Chapter 7 Bibliography 243
Chapter 7: Bibliography
[1]
David C. Wyld (2010). The cloudy future of the Government IT: Cloud Computing and the Public Sector around the World. Available: http://airccse.org/journal/ijwest/papers/0101w1.pdf
[2]
Lockheed Martin (2010). Awareness Trust and Security to shape government cloud adoption. Available: www.lockheedmartin.com/data/assets/isgs/documents/ CloudComputingWhitePaper.pdf
[3]
John Bair, John Rohton (2010). Cloud Computing from the Ground Up. Available: http://www.ajilitee.com/wp-content/uploads/2010/07/White-PaperAjilitee-Cloud-Computing-from-the-Ground-Up-July-20101.pdf
[4]
Russell Craig, Jeff Frazier (2009). Cloud Computing in Public Sector. Available: http://www.cisco.com/web/about/ac79/docs/wp/ps/Cloud_Computing_112309_FI NAL.pdf
[5]
Darrel M. West (2009). Saving Money through Cloud Computing. Available: http://www.juniper.net/us/en/local/pdf/implementation-guides/8010035-en.pdf
[6]
Prem Jadhwani, John Mackinnon (2009). Cloud Computing Building a framework for Successful Transition. Available: http://www.gtsi.com/cms/documents/WhitePapers/Cloud-Computing.pdf
[7]
Lorraine M. Campos, Stephania E. Giese, Joelle E.K. Laszlo (2010).Transcending The Cloud: A legal guide to the risks and rewards of cloud computing. Available: http://www.reedsmith.com/_db/_documents/Cloud_Computing_Government_Con tracting.pdf
[8]
Torry Harris, Cloud Computing – An Overview. Available: http://www.thbs.com/downloads/Cloud-Computing-Overview.pdf
9]
Ted Alford, Gwen Morton (2009). The Economics of Cloud Computing. Available: www.boozallen.com/media/file/Economics-of-Cloud-Computing.pdf
[10]
Cloud Computing Use case Discussion Group (2010). Cloud Computing Use Cases. Available: cloudusecases.org/Cloud_Computing_Use_Cases_Whitepaper4_0.od
Chapter 7 Bibliography 244
[11]
Duncan Goss, David Tucker (2009). Cloud Computing in Vermont State Government. Available: www.leg.state.vt.us/reports/2010ExternalReports/251891.pdf
[12]
Vivek Kundra (2010). State of Public Sector Cloud Computing. Available: www.cio.gov/documents/StateOfCloudComputingReport-FINALv3_508.pdf
[13]
Kelly, Sue; Gibson, Nicola; Holland, Christopher; Light, Ben (1999). "Focus Issue on Legacy Information Systems and Business Process Engineering: a Business Perspective of Legacy Information Systems". Communications of the AIS 2 (7): 1–27.
[14]
Pearson Custom Publishing & West Chester University (2009). Custom Program for Computer Information Systems (CSC 110), Pearson Custom Publishing Glossary p. 694
[15]
Jessup, Leonard M.; Joseph S. Valacich (2008). Information Systems Today (3rd ed.). Pearson Publishing Glossary p. 416
[16]
Polack, Jennifer (2009). Planning a CIS Education Within a CS Framework. Journal of Computing Sciences in Colleges 25 (2): 100–106. ISSN 1937-4771
[17]
Hayes, Helen; Onkar Sharma (2003). "A decade of experience with a common first year program for computer science, information systems and information technology majors". Journal of Computing Sciences in Colleges 18 (3): 217–227. ISSN 1937-4771
[18]
CSTA Committee, Allen Tucker, et alia (2009). A Model Curriculum for K-12 Computer Science (Final Report). Association for Computing Machinery, Inc. Abstraction & p. 2v
[19]
Archibald, J.A. (1975). Computer Science education for majors of other disciplines. AFIPS Joint Computer Conferences: 903–906. "Computer science spreads out over several related disciplines and shares with these disciplines certain sub-disciplines that traditionally have been located exclusively in the more conventional disciplines".
[20]
Abdullah Alshboul (2010), Information systems security measures and counter measures: Protecting organizational assets from malicious attacks. Available: http://www.ibimapublishing.com/journals/CIBIMA/2010/486878/486878.pdf
[21]
Kumar, R.L., Park, S. and Subramaniam, C. (2008). Understanding the value of countermeasures portfolios in information system security. Journal on management information system, 25, 241-279.
Chapter 7 Bibliography 245 [22]
Chen C. C., Shaw, R.S., and Yang, S.C. (2006). Mitigating information security risk by increasing user awareness: A case study of information security awareness system, 25(2), 97-123.
[23]
Johnson M.E. (2008). Information risk of inadvertent disclosure: an analysis of file Richardson R., CSI computer crime & security survey. Computer security institute.
[24]
Thompson, D. R. (2009). Lesson Title: Confidentially, Integrity and Availability. Available:http://rfidsecurity.uark.edu/course/mod2/lessons/pdf/mod02_lesson01_ plan.pdf
[25]
Information Security Principles. Available: http://media.wiley.com/product_data/excerpt/77/07645739/0764573977.pdf
[26]
Seagate (2008). Data Sheet, Momentus 5400 FDE.3, Two type of Seagate secure government grade encryption. Available: http://www.seagate.com/docs/pdf/datasheet/disc/ds_momentus_5400_fde_3.pdf
[27]
Intel (2005). Network Access Control: User and device authentication. Available: http://cache-www.intel.com/cd/00/00/26/07/260786_260786.pdf
[28]
VMware, (2009). Smart Cards and Certificate Authentication in VMware® View. Available: http://www.vmware.com/files/pdf/view_cert_authentication.pdf
[29]
Sally Hudson Charles J. Kolodgy, (2005). MARKET ANALYSIS: Worldwide Hardware Authentication Token 2005 2009 Forecast and 2004 Vendor Shares. Available:ftp://ftp.aladdin.com/pub/marketing/HASP/HASP_SRM/Analyst_Repo rt/IDC34452_MarketAnalysis1205.pdf
[30]
CREN (2001), Strategic and practical FAQ: Hardware Security Modules. Available: http://www.cren.net/crenca/docs/hsm.pdf
[31]
Intel (2009). Trusted Execution Technology, Hardware based technology for enhancing server palteform security. Available: http://www.intel.com/Assets/PDF/whitepaper/323586.pdf
[32]
Trusted Computing Group, (2009). How to use the TPM: A Guide to hardware based endpoint security. Available: http://www.wave.com/collateral/How_to_Use_TPM_Whitepaper_090302.pdf
[33]
VIA Padlock (2004). Hardware Security Suit : Providing the hardware building blocks for optimizing information security. Available: http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/wp040519p adlock.pdf
Chapter 7 Bibliography 246 [34]
IRONKEY(2007). Benefits of Hardware Based Encryption. Available: http://www.esecuritytogo.com/documents/hardware_encryption_benefits.pdf
[35]
NIST, National Institute of Standards and Technology (NIST) Definition of Cloud Computing. Available: http://csrc.nist.gov/groups/SNS/cloud-computing/
[36]
R.K.Buyya (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Available: http://www.elsevier.com/wps/find/journaldescription.cws_home/505611/descripti on#description
[37]
N.G. Carr (2009). The many ways cloud computing will disrupt IT. InfoWorld. Available: http://www.tmcnet.com/usubmit/2009/03/25/4084363.htm
[38]
The art of service. A Complete Guide to Cloud Computing. Available: http://ecomp.upe.br/~macoj/publico/1921573007%20Cloud%20Computing.pdf
[39]
Dargha R. (2009). INFOSYS Cloud Computing: Key considerations for adoption. Available:www.infosys.com/cloud-computing/white-papers/.../cloudcomputing.pdf
[40]
NICE. Cloud Computing. Available: http://www.nice-software.com/solutions/cloud-computing.
[41]
Sun Microsystems (2009). Introduction to cloud computing architecture. Available:http://webobjects.cdw.com/webobjects/media/pdf/Sun_CloudComputin g.pdf
[42]
IBM (2009). Seeding the Clouds: Key Infrastructure Elements for Cloud Computing. Available: http://www935.ibm.com/services/in/cio/pdf/oiw03022usen.pdf
[43]
David Chappell. Introducing the azure services platform. Available: download.microsoft.com/.../e/4/3/.../Azure_Services_Platform.pdf
[44]
Salesforce.com. The 7 secrets of SaaS start up success. Available: http://www.salesforce.com/assets/pdf/misc/WP_7Secrets_0408.pdf
[45]
Stanley Katz. Don‘t confuse a tool with a goal: Making Information Technology Serve Higher Education. Available: http://net.educause.edu/ir/library/pdf/ffp0110s.pdf
[46]
L. Kleinrock, (2005). A vision for internet, ST journal of Research 2(1) (2005) 4-5.
Chapter 7 Bibliography 247 [47]
ProvideX (2007). Client-Server Reference, Sage Software Canada Ltd. Available: http://docs.pvxplus.com/PVXCltSrv.pdf
[48]
I. Foster, C. Kesselman (1999). The Grid: Blueprint for a Future Computing Infrastructure, Book Published by Morgan Kaufmann Publishers, San Francisco USA.
[49]
Educause, (2006). 7 things you should know about Grid Computing. Available: http://net.educause.edu/ir/library/pdf/ELI7010.pdf
[50]
Chee Shin Yeo, Rajkumar Buyya, Marcos Dias de Assunção, Jia Yu, Anthony Sulistio, Srikumar Venugopal, and Martin Placek (2007). Utility Computing on Global Grids, Chapter 143, Hossein Bidgoli (ed.), The Handbook of Computer Networks, ISBN: 978-0-471-78461-6, John Wiley & Sons, New York, USA.
