Detailed Information

Cited 6 time in webofscience Cited 14 time in scopus
Metadata Downloads

A strengthening plan for enterprise information security based on cloud computing

Full metadata record
DC Field Value Language
dc.contributor.authorKang, An Na-
dc.contributor.authorBarolli, Leonard-
dc.contributor.authorPark, Jong Hyuk-
dc.contributor.authorJeong, Young-Sik-
dc.date.accessioned2024-08-08T05:01:01Z-
dc.date.available2024-08-08T05:01:01Z-
dc.date.issued2014-09-
dc.identifier.issn1386-7857-
dc.identifier.issn1573-7543-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/18264-
dc.description.abstractCloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users' IT resources, but also to use enterprise IT resources in an effective manner. Various security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reaction must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing security is expected.-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titleA strengthening plan for enterprise information security based on cloud computing-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1007/s10586-013-0327-y-
dc.identifier.scopusid2-s2.0-84906783173-
dc.identifier.wosid000341081900008-
dc.identifier.bibliographicCitationCLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, v.17, no.3, pp 703 - 710-
dc.citation.titleCLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS-
dc.citation.volume17-
dc.citation.number3-
dc.citation.startPage703-
dc.citation.endPage710-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordAuthorCloud computing-
dc.subject.keywordAuthorCloud security-
dc.subject.keywordAuthorSecurity threats-
dc.subject.keywordAuthorEnterprise information security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE