text:
PDF (Bahasa Indonesia)References
Badger L., Grance, Patt-Corner R. and Voas J., (2011). “Cloud computing synopsis and recommendations (draft), nist special publication 800-146”, Recommendations of the National Institute of Standards and Technology, Tech. Rep.
Chouhan P., Singh R., (2016), “Security Attacks on Cloud Computing With Possible Solution”., International Journal of Advanced Research in Computer Science and Software Engineering 6(1), pp.
Khalid U, Ghafoor A., Irum M., and Shibli M. A., (2013), “Cloud based secure and privacy enhanced authentication & authorization protocol”, Procedia Computer Science, 22, 680-688.
T. Acar, M. Belenkiy and A. Küpçü, (2013) “Single password authentication”, Computer Networks, 57(13), 2597-2614.
Singh, N. & Singh, A.K. (2018) “Data Privacy Protection Mechanism” Data Sci. Eng. 3: 24. https://doi.org/10.1007/s41019-017-0046-
Wang G., Liu Q., Wu J. and Guo M., (2011). “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, 30(5), 320-331.
Fan C. I., and Huang S. Y., (2013). “Controllable privacy preserving search based on symmetric predicate encryption in cloud storage”, Future Generation Computer Systems, 29(7), 1716-1724.
Rizzo C., (2019) “Integrated Design ensures availability and protection of critical sensitive data with Online Tech’s cloud infrastructure“. Access 20 april 2019, from: https://www.businesswire.com/news/home/20190123005046/en
Younis A. Younis, Kifayat K., Merabti M., (2014). “An Access Control Model for Cloud Computing”. Journal of Information Security and Applications, Volume 19, Issue 1, February 2014, Pages 45-6
CA Technology. (2014)., “Expanding Web Single Sign on to Cloud and Mobile Environment”., https://www.ca.com/content/dam/ca/us/files/ebook/expanding-web-sso-to-cloud-and-mobile-environments.pdf
Cigoj, Primož & Jerman, Borka. (2015). An Authentication and Authorization Solution for a Multiplatform Cloud Environment. Information Security Journal: A Global Perspective. 24. 1-11. 10.1080/19393555.2015.1078424.
Chadwick D. W., and Fatema K., (2012) “A privacy preserving authorisation system for the cloud”, Journal of Computer and System Sciences, 78(5), (2012), 1359-1373.
Hange M., (2011) “Security Recommendations for Cloud Computing Providers”, Federal Office for Information Security
Brunette G., and Mogull R., (2009) “Security guidance for critical areas of focus in cloud computing v2”, Cloud Security Alliance, 1-76.
DOI: https://doi.org/10.29103/techsi.v11i1.1357
Article Metrics
Abstract Views : 5019 timesPDF (Bahasa Indonesia) Downloaded : 83 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Munirul Ula
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indexed by:
© Copyright of Journal TECHSI, (e-ISSN:2614-6029, p-ISSN:2302-4836).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.