[51]
Brian Monahan, (2005). Infrastructure Security Modelling for Utility Computing, Trusted Systems Laboratory, HP Laboratories Bristol. Available: www.hpl.hp.com/techreports/2005/HPL-2005-4.pdf
[52]
RedHat. What is virtualization ? http://www.redhat.com/f/pdf/virtualization/gunner_virtual_paper2.pdf
[53]
Byron Ludwig, Serena Coetzee, (2009). A Comparison of Platform as a Service (Paas) Clouds with a Detailed Reference to Security And Geoprocessing Services. Available: www.isprs.org/proceedings/XXXVIII/4-W13/ID_57.pdf
[54]
Frank Bruno, (2006). Executing an IP Protection Strategy in a SaaS Environment. Available: http://ironmountain.com/news/newsarticles/SaaS1.pdf
[55]
Stanford University, School of Engineering, (2008). Amazon Enters the Cloud Computing Business. Available: http://www.stanford.edu/class/ee204/Publications/Amazon-EE353-2008-1.pdf
[56]
Bob Thompson, Andrew Waller, (2011). The role of Cloud Computing in Commercial Property. Available: http://www.remitconsulting.com/resources/clients/1/user/resource_321.pdf
[57]
Wikipedia, (2012). Software as a Service. http://en.wikipedia.org/wiki/Software_as_a_service#cite_note-1
[58]
Pyrotechnic Systems (2010). Software as a Service. Available: http://www.pyrotechnicsystems.com/Softwareasaservice.htm
[59]
Techni-Core Corporation (2011). Software as a Service (SaaS). Available: http://www.needanerd.net/cloud--saas.html
Chapter 7 Bibliography 248 [60]
Cloud Taxonomy, OpenCrowd, (2010) "Software as a Service (SaaS)". Available: http://cloudtaxonomy.opencrowd.com/taxonomy/software-as-a-service/.
[61]
Techno-plus. Cloud Computing for Beginners, Available: http://www.moneredevelopmentservices.com/doc/Cloud_Computing.pdf
[62]
Salesboom. Advantages of Software as a Service, Available: http://www.salesboom.com/products/software-as-a-service-SaaS.html
[63]
Salesforce (2000). Benefits of SaaS. Available: http://www.salesforce.com/saas/benefits-of-saas/
[64]
Jack Schofield (2008). Available: http://www.guardian.co.uk/technology/2008/apr/17/google.software
[65]
Gulf It, Platform as a service' (PaaS). Available: http://www.gulfinfotech.com/paas.html
[66]
Microsoft Interface (2010). Cloud Services: The future is here. Available: download.microsoft.com/download/6/7/6/.../InterfaceAMJWeb.pdf
[67]
Salesforce. What I PaaS. Available: http://www.salesforce.com/paas/
[68]
Jason, (2011). Understanding the business benefits of platform as a service. Available: http://bizcloudnetwork.com/understanding-the-business-benefits-ofplatform-as-a-service
[69]
Sidharth ghag, (2010). Primer windows azure, Available: http://www.infosys.com/cloud-computing/white-papers/Documents/primerwindows-azure.pdf
[70]
Ingram Micro (2010). The business case for cloud computing services. Available: http://www.ingrammicro.com/visitor/servicesdivision/businesscasecloudcomputin g_practiceguide.pdf
[71]
Fujitsu, Fujitsu IaaS. Available: http://www.fujitsu.com/uk/services/infrastructure-services/infrastructure-as-aservice/
[72]
Bright Hub (2010). Is IaaS is the way of the future, Available: http://www.brighthub.com/environment/green-computing/articles/85165.aspx
[73]
Tech Target. Public Cloud, Available: http://searchcloudcomputing.techtarget.com/definition/public-cloud
Chapter 7 Bibliography 249 [74]
Jithesh Moothoor, Vasvi Bhatt, IBM, (2009). A Cloud Computing Solution for Universities: Virtual Computing Lab. Available: http://www2.gsu.edu/~matpxp/SwIG/talks/ws-vcl.pdf
[75]
Mylove Technology (2009). Three Basic Cloud computing infrastructure models.Available: http://www.mylovetechnology.com/web-technology/threebasic-cloud-computing-infrastructure-models/
[76]
Krishnan Subramanian, (2011). Public Clouds, Available: http://us.trendmicro.com/imperia/md/content/us/pdf/solutions/enterprisebusiness/c loudjourney/wp01_publicclouds-krish_110624us.pdf
[77]
Jeff Pyden, Omni Vue, (2011). Top 5 Benefits of the Private Cloud. Available: http://www.erpsoftwareblog.com/2011/06/top-5-benefits-of-the-private-cloud/
[78]
Dr. Matthias Henneberger, Dr. Achim Luhn, (2010). Community Clouds – supporting business ecosystems with cloud computing SIEMENS. Available: http://www.sourcingfocus.com/uploaded/documents/Siemens_Community_Cloud s_Whitepaper.pdf
[79]
IBM, Federal Community Cloud For Government Organizations. Available: http://www304.ibm.com/industries/publicsector/us/en/contentemplate1/!!/xmlid=207581
[80]
MBA Knowledge Base (2011). Cloud Computing Models. Available: http://www.mbaknol.com/information-systems-management/cloud-computingmodels/
[81]
H.S.Shekhawat, D.P.Sharma, (2009). Hybrid Cloud Computing Model for Business Information System Security, Journal of Information, knowledge and research computer science and applications, Volume 1, Issue 1, ISSN 0975-6728. Available: www.ejournal.aessangli.in/ASEEJournals/MCA3.doc
[82]
GFI Software, (2010). ON-PREMISE VS. CLOUD-BASED SOLUTIONS. Available: http://www.gfi.com/whitepapers/Hybrid_Technology.pdf
[83]
A whitepaper by AMD and Rackspace, (2011). Hybrid Hosting: Evolving the cloud in 2011. Available: http://c1776742.cdn.cloudfiles.rackspacecloud.com/downloads/pdfs/Hybrid_Evol vingTheCloud.pdf
[84]
Ronald PeRez, Reine RSaileR, (2008). IBM T.J. Watson Research, Center, virtualization and hardware-based security. Available: http://dslab.csie.ncu.edu.tw/98html/paper/pdf/Virtualization.pdf
Chapter 7 Bibliography 250 [85]
Cloud Computing and the Perceptions of European Business, (2010). Unleashing the Power of Virtualization 2010. Available: http://www.ca.com/files/supportingpieces/ca_virtualisatn_survey_report_228900. pdf
[86]
Cipher Space (2011). VIRTUALIZATION & CLOUD COMPUTING. Available: http://www.cipherspace.com/PDFs/CipherSpaceWebPrint-Virtualization.pdf
[87]
Stratus Technologies, (2011). Server Virtualization and Cloud Computing. Available:http://www.stratus.com/~/media/Stratus/Files/Library/WhitePapers/Ser verVirtualizationandCloudComputing.pdf
[88]
Wikipedia, hypervisor. Available: http://en.wikipedia.org/wiki/Hypervisor
[89]
Tech target, (2005). Hypervisor. Available: http://searchservervirtualization.techtarget.com/definition/hypervisor
[90]
Kevin Roebuck, (2011). Description for Hypervisor. Available: http://www.books-express.co.uk/book/9781743043479/Hypervisor.html
[91]
Champion solutions group, (2011). Microsoft Hyper-V. Available: http://www.vdispecialist.com/offerings/software/microsoft-hyper-v/
[92]
Kevin Fogarty, (2009). Server Virtualization: Top Five Security Concerns. Available:http://www.cio.com/article/492605/Server_Virtualization_Top_Five_S ecurity_Concerns
[93]
XinZhao, KevinBorders, Atul Prakash. VirtualMachine Security Systems, Available:http://www.eecs.umich.edu/~aprakash/eecs588/handouts/virtualmachin esecurity.pdf
[94]
classle.net. Security Issues in Cloud Computing. Available: www.classle.net/sites/default/.../Security_issues_in_cloud_computing.ppt
[95]
Vmware, (2006). Virtualization Overview. Available: http://www.vmware.com/pdf/virtualization.pdf
[96]
Bryan Muehlberger, (2005). Top 5 benefits of server virtualization. Available: http://www.itworld.com/nls_windowsserver050411
[97]
Derrick Kondo, Bahman Javadi, Paul Malecot, Franck Cappello, David P. Anderson, (2009). Cost-Benefit Analysis of Cloud Computing versus Desktop Grids, 18th International Heterogeneity in Computing Workshop, Rome. Available:http://mescal.imag.fr/membres/derrick.kondo/pubs/kondo_hcw09.p df
Chapter 7 Bibliography 251 [98]
Openkin, Open Source. Cloud Computing for Maverick IP Sub Metering Appliances. Available: http://www.openkin.com/sites/default/files/openkin-maverick-end-usersolution.pdf
[99]
Tyler Farell, (2011). Cloud Computing Scalability. Available: http://www.ideamarketers.com/?Cloud_Computing_Scalability&articleid=245086 4&from=PROFILE
[100] Brain Kumbe, (2009). Cloud Computing — Overview, Advantages, and hallenges For Enterprise Deployment. Available: http://www.bechtel.com/assets/files/TechJournal/2009/Comms%2002%20Cloud %20Computing.pdf [101] Rob Lovell, (2008).Think Grid: Business it on Demand. Available: http://www.thinkgrid.com/docs/computing-whitepaper.pdf [102] Expert Group Report, (2010). The future of cloud computing. Available: http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf [103] Ezendu Ariwa, Eyas El-Qawasmeh, (2011). Digital Enterprise and Information Systems: International Conference, Deis 2011, London, Uk July 20 - 22, 2011, Proceedings. [104] Patrick Callewaert, Paul A. Robinson, Peter Blatman, (2009). Deloitte : Cloud computing Forecasting change. Available: https://www.deloitte.com/assets/Dcom-Global/Local%20Assets/Documents/ TMT/cloud_-_market_overview_and_perspective.pdf [105] Dinh Thai Hoang, Dusit Niyato, and Ping Wang, (2012). Optimal Admission Control Policy for Mobile Cloud Computing Hotspot with Cloudlet. Available: http://www.mobile.ecs.soton.ac.uk/home/conference/wcnc2012/papers/p3177dinh.pdf [106] Robert C. White Jr., (2010). Cloud Computing: Advantages and Disadvantages. Available: http://boardroombrief.com/2010/08/cloud-computing-advantages-anddisadvantages/ [107] Gartner Research, (2010). Mobile Access. Available: http://www.alto-it.net/applications/mobile-access/ [108] Hassan Takabi, James b.d. Joshi and Gail-Joon ahn, (2010). Security and Privacy Challenges in Cloud Computing Environments. Co published By The IEEE Computer And Reliability Societies. Available: http://ldc.usb.ve/~figueira/cursos/Seguridad/Material/W_SP_SecurityPrivacyChal lenges.pdf
Chapter 7 Bibliography 252 [109] Wayne Jansen, Timothy Grance, (2011). NIST Guidelines on Security and Privacy in Public Cloud Computing. Available: http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloudcomputing.pdf [110] ACS Data Recovery. Data Recovery Definitions. Available: http://keppanet.netfirms.com/keppanet/ictbook1/bictword.htm [111] CPNI, (2010). Information Security Briefing: Cloud Computing. Available:http://www.cpni.gov.uk/Documents/Publications/2010/2010007ISB_cloud_computing.pdf [112] Louis Hayner, Telecom Reseller UCNetworks, (2011). Lack of Standards in the Cloud. Available: http://www.telecomreseller.com/2011/06/22/lack-of-standards-in-the-cloud/ [113] Vivek Kundra, U.S. Chief Information Office (2011). Federal Cloud Computing Strategy. Available: http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf [114] Dialogic Corporation, (2010). Introduction to Cloud Computing. Available: http://www.dialogic.com/Solutions/Cloud-Communications/Build/~/media/ products/docs/whitepapers/12023-cloud-computing-wp.pdf [115] Jonathan Adams, (2010). Cloudy with a chance of...mainframes? (Part 2). Available:https://communities.bmc.com/communities/community/bmcdn/bmc_m ainframe/blog/tags/data_governance [116] Leslie Willcocks, Will Venters and Edgar A. Whitley. Accenture: Challenges of cloud computing. Available: http://www.accenture.com/us-en/outlook/Pages/outlook-online-2011-challengescloud-computing.aspx [117] Amazon Web Services, (2011). Amazon Web Services: Risk and Compliance. Available:http://d36cz9buwru1tt.cloudfront.net/pdf/aws-risk-and-compliancewhitepaper.pdf [118] BeyondTrust Software, Inc. (2010). Securing Privilege Delegation - Cloud Computing Infrastructure. Available: http://www.vmware.com/appliances/directory/uploaded_files/va/10/12/07/WP043 _Cloud_Computing.pdf [119] Oracle, (2010). Oracle Cloud Computing. Available: http://www.oracle.com/us/technologies/cloud/oracle-cloud-computing-wp076373.pdf
Chapter 7 Bibliography 253 [120] Accenture, (2010). Cloud Computing and Sustainability: The Environmental Benefits of Moving to the Cloud. Available: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Sustainabili ty_Cloud_Computing_TheEnvironmentalBenefitsofMovingtotheCloud.pdf [121] Manjrasoft, (2010). Aneka Dynamic Provisioning. Available: http://www.manjrasoft.com/download/2.0/AnekaDynamicProvisioning.pdf [122] Jing Bi1,Zhiliang Zhul, Ruixiong Tian, Qingbo Wang, (2010). Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center. IEEE 3rd International Conference on Cloud Computing. Available: http://160.80.85.34/courses/MMI/dynamicProvMod.pdf [123] Cloud Web Hosting Providers. Characteristics of Cloud Computing. Available: http://cloudwebhostingproviders.com/cloud-computing-characteristics/ [124] Ebiz, (2010). Who Meters the Cloud? Available: http://www.ebizq.net/topics/cloud_computing/features/12250.html [125] wikipedia. Cloud communications. Available: http://en.wikipedia.org/wiki/Cloud_communications [126] Linkhead. Cloud Communications. Available: http://en.linkhead.com/_d271714402.htm [127] Opencdx (2011). Cloud Computing and Software as a Service Overview. http://opencdx.org/wp-content/uploads/2011/07/CloudComputing.pdf [128] Java Community Process (JCP), (2011). Community development of java technology specifications. Available: http://jcp.org/en/jsr/detail?id=309 [129] ORACLE. Accelerating Multimedia Application Development with JSR 309 Media Server Control API. Available: http://www.oracle.com/technetwork/articles/communications/ericson-jsr309084430.html [130] Piotr K. Tysowski , M. Anwarul Hasan. Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems. Available: http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011-33.pdf [131] Amazon Web Services, (2011). Eclipse and AWS. Available: http://aws.amazon.com/solutions/global-solution-providers/eclipse-aws/ [132] Vishwak, (2011). Amazon Web Services - Amazon AWS Developments. Available: http://www.vishwak.com/technologies/amazon-web-services [133] Amazon Web Services, (2011). Amazon simple storage service.
Chapter 7 Bibliography 254 Available: http://aws.amazon.com/s3/ [134] Red Hat Reference Architecture Series, (2008). Getting Started with Cloud Computing: Amazon EC2 on Red Hat Enterprise Linux. Available: http://www.redhat.com/f/pdf/Getting_Started_with_Cloud_Computing_Amazon_ EC2_on_Red_Hat_Enterprise_Linux.pdf [135] Jason. (2011). BizCloud Review of Amazon Web Services. Available: http://bizcloudnetwork.com/bizcloud-review-of-amazon-webservices#13557621123171&40929::resize_frame|0-0 [136] Educause, (2008). 7 things you should know about Google Apps. Available: http://net.educause.edu/ir/library/pdf/ELI7035.pdf [137] Google Apps for Business, (2011). Top ten advantages of Google's cloud. Available: http://www.google.com/apps/intl/en/business/cloud.html [138] David Chappell, (2009). Introducing Windows Azure. Available: http://www.davidchappell.com/writing/white_papers/Introducing_Windows_Azur e_v1-Chappell.pdf [139] S.Sharmili Priyadarsini. Windows Azure: A case study on the cloud operating system by Microsoft Corporation. Available: http://www.indiastudychannel.com/attachments/Resources/118414-26826Windows-azure.pdf [140] Windows Azure, (2010). Windows Azure: Fabric Controller. Available: http://www.azurepilot.com/page/Windows+Azure%3A+Fabric+Controller [141] Vmware, (2009).The VMware vCloud Solution. Available: http://www.vmware.com/files/pdf/VMware-VCLOUD-SB-EN.pdf [142] Rightscale, (2011). Vmware. Available: http://www.rightscale.com/partners/infrastructures/vmware-vcloud.php [143] Salesforce, (2011). Salesforce CRM Industry Solutions. Available: http://www.salesforce.com/industries/ [144] Bill Murphy, Phil Spalding. (2009). The sales cloud. Available:http://www.salesforce.com/ap/assets/pdf/cloudforce/SalesCloudTheSalesCloud.pdf [145] IBM, (2009). IBM Delivers Down to Earth Cloud Computing. Available: http://www=03.ibm.com/innovation/us/smarterplanet/global/pdfs/Mainstream_Cl oud_Computing.pdf
Chapter 7 Bibliography 255 [146] Jonathan Adams, (2010). IBM and Cloud Computing. https://communities.bmc.com/communities/community/bmcdn/bmc_mainframe/b log/tags/infrastructure_as_a_service [147] Joyent, (2011). Joyent and m2mi to Provide Network Automation and M2M Services. Available:http://www.joyent.com/2011/02/joyent-and-m2mi-to-providenetwork-automation-and-m2m-services/ [148] Joyent, (2011). Services. Available: http://www.joyent.com/services/ [149] Zach Nelson, (2011),Cloud Computing : The next and last technology architecture. Available: http://www.netsuite.com/portal/aboutus.shtml [150] The Financial Express, (2010). Cloud computing in the public sector. Available: http://www.financialexpress.com/news/cloud-computing-in-the-publicsector/691979/ [151] CtoForum, (2009). Cloud Computing and E-Governance. Available: http://www.thectoforum.com/content/cloud-computing-and-e-governance [152] Shailendra C. Jain Palvia1, and Sushil S. Sharma (2007). Definitions/Domain framework and status around the world. Computer society of India. Available: http://www.csi-sigegov.org/1/1_369.pdf [153] Hisham Alsaghier, Marilyn Ford, Anne Nguyen and Rene Hexel, (2009). Conceptualizing citizen‘s trust in e-government: Application of Q methodology. Electronic journal of e-government volume 7 issue 4. Available: www.ejeg.com/issue/download.html?idIssue=21 [154] Darren Mundy and Bandi Musa, (2010). Towards a Framework for eGovernment Development in Nigeria. Electronic journal of e-government volume 8 issue 2. Available: www.ejeg.com/issue/download.html?idArticle=205 [155] Pramila Devi, (2008). E-governance for small and medium enterprise in a developing country like Fiji : Potentials and problems 239. Available: http://www.csi-sigegov.org/critical_pdf/26_235-241.pdf [156] Nag Yeon Lee, (2010). United Nations Asian and Pacific Training Centre for Information and Communication Technology for Development (APCICT). Available:http://www.unapcict.org/news/aboutus/programmes/research/BriefingN ote-3-web.pdf [157] Zhiyuan Fang, (2002). E-Government in Digital Era: Concept, Practice, and Development. International Journal of the Computer, the Internet and Management, Vol. 10, No.2. Available: citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.9080.pdf
Chapter 7 Bibliography 256 [158] APCICT (Unit ed Nations Asian and Pacific Training Centre for Information and Communication Technology for Development), (2010). E-Government pplications. Available: http://www.unapcict.org/ecohub/briefing-noteseries/BN3.pdf [159] Inas E. Ezz, Marinos Themistocleous, (2005). Investigating the Barriers to G2G Adoption. eGovernment Workshop ’05 (eGOV05), September 13 2005, Brunel University, West London UB8 3PH, UK. Available: http://www.iseing.org/egov/eGOV05/Source%20Files/Papers/CameraReady-43P.pdf [160] IIIT, Hyderabad, White Paper, (2010). Cloud Computing for E-Governance. Available: http://search.iiit.ac.in/uploads/CloudComputingForEGovernance.pdf [161] USA E-Government Strategy, (2002). Implementing the President‘s Management Agenda for E-Government. Available: http://www.usa.gov/Topics/Includes/Reference/egov_strategy.pdf [162] Accenture, (2009). From e-Government to e-Governance: Using new technologies to strengthen relationships with citizens. Available: http://www.majorcities.eu/generaldocuments/pdf/accenture_from_egovernment_t o_egovernance.pdf [163] ReddyRaja A, Imaginea and Vasudeva Varma, (2010). Cloud and E-Governance. Available: http://www.imaginea.com/docstore/wp-imgcloud_egovernance.pdf [164] Ashish Rastogi, (2010). A Model based Approach to Implement Cloud Computing in E-Governance. International Journal of Computer Applications, Volume 9– No.7. Available: http://www.ijcaonline.org/volume9/number7/pxc3871888.pdf [165] thesmallbusiness.org, (2011). Small Business Cloud Computing. Available: http://www.thesmallbusiness.org/software/benefits-of-cloud-computing.html [166] Cloudsigma, (2011). Advantages of the Cloud. Available: http://cloudsigma.com/en/cloud-computing/advantages-of-cloud-computing [167] Andreas Haeberlen, (2009). A Case for the Accountable Cloud. Available: http://www.cis.upenn.edu/~ahae/papers/accountable-cloud-ladis09.pdf [168] Bill.com. Cloud Computing: Benefits for Small Businesses. Available: http://www.bill.com/learning-center/cloud-computing-small-business.php [169] Tata Communications, (2011). Moving from Legacy Systems to Cloud Computing. Available:http://www.tatacommunications.com/downloads/whitepapers/Tata_Co mmunications_CloudCompuing_WhitePaper_v2.0-web.pdf
Chapter 7 Bibliography 257
[170] NIST, (2011). Technical consideration for USG Cloud computing development decisions. Available:http://www.nist.gov/itl/cloud/upload/NIST_cloud_roadmap_VIII_draft _110111-v3_rbb.pdf [171] Cert-in. Types of e-governance service delivery models and applications. Available: www.cert-in.org.in/Downloader?pageid...fileName=CIPS-20110024[1].pdf [172] Base One International Corporation, (2011). Database Scalability. Available: http://www.boic.com/scalability.htm [173]
Wikipedia, (2011). Information technology security audit. Available: http://en.wikipedia.org/wiki/Information_technology_security_audit
[174] James on Software, (2010). What does "scalable database" mean ? Available: http://jamesgolick.com/2010/3 [175] Ashish Tikhe, (2011). Scalability of e-Governance projects & cloud computing. Available:http://ashishtikhe.wordpress.com/2011/02/26/scalability-of-egovernance-projects-cloud-computing/ [176] Aprna Tripathi, Bhawana Parihar, (2011). E-Governance Challenges and Cloud Benefits. Available:http://www.visualsoftindia.com/CSIT/Issue/2011_3_March/4_Aprna_T ripathi_Review_Article_Mar_2011.pdf [177] Solace Systems, (2011). Cloud / Internet. Available: http://solacesystems.com/solutions/cloud-and-internet/ [178] Business Link. Cloud computing. Available:http://www.businesslink.gov.uk/bdotg/action/detail?itemId=108468824 1&type=RESOURCES [179] Riverbed, (2011). Federal Data Center Consolidation. Available:http://www.riverbed.com/assets/media/documents/briefs/SolutionBriefRiverbed-FDCCI.pdf [180] Kun Wang, Lihua Zhou, Zhen Cai, Zengxin Li, (2005). "A Disaster Recovery System Model in an E-government System,". pdcat, pp.247-250, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). Available: http://www.computer.org/portal/web/csdl/doi/10.1109/PDCAT.2005.6
Chapter 7 Bibliography 258 [181] U.S. Department of Homeland Security. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers. Available:www.info.apps.gov/sites/.../Cloud_Computing_Security_Perspective.d oc [182] Courtney Behrens, (2011). Cloud Computing: Operational and Strategic Benefits. Available: http://www.datacenterpost.com/2011/03/cloud-computing-operationaland.html [183] Cio, (2010). Data Center Consolidation Initiative: Agency Consolidation Plan Template. Available: www.cio.gov/documents/Data-Center-Consolidation-Plan.doc [184] CSA (Cloud Security Alliance), (2011). Data Center Operations. Available:https://wiki.cloudsecurityalliance.org/guidance/index.php/Data_Center _Operations [185] Performance. (2012). Using Technology to Drive Productivity Gains. Available: http://technology.performance.gov/ [186] CIO Council. (2012). Creating Effective Cloud Computing Contracts for the Federal Government. Available: https://cio.gov/wpcontent/uploads/downloads/2012/09/cloudbestpractices.pdf [187] Stephen Delahunty. (2012). Federal Cloud Computing Survey. Available:http://reports.informationweek.com/abstract/104/9047/government /research-federal-cloud-computing-survey.html [188] GSA info.app.gov. Federal Cloud Computing Case Studies. Available: http://www.info.apps.gov/content/federal-cloud-computing-casestudies [189] Margaret Rouse. (2012). G-Cloud (Government Cloud) Available: http://searchcloudcomputing.techtarget.com/definition/G-cloudgovernment-cloud [190] G-Cloud Short Guide V001. G-Cloud ‗Simple‘ Procurement Instructions. Available: http://gcloud.civilservice.gov.uk/files/2012/01/G-Cloud-shortguide-V003-1.pdf [191] Australian Government Department of Finance and Deregulation. Australian Government Data Center Strategy 2010-2025. Available: http://www.finance.gov.au/egovernment/infrastructure/australian-government-data-centre-strategy.html [192] Australian Government. (2011). Cloud Computing Strategic Direction Paper.
Chapter 7 Bibliography 259 Available: http://www.finance.gov.au/e-government/strategy-andgovernance/docs/final_cloud_computing_strategy_version_1.pdf [193] Defence Signals Directorate (DSD). (2012). Cloud Computing Security Considerations. Available: http://www.dsd.gov.au/infosec/cloud/cloud03.htm [194] Yutaka Sasaki. (2010). Best Practices for Cloud Computing Security, CSA Japan Chapter Available: http://www.cloudsecurityalliance.jp/sasaki.pdf [195] Canada Cloud Network. Government Cloud Computing. Available: http://canadacloud.net/roadmap/g-cloud/ [196] Arun Chandrasekaran & Mayank Kapoor. (2011). State of Cloud Computing in the Public Sector – A Strategic analysis of the business case and overview of initiatives across Asia Pacific. Available: www.frost.com/prod/servlet/cio/232651119 [197] Business Monitor International. (1012). South Korea Information Technology Report Q4 2012. Available: http://www.marketresearch.com/Business-Monitor-Internationalv304/South-Korea-Information-Technology-Q4-7176149/ [198] isaca, (2011). Proposed Security Assessment & Authorization for U.S. Government Cloud Computing. Available: http://www.isaca.org/Groups/Professional-English/cloudcomputing/GroupDocuments/Executive-Summary.pdf [199] NetApp, (2011). Secure Multi-Tenancy for Cloud Architecture with NetApp, Cisco, and VMware. Available: http://www.netapp.com/in/technology/secure-multi-tenancy.html [200] Infosecurity, (2010). Federal government is rushing to cloud without security knowledge. Available: http://www.infosecurity-magazine.com/view/13469/federalgovernment-is-rushing-to-cloud-without-security-knowledge/ [201] John George, VERGENT, (2010). Private Clouds: Security and Confidence in the Federal Sector. Available: http://www.vangent.com/Uploads/wp/Vangent_Private_Clouds.pdf [202] Trusted Computing Group, (2010). Cloud Computing and Security – A Natural Match. Available:http://www.trustedcomputinggroup.org/files/resource_files/1F4DEE3D -1A4B-B294-
Chapter 7 Bibliography 260 D0AD0742BA449E07/Cloud%20Computing%20and%20Security%20Whitepape r_July29.2010.pdf [203] KarRox, (2010). Cloud Computing Security Issues: In some way, ―Cloud Computing Security‖ is no different then ―Regular security‖. Available: http://www.slideshare.net/DiscoverCloud/cloud-computing-securityissues [204] Thomas J. Trappler, (2011). Why physical security matters, even in the cloud. Available:http://www.computerworld.com/s/article/358043/Why_physical_securit y_matters_even_in_the_cloud [205] AWS (Amazon Web Services), (2008). Overview of Security Processes. Available: http://aws.amazon.com/articles/1697 [206] Peter Schoo, Volker Fusenig, Victor Souza, M´arcio Melo, Paul Murray, (2010). Challenges for Cloud Networking Security. Available: http://www.hpl.hp.com/techreports/2010/HPL-2010-137.pdf [207] John Harauz, Lori M . Kaufman, Bruce Potter, (2009). Data Security in the World of Cloud Computing. Available: http://www.idi.ntnu.no/emner/tdt60/papers/05189563.pdf [208] Rutrell Yasin, (2011). GCN (Government Cloud News): How to secure data in cloud? Stick with it like glue. Available: http://gcn.com/articles/2011/07/18/cloud-data-rights-main.aspx [209] Anu Gopalakrishnan, (2009). Cloud Computing Identity Management. SETLabs Briefings VOL 7 NO 7. Available: http://www.infosys.com/infosys-labs/publications/setlabsbriefings/Documents/cloud-computing-identity-management.pdf [210] Roger Halbheer, Doug Cavit, (2010). Cloud Computing Security Considerations. Available:download.microsoft.com/.../CloudComputingSecurityConsiderations.pd f [211] Sumner Blount, Merritt Maxim, (2010). The Role of Identity and Access Management in Achieving Continuous Compliance. Available: http://image.lifeservant.com/siteuploadfiles/VSYM/99B5C5E7-8B464D14-A53EB8FD1CEEB2BC/4B15868C-C29A-8FCE-4991BD477928D7EE.pdf [212] CA Transforming IT Management, (2009). Simplify and Secure: Managing User Identities Throughout their Lifecycles. Available: http://www.pinnacle-international.com/pdf/1553-identlifecyclemgmtpfb-final_180617.pdf
Chapter 7 Bibliography 261 [213] Christian A. Christiansen, Charles J. Kolodgy, Sally Hudson, Gerry Pintal, (2010). IDC Analyze the future, WHITE PAPER Identity and Access Management for Approaching Clouds. Available:https://community.jivesoftware.com/...1.../cloud_security_wp_236234, pdf [214] Techtarget,, (1999). Definition: authorization, Available: http://searchsoftwarequality.techtarget.com/definition/authorization [215] AkiNiemi, (2002). Authentication, Authorization and Accounting in Session Initiation Protocol Networks. Available: http://www.tml.tkk.fi/Publications/Thesis/niemi.pdf [216] Perry Bryden, Daniel C. Kirkpatrick, Farideh Moghadami, (2009). Security Authorization: An approach for community cloud computing environments. Available: http://www.homelandcouncil.org/pdfs/digital_library_pdfs/securityauthorization-an-approach-for-cces.pdf [217] Sysec, (2010). Security in the Cloud. Available: http://www.sysec.co.uk/Sysec%20%20Security%20in%20the%20Cloud%20-%20October%202010.pdf [218] Martijn Oostdijk, Bob Hulsebosch, Niels van Dijk, Roland van Rijswijk, Hans Zandbelt, Surf Net, (2010), Provisioning scenarios in identity federations. Available:http://www.surfnet.nl/nl/Innovatieprogramma's/gigaport3/Documents/E DS-4%20Provisioning%20Scenarios%20in%20Federations%20Final.pdf [219] CSA (Cloud Security Alliance), (2010). Domain 12: Guidance for Identity & Access Management V2.1 Available: https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf [220] Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, and Min Wu, (2010), Privacy Preserving Search of Multimedia. Available:http://www.ece.umd.edu/~minwu/public_paper/Jnl/1004secureSearch_ preprint.pdf [221] Ming Li, ShuchengYu, KuiRen, and Wenjing Lou, (2010). Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. Available: http://ece.wpi.edu/~mingli/papers/Li_SecureComm10.pdf [222] Microsoft, (2011). HealthVault. Available: http://www.microsoft.com/en-us/healthvault/ [223] Tech Target. Encryption key management,
Chapter 7 Bibliography 262 Available: http://searchdatabackup.techtarget.com/definition/encryption-keymanagement [224] Elaine Barker, William Barker, William Burr, William Polk, and Miles, NIST, (2011). Computer Security. Available: http://csrc.nist.gov/publications/drafts/800-57/Draft_SP800-57-Part1Rev3_May2011.pdf [225] Cryptography World. Key Management. Available: http://www.cryptographyworld.com/key.htm [226] Tolga Acar, Mira Belenkiy, Carl Ellison, Lan Nguyen. Key Management in Distributed System. Available:http://research.microsoft.com/pubs/132506/Distributed%20Key%20Lif ecycle%20Management.pdf [227] Parliament office of science and technology U.K., (2006). Data Encryption. Available: http://www.parliament.uk/documents/post/postpn270.pdf [228]
IBM. (2011). Security and high availability in cloud computing environments. Available: http://www935.ibm.com/services/za/gts/cloud/Security_and_high_availability_in_cloud_com puting_environments.pdf
[229] ENISA. (2009). Cloud Computing: Information Assurance Framework. Available: www.enisa.europa.eu/act/rm/files/deliverables/cloud.../fullReport [230] Bloomberg. (2011). Ceelox Press Release - Ceelox Provides Solution to Thwart Recent Rash of Cyber criminals. Available:http://webfarm.bloomberg.com/apps/news?pid=20670001&sid=aJRzX zfjx2hg [231] Home Land Security Wire. (2011). Ceelox unveils fingerprint for cloud networks. Available: http://www.homelandsecuritynewswire.com/ceelox-unveilsfingerprint-authentication-cloud-networks [232] Marcia Savage. (2011). Cloud Application Security Issues and Considerations. Available: http://searchcloudsecurity.techtarget.com/news/2240034925/Cloudapplication-security-issues-and-considerations [233] Veracode. (2008). Verizon Business Has a New Report on Data Breaches. Available: http://www.veracode.com/blog/2008/06/verizon-business-has-a-newreport-on-data-breaches/ [234] Microsoft. (2009). Securing Microsoft‘s Cloud Infrastructure. Available: https://cloudsecurityalliance.org/securing-the-MS-Cloud.pdf
Chapter 7 Bibliography 263 [235] Trend Micro. (2011). Virtualization and cloud computing. Available:http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchan danalysis/final_cloud_virt_best_practice.pdf [236] PCI. (2011). Information Supplement: PCI DSS Virtualization Guidelines. Available:https://www.pcisecuritystandards.org/documents/Virtualization_InfoSu pp_v2.pdf [237] CIOL. (2010). White Paper: Cloud Computing and Security - A Natural Match.. Available: http://www.ciol.com/Infrastructure-Security/Case-Studies/WhitePapers/Cloud-Computing-and-Security-A-Natural-Match/139002/1/ [238] Vic (J.R.) Winkler. (2011). Securing the cloud: Cloud computing security techniques and tactics. Available:http://my.safaribooksonline.com/book/-/9781597495929/chapter-3dotsecurity-concerns-risk-issues-and-legal-aspects/legal_and_regulatory_issues. [239] wikipedia. Vendor lock-in. Available: http://en.wikipedia.org/wiki/Vendor_lock-in [240] ITSM Portal. (2010). Vendor Lock-In and Cloud Computing. Available: http://www.itsmportal.com/columns/vendor-lock-and-cloud-computing [241] Olafur Ingthorsson. (2010). Avoiding cloud computing lock-in. Available: http://cloudcomputingtopics.com/2010/10/avoiding-cloud-computing-lock-in/ [242] JISC Legal Information. Copyright and Intellectual Property Law. Available: http://www.jisclegal.ac.uk/LegalAreas/CopyrightIPR.aspx [243] Intellectual Property Protection in China. (2011). The revision of copyright law facing challenges in cloud computing era. Available:http://www.chinaipr.gov.cn/lawsarticle/laws/lawsar/copyright/201105/1 225423_1.html [244] Minamur Chowdhury. (2009). Cloud Computing: Facts, Security & Legal Challenges. Available: http://www.aipath.com/mchowdhury_law447b.pdf [245] Kaiqi Xiong and Harry Perros. Service Performance and Analysis in Cloud Computing. Available: http://www4.ncsu.edu/~hp/Kaiqi10.pdf [246] Judith Hurwitz. The Journey to Cloud Computing: from experimentation to business reality.
Chapter 7 Bibliography 264 Available: http://www03.ibm.com/systems/data/flash/smartercomputing/pdf/Journey_to_Cloud_Comput ing_-_from_experimentation_to_business_reality.pdf [247] Lee Badger, Tim Grance, Robert Patt-Corner, Jeff Voas. (2011). Draft Cloud Computing Synopsis And Recommendations. Available: http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800146.pdf [248] Wayne Jansen, Timothy Grance. (2011). Guidelines on Security and Privacy in Public Cloud Computing. Available: http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800144_cloud-computing.pdf [249] Stephen Allen. (2011). Cloud Computing and Health Care Security. Available: http://cloudexpo.ulitzer.com/node/1796151 [250] Pradnyesh Rane. (2010). Securing SaaS Applications: A Cloud Security Perspective for Application Providers. Available:http://www.infosectoday.com/Articles/Securing_SaaS_Applications.ht m [251] Eran Farajun. (2011). Cloud Computing Backup? Five Key Questions. Available:http://www.wwpi.com/index.php?option=com_content&view=article& catid=99:cover-story&id=8400:cloud-computing-backup-five-keyquestions&Itemid=2701018 [252] Craig Balding. (2011). Assessing the Security Benefits of Cloud Computing. Available: http://cloudsecurity.org/blog/2008/07/21/assessing-the-securitybenefits-of-cloud-computing.html [253] Dan Griffin and Tom Jones. (2011). Cloud Security: Safely Sharing IT Solutions. Available: http://technet.microsoft.com/en-us/magazine/gg296364.aspx [254] Microsoft Corp. (2010). Security in Cloud Computing: A Microsoft Perspective. Available: download.microsoft.com/.../SecurityInCloudComputingOverview.pdf [255] CSA (Cloud Security Alliance). (2011). Incident Response, Notification, and Remediation. Available:https://wiki.cloudsecurityalliance.org/guidance/index.php/Incident_Res ponse,_Notification,_and_Remediation [256] CSA (Cloud Security Alliance). (2009). Security Guidance for Critical Areas of Focus in Cloud Computing. Available: https://cloudsecurityalliance.org/guidance/csaguide.v1.0.pdf
Chapter 7 Bibliography 265 [257] Chrisarmer. Cloud Security Explained. Available: http://chrisarmer.hubpages.com/hub/Cloud-Security-Explained [258] Traian Andrei. Cloud Computing Challenges and Related Security Issues. Available: http://www.cs.wustl.edu/~jain/cse57109/ftp/cloud/index.html#security_benefits [259] CISCO White Paper. Virtualized Multi-Tenant Data Center Solution for Infrastructure-as-a Service. Available:http://www.cisco.com/en/US/solutions/collateral/ns340/ns517/ns224/ns 836/white_paper_c11-604559.pdf [260] Dark Reading. (2011). Chunghwa Telecom Tests Cloud Security with Spirent. Available: http://www.darkreading.com/cloudsecurity/167901092/security/news/231001444/chunghwa-telecom-tests-cloudsecurity-with-spirent.html [261] Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma. (2010). Towards Analyzing Data Security Risks in Cloud Computing Environments. Available: http://search.iiit.ac.in/uploads/cloud-security.pdf [262] Todd R. Weiss. (2011). Cloud Security: Will Your Business Data Be Safe In the Cloud? Available:http://www.cio.com/article/686386/Cloud_Security_Will_Your_Busine ss_Data_Be_Safe_In_the_Cloud_ [263] Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou. Ensuring Data Storage Security in Cloud Computing. Available: http://www.ece.iit.edu/~ubisec/IWQoS09.pdf [264] wikipedia. (2011). Cloud computing security. Available: http://en.wikipedia.org/wiki/Cloud_computing_security [265] RSA: Te security division of EMC. (2009). The Role of Security in Trustworthy Cloud Computing. Available: http://www.emc.com/collateral/about/investorrelations/9921_CLOUD_WP_0209_lowres.pdf [266] SafeNet. (2011). A Security Practitioner‘s Guide to the Cloud. Available:https://s3.amazonaws.com/aws001/guided_trek/Security_Practitioners_ Guide_WP_(EN)_web.pdf [267] Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit. (2009). Cloud Security Issues. IEEE International Conference on Services Computing. Available:http://org.ntnu.no/cloudsecurity/thesis/IaaS/Cloud%20Security%20Issu es.pdf
Chapter 7 Bibliography 266
[268] JUCC. Cloud Computing. Available: http://www.istf.jucc.edu.hk/newsletter/IT_03/IT3_Cloud_Computing.pdf [269] Jnan Dash, Winston Damarillo, Roger Strukhoff, Maureen O'Gara, Elizabeth White. (2011). A Better Path Toward Legacy Integration with the Cloud. Available: http://cloudcomputing.sys-con.com/node/1880221/ [270] Cwjobs. (2011). 10 things to know about system integration. Available: http://www.cwjobs.co.uk/careers-advice/it-glossary/10-things-toknow-about-system-integration [271] Maria Spínola. (2011). An Essential Guide to Possibilities and Risks of Cloud Computing. Available:http://www.gtsi.com/eblast/corporate/cn/09_09_2009/PDFs/Essential% 20Guide%20for%20Cloud%20Computing.pdf [272] Accenture. (2011). Navigating the Cloud with Accenture. Available:http://www.accenture.com/SiteCollectionDocuments/PDF/Navigating_t he_Cloud_with_Accenture.pdf [273] B. Kumar, J.C.P. Cheng. Cloud Computing and its Implications for Construction IT. Available: http://eil.stanford.edu/publications/jack_cheng/icccbe10_cloud_final.pdf [274] IBM. (2011). New to cloud computing? Available: http://www.ibm.com/developerworks/cloud/newto.html [275] Robin Bloor. Moving to the cloud with pervasive PSQL. Available:http://pervasivedb.com/SiteCollectionDocuments/WP_Bloor_Moving_t o_the_Cloud_with_PSQL_Dec2011.pdf [276] mhprofessional. Chapter 1: Cloud Computing Basics. Available:http://www.mhprofessional.com/downloads/products/0071626948/0071 626948_chap01.pdf [277] CloudPassage Press Release, (2011), CloudPassage named finalist in UP-SART 2011 Cloud Awards. Available: http://www.cloudpassage.com/press-releases/2011-11-30_Upstart.html [278] Cloud Security Features, CloudPassage Halo is your security command center for securing your cloud servers – any cloud provider, any hypervisor, any time. Available: http://www.cloudpassage.com/features/ [279] HighCloud Security, (2012).
Chapter 7 Bibliography 267 Available: http://www.highcloudsecurity.com/company/ [280] HighCloud Security, (2012). Product Overview. Available: http://www.highcloudsecurity.com/products/product-overview/ [281] Acronis, (2012). Available: http://www.acronis.com/company/ [282] Acronis, (2012). Products Catalogue. Available: http://www.acronis.com/products [283] Mcafee, (2012). Mcafee Cloud Security Platform. Available: http://www.mcafee.com/in/resources/solution-briefs/sb-cloud-securityplatform.pdf [284] Dome9 Security, (2012). Cloud Security as Elastic as Your Cloud Infrastructure. Available: http://www.dome9.com/overview/system-architecture [285] VMware Bluelock. (2011). Security in the Hybrid Cloud: Putting Rumors to Rest. Available: www.frost.com/prod/servlet/cpo/272112250 [286] Mikkilineni, R. & Sarathy, V. (2009). Cloud Computing and the Lessons from the Past. In 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. Ieee, pp. 57-62. Retrieved February 8, 2011, Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5159214 [287] Goyal, P., &Mikkilineni, R. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation & Management. 2009 IEEE International Conference on Cloud Computing, Jan.2009. [288] Tsai, W., Z. Jin and X. Bai. (2009). Internetware Computing: Issues and Perspective. Available: http://www.ijsi.org/IJSI/ch/reader/downloadpdf.aspx?file-no=415. Varia, J., 2010. Architecting. [289]
Judith Hurwitz, Marcia Kaufman, Fern Halper, and Dan Kirsch. (2012). Hybrid Cloud for Dummies: How to Ensure Data Security and Privacy in Hybrid Cloud. Available: http://www.dummies.com/how-to/content/how-to-ensure-datasecurity-and-privacy-in-a-hybri.html
[290] Wikipedia. (2009). Virtual Private Network. Available: http://en.wikipedia.org/wiki/Virtual_private_network [291] NIST Computer Security Handbook. Identification and Authentication. Available:http://www.sos.cs.ru.nl/applications/courses/security2008/nistiadraft.pd f
Chapter 7 Bibliography 268
[292] Charles J. Kolodgy. (2003). White Paper: Identity Management in a Virtual World. Available:http://www.securitymanagement.com/archive/library/Identity_manage ment1003.pdf [293] Seth Thigpen. Authentication Methods Used for Banking. Available:http://www.infosecwriters.com/text_resources/pdf/Authentication_Met hods_For_Banking.pdf [294] Tech Target. (2009). Definition: knowledge-based authentication (KBA). Available: http://searchsecurity.techtarget.com/definition/knowledge-basedauthentication [295] Swivel. (2012). White Paper: Swivel Multi-Factor Authentication and PINsafe Available: http://www.swivelsecure.com/wp-content/uploads/2012/09/1207-WPSwivel-Multifactor-Authentication.pdf [296] Wikipedia. (2005). Personal identification number. Available: http://en.wikipedia.org/wiki/Personal_identification_number [297] Diy Alarm Forum. (2006). Glossary of alarm related terms. Available: http://www.diyalarmforum.com/diy-alarm-glossary/glossary.pdf [298] De Angeli A., Coventry L., Johnson G., Renaud K., (2005). Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies, Volume 63, Issue 1-2, July 2005, Pages 128-152. Available: http://www.sciencedirect.com/science/article/pii/S1071581905000704 [299] Trevor Pering, Murali Sundar, John Light, Roy Want. (2003). Photographic Authentication through Untrusted Terminals. Available:http://www.computer.org/portal/web/csdl/doi/10.1109/MPRV.2003.118 6723 [300] Seminarsonly.com. Graphical Password Authentication Advantages and Disadvantages. Available: http://www.seminarsonly.com/Labels/Graphical-PasswordAuthentication-Advantages-and-Disadvantages.php [301] Reid Cushman. Primer: Authentication of identity. Available:http://www.projecthealthdesign.org/media/file/primer_authentication.p df [302] The Free Library. (2009). Swipe Card. Available: http://www.thefreedictionary.com/swipe+card
Chapter 7 Bibliography 269
[303] Daniel Ramsbrock, Stepan Moskovchenko, Christopher Conroy. Magnetic Swipe Card System Security. A case study of the University of Maryland, College Park. Available: http://www.cs.umd.edu/Honors/reports/magcard.pdf [304] RICOH. (2009). Card Authentication Package. Available: https://ricoh.co.in/solutions/brochures/CAP.pdf [305] Wikipedia. (2009). Proximity card. Available: http://en.wikipedia.org/wiki/Proximity_card [306] Rick Perera. (2002). USB Tokens Offer Pocket-Sized Security. Available:http://www.pcworld.com/article/89263/usb_tokens_offer_pocketsized_ security.html [307] Smart Card Alliance. Smart Card Industry Glossary. Available: http://www.smartcardalliance.org/pages/smart-cards-intro-glossary [308] Safe Net, (1999). Personal Authentication and the PKI Security Process – Benefits of the iKey. Available:http://epi.nasscom.in/Nasscom//download/PersonalAuthentication_PKI. pdf [309] Wikipedia. (2011). One-time password. Available: http://en.wikipedia.org/wiki/One-time_password [310] Gpayments. (2006). Two-Factor Authentication: An essential guide in the fight against Internet fraud. Available: http://www.gpayments.com/pdfs/WHITEPAPER_2FAFighting_Internet_Fraud.pdf [311] AT&T and Lumeta Corporation. (1994). Authentication. Available: http://66.14.166.45/whitepapers/firewalls/fis/Chapter%205.pdf
[312] Rania Abdelhameed, Sabira Khatun, Borhanuddin Mohd Ali and Abdul Rahman Ramli. (2005), Application of Cell-phonein Laptop Security, Journal of Applied Sciences 5 (2): 215-219, 2005, ISSN 1812-5654. [313] Anthony J. Nicholson, Mark D. Corner, and Brian D. Noble, (2006), Mobile Device Security Using Transient Authentication, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 11. [314] Hardayal Singh Shekhawat, (2012), Mobile Cloud Computing Security Using Traisient Authentication System. Journal of Information Knowledge and Research
Chapter 7 Bibliography 270 in Information Technology. ISSN: 0975 – 6698| NOV 11 TO OCT 12 | VOLUME – 02, ISSUE – 01. [315] Christopher Mallow. Authentication Methods and Techniques. Available: http://www.giac.org/cissp-papers/2.pdf [316] Pbworks. (2007). Authentication technologies. Available:http://biometrics.pbworks.com/w/page/14811351/Authentication%20te chnologies [317] Lawrence O’Gorman. (1998). “Overview of fingerprint verification technologies”. Elsevier Information Security Technical Report, Vol. 3, No. 1, 1998. Available: http://scgwww.epfl.ch/courses/notes/2%20Fingerprints.pdf [318] Wise Geek. What Are the Advantages of Fingerprint Identification? Available: http://www.wisegeek.com/what-are-the-advantages-of-fingerprintidentification.htm [319] Edmund Spinella. (2003). Biometric Scanning Technologies: Finger, Facial and Retinal Scanning. Available:http://www.sans.org/reading_room/whitepapers/authentication/biometri c-scanning-technologies-finger-facial-retinal-scanning_1177 [320] NSTC Subcommittee on Biometrics. (2006). Iris recognition. Available: http://biometrics.gov/documents/irisrec.pdf [321] JohnDaugman. HowIrisRecognitionWorks. Available: http://www.dia.unisa.it/~ads/corso-security/www/CORSO9900/biometria/irisrecog.pdf [322] Regency Institute of Technology. (2011). Iris Recognition system For Authentication. Available: www.docstoc.com/docs/92604256/IRIS-Recognition-System [323] IDteck. White Paper: What is Iris Recognition? Available: http://www.idteck.com/support/w_iris.asp [324] Choras, R.S. Choras, M., (2006). Hand Shape Geometry and Palmprint Features for the Personal Identification. IEEE Intelligent Systems Design and Applications, 2006. ISDA '06. Sixth International Conference on 16-18 Oct. 2006, vol 3. Available:http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeex plore.ieee.org%2Fiel5%2F4021381%2F4021613%2F04021815.pdf%3Farnumber %3D4021815&authDecision=-203
Chapter 7 Bibliography 271 [325] Singh, A.K. Agrawal, A.K. Pal, C.B., (2009). Hand geometry verification system: A review. Ultra Modern Telecommunications & Workshops, 2009. ICUMT '09. International Conference on 12-14 Oct. 2009 Available: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5340227 [326] NSTC Subcommittee on Biometrics. (2006). Hand Geometry. Available: http://www.biometrics.gov/documents/handgeometry.pdf [327] Anil K. Jain & Arun Ross Sharath Pankanti. (1999). A Prototype Hand Geometrybased Verification System. Appeared in Proc. of 2nd Int’l Conference on Audioand Video-based Biometric Person Authentication (AVBPA), Washington D.C., pp.166-171, March 22-24, 1999. Available:http://www.cse.unr.edu/~bebis/CS790Q/PaperPresentations/RossHand_ AVBPA99.pdf [328] wikipedia. Retinal_scan. Available: http://en.wikipedia.org/wiki/Retinal_scan [329] Michael Anissimov, wisegeek. (2011). How does a Retinal Scan Work? Available: http://www.wisegeek.com/how-does-a-retinal-scan-work.htm [330] Nguyen Minh Duc and Bui Quang Minh. Face Authentication Bypassing Lenovo – Asus – Toshiba Available: http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHatDC-09-Nguyen-Face-not-your-password.pdf [331] PBworks. (2007). Advantages and disadvantages of technologies. Available:http://biometrics.pbworks.com/w/page/14811349/Advantages%20and% 20disadvantages%20of%20technologies#Facialrecognition [332] Vaughan-Nichols, S.J., (2004). Voice authentication speaks to the marketplace. IEEE Computer Society, Volume: 37 Issue:3 On page(s): 13 – 15. Available: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1273995 [333] Dualta Currie, SANS Institute. (2003). Shedding some light on Voice Authentication. Available:http://www.sans.org/reading_room/whitepapers/authentication/sheddin g-light-voice-authentication_847 [334] Abhay Bansal, Bharat Gupta, Gaurav Khandelwal, and Shampa Chakraverty. (2009). Offline Signature Verification Using Critical Region Matching. International Journal of Signal Processing, Image Processing and Pattern Vol. 2, No.1, March, 2009. Available: http://www.sersc.org/journals/IJSIP/vol2_no1/6.pdf
Chapter 7 Bibliography 272 [335] Manasjyoti Bhuyan, Kandarpa Kumar Sarma and Hirendra Das. (2010). Signature Recognition and Verification using Hybrid Features and Clustered Artificial Neural Network(ANN)s. Available: http://www.waset.org/journals/ijece/v5/v5-2-18.pdf [336] Manish Shrivastava. (2011). Password Authentication Method Using Keystroke Biometric. Journal Of Computing, Volume 3, Issue 6, June 2011, Issn 2151‐ 9617. Available: http://www.journalofcomputing.org/volume-3-issue-6-june-2011 [337] Bio Password. (2006). White Paper: Authentication Solutions Through Keystroke Dynamics. Available:http://www.infosecurityproductsguide.com/technology/2007/BioPassw ord_Authentication_Solutions_Whitepaper_FINAL.pdf [338] Anil K Jain. Biometrics authentication based on keystroke dynamics. Available: http://www.cse.msu.edu/~cse891/Sect601/KeystrokeRcg.pdf [339] Elaine Shi, Yuan Niu, Markus Jakobsson and Richard Chow. (). Implicit Authentication through Learning User Behavior. Available: http://www.cs.umd.edu/~elaine/docs/isc.pdf [340] Tech Target. (2007). single-factor authentication (SFA). Available: http://searchsecurity.techtarget.com/definition/single-factorauthentication-SFA [341] Check Point. (2011). The Truth About Authentication: Six Factors Evaluated Available:http://www.checkpoint.com/securitycafe/readingroom/general/truth_aut hentication.html [342] Justin Fielding, Tech Republic. (2007). Two-factor authentication: What are the challenges? Available: http://www.techrepublic.com/blog/networking/two-factorauthentication-what-are-the-challenges/244 [343] Hardayal Singh Shekhawat, Dr. Durga Prasad Sharma. (2010). Cloud Computing With Two Factor Authentication For Government Information System And Security. ICCET’10: International Conference on Computer Engineering and Technology, Jodhpur, INDIA, 13-14 November 2010. [344] Ajeet Khurana. (2012). What Is Two Factor Authentication? Available: http://ecommerce.about.com/od/eCommerce-Design-and-Dev/f/WhatEcommerce-Players-Need-To-Know-About-Two-Factor-Authentication.htm [345] ict.govt.nz, The Factors of Authentication
Chapter 7 Bibliography 273 Available: http://ict.govt.nz/guidance-and-resources/standardscompliance/authentication-standards/guidance-multi-factor-authentication/3factors-authenticati [346] Braz, Christina Aïmeur, Esma. (2009). AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce. Available: http://brazc.uqam.ca/authenLinkWIS04.pdf [347] Jing Füller. (2009). Multi-Factor Authentication: An Authentication System based on Jury Framework. Available: orbit.dtu.dk/getResource?recordId=244719&objectId=1&versionId... [348] Shirley Radack. (2006). Electronic Authentication: Guidance For Selecting Secure Techniques. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology USA. Available: http://www.itl.nist.gov/lab/bulletns/bltnaug04.htm [349] Hism Alghier. (2009). Conceptualizing citizen‘s trust in egovernment: Application of Q methodology. Electronic journal of e-government volume 7 issue 4. Available: www.ejeg.com/issue/download.html?idIssue=21 [350] Darren Mundy1 and Bandi Musa. (2010). Towards a Framework for eGovernment Development in Nigeria. Electronic Journal of e-Government Volume 8 Issue 2, 2010. Available: www.ejeg.com/issue/download.html?idArticle=205 [351] H.S.Shekhawat, N.S. Shekhawat, Dr. Durga Prasad Sharma. (2011). EAuthentication System for E-Governance. International Journal Of Emerging Technologies And Applications In Engineering, Technology And Sciences. Volume 4: Issue 2, ISSN: 0974-3588. [352] MIT. Kerberos: The Network Authentication Protocol Available: http://web.mit.edu/kerberos/#what_is [353] B. Clifford Neuman and Thodore Ts’o. (1994). Kerberos: An Authentication Service for Computer Networks Available: http://gost.isi.edu/publications/kerberos-neuman-tso.html [354] Aditya Harbola, Deepti Negi and Deepak Harbola. (2012). A NEW A3 KERBEROS MODEL. International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 3. ISSN: 2277 128X. Available:http://www.ijarcsse.com/docs/papers/March2012/volume_2_Issue_3/V 2I300115.pdf
Chapter 7 Bibliography 274 [355] Eman El-Emam, Magdy Koutb, Hamdy Kelash, and Osama S. Faragallah. (2011). An Authentication Protocol Based on Kerberos 5. International Journal of Network Security, Vol.12, No.3. Available: http://ijns.femto.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p159170.pdf [356] Wen Lei, Hai Cao, Xingjian Liang, Hong Zhang. (2010). An Improved Kerberos Scheme Based on Dynamic Password. International Journal of Information Technology and Computer Science, ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online). Available: http://www.mecs-press.org/ [357] Kashif Bashir and Mohammad Khalid Khan. (2012). Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks. IACSIT International Journal of Engineering and Technology, Vol. 4, No. 3. Available: http://www.ijetch.org/papers/371-R064.pdf [378] Charles J. Kolodgy, IDC. (2003). Identity Management in a Virtual World. Available:http://www.securitymanagement.com/archive/library/Identity_manage ment1003.pdf [379] Wikipedia. (2011). Authorization. Available: http://en.wikipedia.org/wiki/Authorization [380] Pravin Ganore. (2010). Hybrid Cloud Hosting ‗Green‘ Future, ESDS innovating future technology. Available: http://www.esds.co.in/blog/hybrid-cloud-hosting-green-future/ [381] Zakareya Ebrahim and Zahir Irani. (2006). E-government adoption: architecture and barriers. Emerald Business Process Management Journal Vol. 11 No. 5, 2005 pp. 589-611. Available: http://www.electionready.com/pdfs/e-Government-Adoption.pdf [382] Idmanagement.gov. (2009). Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance. Available:http://www.idmanagement.gov/documents/FICAM_Roadmap_Implem entation_Guidance.pdf [383] Identity Management Task Force Report. (2008). National Science and technology Council (NSTC) Subcommittee on Biometrics and Identity Management. Available: http://www.biometrics.gov/documents/idmreport_22sep08_final.pdf [384] BRITISH COLUMBILA: Ministary of citizens service. (2010). IDIM Corporate Provisioning Architecture.
Chapter 7 Bibliography 275 Available:http://www.cio.gov.bc.ca/local/cio/standards/documents/architecture/idi m_corporate_provisioning_architecture.pdf [385] Benny Mathew. (2011). What is Identity Federation? Available: http://blogs.msdn.com/b/benny/archive/2011/01/27/what-is-identityfederation.aspx [386] Juniper Networks. (2009). Identity Federation in a Hybrid Cloud Computing Environment Solution Guide. Available: http://www.juniper.net/us/en/local/pdf/implementationguides/8010035-en.pdf [387] The Virose of The Opera. (2011). Identity Managemant(2). Available: http://virose.virose-studios.net/ [388] esespe. (2010). Firewall Defination. Available: http://www.esespe.com/internet/firewall-difinition.html [389] Karen Mercedes Goertzel, IATAC. (2011). Information Assurance Tools Report – Firewalls. Seventh Edition.S Available: http://iac.dtic.mil/iatac/download/firewalls.pdf [390] Top Ten Reviews. (2012). Best Personal Firewall Software Review: Hardware Firewalls vs. Software Firewalls. Available: http://personal-firewall-software-review.toptenreviews.com/hardwarefirewalls-vs-software-firewalls.html [391] Nathan Coutinho , Paul Schaapman. (2011). Cloud Computing: Making the cloud computing achievable. Available:http://www.edtechmagazine.com/sites/edtechmagazine.com.higher/files /legacy_images/2011/updates/cloud_computing_rg.pdf [392] John Arnold, Girish Bhat, Jon Callas, Sergio Loureiro, Jean Pawluk, Michael Reiter, Joel Weise. (2011). Encryption and Key Management. Available:https://wiki.cloudsecurityalliance.org/guidance/index.php/Encryption_a nd_Key_Management [393] IBM. (2009). IBM Point of View: Security and Cloud Computing. Available:http://www.ibm.com/ibm/files/X869751J69908G27/1securityandCloud IBM_382KB.PDF [394] TechTarget. (2010). Definition: encryption key management. Available: http://searchdatabackup.techtarget.com/definition/encryption-keymanagement
Chapter 7 Bibliography 276 [395] Voltage Security. (2010). Federated Key Management for Secure Cloud Computing. Available: http://storageconference.org/2010/Presentations/KMS/17.Martin.pdf [396] Elaine Barker, William Barker, William Burr, William Polk, and Miles Smid. (2002). NIST: Recommendation for Key Management – Part 2: Best Practices for Key Management Organization. Available: http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part2.pdf [380] James Hughes. (2009). Encrypted Storage and Key Management for the cloud. Available:http://www.cryptoclarity.com/CryptoClarityLLC/Welcome/Entries/200 9/7/23_Encrypted_Storage_and_Key_Management_for_the_cloud.html [381] Jitendra Pal Thethi. (2009). Infosys: Realizing the value proposition of cloud computing. Available: http://www.infosys.com/cloud-computing/whitepapers/documents/realizing-value-proposition.pdf [382] CISCO. (2010). Securing Government Private and Community Clouds. Available: http://www.cisco.com/web/strategy/docs/gov/c45-617006_aag.pdf [383] Accenture. (2010). Six questions every government executive should ask about cloud computing. Available:http://www.majorcities.eu/generaldocuments/pdf/accenture_governmen t_cloud_computing_pov__1__.pdf [384] Cloud Computing Use Case Discussion Group. (2009). Cloud Computing Use Cases. Available:http://opencloudmanifesto.org/Cloud_Computing_Use_Cases_Whitepa per-2_0.pdf [385] H. S. Shekhawat, Dr. Durga Prasad Sharma. (2010). Hybrid Cloud Computing: An Alternative Model for E-Governance with Promised Security And Scalability. GDBA Annual Conference at Metro Points Hotel, New Carrollton, Maryland, USA. In collaboration with University of Maryland Eastern shore, October 14-16. [386] Joe Onisick, Define the cloud. (2011). The Reality of Cloud Bursting. Available: http://www.definethecloud.net/the-reality-of-cloud-bursting [387] Trend Cloud Security. (2011). What is Cloud bursting ? Available: http://cloudsecurity.trendmicro.com/what-is-cloudbursting/ [388] Brian Amedro, Franc¸oise Baude, Denis Caromel, Christian Delbe, Imen Filali, ´ Fabrice Huet, Elton Mathias, and Oleg Smirnov. (2012). An Efficient Framework for Running Applications on Clusters, Grids and Clouds. Available: http://proactive.activeeon.com//userfiles/file/papers/cloud.pdf
Chapter 7 Bibliography 277
[389] Bright Computing. Bright Cluster Manager unleashes and manages the unlimited power of the cloud. http://www.brightcomputing.com/resources/Bright-Cluster-Manager-CloudBursting.pdf [390] F5. Load Balancing Available: http://www.f5.com/glossary/load-balancing.html [391] Gigenetcloud. Web Load Balancing and Scalability. Available:http://www.gigenetcloud.com/web_load_balancing_and_scalability.ht ml [392] Microsoft: TechNet Wiki. (2012). Load Balancing and Cloud Computing (SCVMM 2012). Available: http://social.technet.microsoft.com/wiki/contents/articles/3937.aspx [393] AT&T and Lumeta Corporation. (2001). Chapter 5: Authentication Available: http://www.foo.be/docs/firewall_and_internet_security/chap05.pdf [394] Entrust. (2011). USB Tokens. Available: www.entrust.com/tokens [395] Prof. R. M. Goudar, Tushar Jagdale, Ketan Kakade, Amol Kargal, Darshan Marode. (2012). Secure File Transfer Using USB. International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012, ISSN 22503153. Available: http://www.ijsrp.org/research_paper_apr2012/ijsrp-apr-2012-65.pdf [396] Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma. (2012). Data Theft Prevention and Endpoint Protection from PnP Devices. National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012. Available: http://research.ijcaonline.org/ctngc/number1/ctngc1005.pdf [397] Keunwoo Rhee, Woongryul Jeon, and Dongho Won. (2012). Security Requirements of a Mobile Device Management System. International Journal of Security and Its Applications Vol. 6, No. 2. Available: http://www.sersc.org/journals/IJSIA/vol6_no2_2012/49.pdf [398] Yasir Arfat Malkani, Ayaz Keerio and Lachhman Das Dhomeja. (2012). SECURE DEVICE PAIRING: A USABILITY STUDY. International Journal of UbiComp (IJU), Vol.3, No.2. Available: http://airccse.org/journal/iju/papers/3212iju03.pdf [399] Kristoffer Rosvall, Kristofer Niklasson. (2009). User Authentication: Passive
Chapter 7 Bibliography 278 USB tokens, an alternative to Passwords? University of Gothenburg Department of Applied Information Technology Gothenburg, Sweden. ISSN: 1651-4769. Available: https://gupea.ub.gu.se/bitstream/2077/21659/1/gupea_2077_21659_1.pdf [400] Chun-TaLi, Cheng-ChiLee. (2011). A robust remote user authentication scheme using smart card. Information Technology and Control, Vol.40, No.3. http://www.itc.ktu.lt/index.php/ITC/article/view/632/690. [401] Ram Ratan Ahirwal and Swarn Sanjay Sonwanshi. (2012). An Efficient and Secure ID-based Remote User Authentication Scheme using Smart Card. International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 1– No.6. Available: http://research.ijais.org/volume1/number6/ijais12-450188.pdf [402] Li Yang, Jian-Feng Ma, and Qi Jiang. (2012). Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. International Journal of Network Security, Vol.14, No.3, PP. 156{163. Available: http://ijns.femto.com.tw/contents/ijns-v14-n3/ijns-2012-v14-n3-p156163.pdf [403] Fadi Aloul, Syed Zahidi, Wasim El-Hajj. (2009). Multi Factor Authentication Using Mobile Phones, International Journal of Mathematics and Computer Science, 4(2009), no. 2, 65–80. Available: http://www.aloul.net/Papers/faloul_ijmcs09.pdf [404] Dept. of administrative reforms and public grievances, India. E-Governance: Initiatives in India. Available: http://arc.gov.in/11threp/ARC_11thReport_Ch4.pdf [405] Unique Identification Authority of India, Planning Commission, Government of India. (2011). Envisioning a Role for Aadhar in the Public Distribution System. Available: uidai.gov.in/UID_PDF/Working.../Circulated_Aadhaar_PDS_Note.pdf [406] Department of Information Technology, Ministry of Communications and Information Technology, Government of India. (2010). Guide lines for usages of digital signatures in e-Governance. Version 1. Available:http://doitc.rajasthan.gov.in/Guidelines_for_Usage_of_Digital_Signatur es_in_e-Governance_-_v1[1].0_revised_sent_by_DIT.pdf [407] NIC. Archaeological Survey of India: Project Requirements. Request for Proposal For establishing e-Governance Systems. Available: http://asi.nic.in/pdf_data/request_for_proposal.pdf
Chapter 7 Bibliography 279 [408] National e-Governance Division, Department of Information Technology, Ministry of Communications and Information Technology Government of India. (2011). Draft National e-Authentication Framework (NeAF). Available: http://www.mit.gov.in/sites/upload_files/dit/files/DraftNeAF1911.pdf [409] Karnataka State Case Study. (2007). Fostering Trust and Transparency in Governance: Investigating and Addressing the Requirements for Building Integrity in Public Sector Information Systems in the ICT Environment. Available:http://www.irmt.org/documents/building_integrity/case_studies/IRMT_ Case_Study_India_Karnataka_State.pdf [410] Tara Chand Singhal. (2009). Method and Apparatus for Network Security using a Router Based Authentication System. United State Patent No. US 7,519,986 B2. http://www.google.com/patents/US7519986. [411] State Wide Area Network (SWAN). (2008). Security Policy Guidelines. Available: http://ittripura.gov.in/SWAN/SWAN_Security.pdf [412] Ernie Brickell. (2009). Enhanced privacy ID: A remote anonymous attestation scheme for hardware devices. Intel Technology Journal, Volume 13, Issue 2. [413] Erik Sonnleitner. (2007). Secure authentication through standard storage devices via pluggable authentication model. Available: http://download.delta-xi.net/doc/usbauth-ng_beta.pdf [414] Ideas International, (2012) Available: http://www.ideasinternational.com/PDFs/Costs-of-Replacing-Serverswith-Public-Clouds [415] Jeanne G. Harris and Allan E. Alter, (2010), Cloud rise: Rewards and Risks at the Dawn of Cloud Computing, http://www.accenture.com/sitecollectiondocuments/pdf/cloudrise_rewards_and_ri sks_at_the_dawn_of_cloud_computing.pdf