:::

詳目顯示

回上一頁
題名:雲端運算資訊安全之研究
作者:郭錦華
作者(外文):Jen-Hwa Kuo
校院名稱:長榮大學
系所名稱:經營管理研究所
指導教授:王正華
學位類別:博士
出版日期:2014
主題關鍵詞:雲端運算資訊安全隱私的關心自我效能主觀意識cloud computingsecurity information systemprivacy concernself-efficacysubjective norm
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
雲端運算的快速發展,使得雲端運算的資訊安全議題近幾年來受到學術界和實務界之關注,然而,企業在導入雲端運算系統時,忽略使用者對資訊安全的行為認知,往往產生系統導入的抗拒與排斥。因此,企業在設定雲端運算服務的目標如何符合使用者的行為企圖是值得關切的。具體來說,本研究包括以下三個研究:
第一個研究基於探討雲端運算資訊安全的研究發展,本研究分析過去十年SCI及SSCI學術資料庫的數據,確定與資訊系統安全有關的最重要期刊、論文及學者,並透過因素分析及知識社群網絡分析,發現前後五年有關資訊安全相關研究的發展變化與未來趨勢。
第二個研究基於探討雲端運算資訊安全的研究發展,本研究分析近年主要期刊在雲端運算資訊安全領域發表的論文164篇。本文使用分類識別法將研究議題分為雲端運算的理論與研究、軟體即服務(SaaS)、平台即服務(PaaS)、基礎設施及服務(IaaS)及雲端運算密碼驗證與加密等五類,探討雲端運算資訊安全的主要議題與未來主要研究方向。
第三個研究究基於探討雲端運算資訊安全的行為意圖,本研究對國內九家民間企業進行問卷調查,了解企業內部使用者面對雲端運算安全的行為認知。本研究採用主觀規範、感知嚴重、隱私關注、自我效能感、行為意圖及採用行為等六個變數進行分析,以瞭解雲端運算使用者對資訊安全在行為認知上的主要影響因素。
本研究對於學術上之貢獻在於發展一個適用於雲端運算資訊安全行為認知的理論模式,解釋面對雲端運算時使用者對資訊安全的認知行為;對於實務界而言,本研究亦提供組織在導入雲端運算相關資訊系統時針對資訊安全管理之具體建議。
In response to the demand for cloud computing security, this thesis investigates the factors that influence employees’ use of information security enabled or facilitated by cloud computing through three independent but related studies.
The first study examines the status of contemporary information systems security research in the last ten years with citation and co-citation analysis. Using the data collected in the SCI and SSCI, this study identified the most important publications as well as the most influential scholars and journals in information systems security, and mapped the major research paradigms on the subject. The results of the study help illustrate the invisible network of knowledge production in information systems security and provide valuable understanding for the change of research paradigm of information systems security studies.
The second study suggests that although a large volume of literature on cloud computing is available. The subject is still under development and offers great potentials for further research and applications. It is believed that a review of the state-of-art research and applications in cloud computing security would encourage further research on cloud computing technologies. This paper thus reviews the prior literature on the subject using a classification scheme to identify the theory and practice and future research directions. 164 articles are analyzed and classified based on the scheme that consists of five distinct categories: cloud computing theory and research, SaaS, PaaS, IaaS, and cloud computing authentication and encryption. In addition, a comprehensive list of references is presented. It is hoped that the findings of this research would provide useful insights into the anatomy of cloud computing literature and be a good source for anyone who is interested in cloud computing.
The third study distinguishes between internal and external information resource and examines the backgrounds and outcomes of their use from a job-related perspective on security. Based on survey data collected from nine companies in Taiwan, it is found that employees tend to use internal information system resources when their tasks depend on security behavioral intentions. On the other hand, they are more likely to use external cloud computing resources when faced with complex and non-routine tasks. Furthermore, internal information resources help employees’ performance in replication and adaptation, while external cloud computing resources helps the performance in adaptation and innovation.
The papers reviewed in this dissertation vary in subjects and research methods, while they have one feature in common -- the focus on the use of cloud computing and information security qualitative and quantitative methods for analysis. The three studies in this dissertation look into the questions regarding the information security available on the cloud computing, and issues of privacy concern, trust, self-efficacy, subjective norm and perceived threat. It finds that trust is the main concern on the information systems security, and the management of historical record would facilitate future research and applications.
Ajzen, I. (1975). Belief, attitude, intention, and behaviour: An introduction to theory and research. Addison-Wesley.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision, 50(2), 179-211.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
Albrechtsen, E. (2007). A qualitative study of users'' view on information security. Computers & Security, 26(4), 276-289.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643.
Anderson, J. C., & Gerbin, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423.
Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.
Anton, A. I., Bertino, E., Li, N., & Yu, T. (2008). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109-116.
Anton, A. I., Earp, J.B., & Reese, A. (2002). Analyzing website privacy requirements using a privacy goal taxonomy. Proceedings of the IEEE Joint International Conference on Requirements Engineering (RE’02), 1-9.
Arias-Cabarcos, P., Almenarez-Mendoza, F., Marin-Lopez, A., Diaz-Sanchez, D., & Sanchez-Guerrero, R. (2012). A metric-based approach to assess risk for "on cloud" federated identity management. Journal of Network and Systems Management, 28(6), 833-851.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Ho, L., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Arshad, J., Townend, P., & Xu, J. (2013). A novel intrusion severity analysis approach for clouds. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(1), 416-428.
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13-28.
Awad, N. F., & Ragowsky, A. (2008). Establishing trust in electronic commerce through online word of mouth: an examination across genders. Journal of Management Information Systems, 24(4), 101-121.
Baars, T., & Spruit, M. (2012). Analysing the security risks of cloud adoption using the SeCA model: A case study. Journal of Universal Computer Science, 18(12), 1662-1678.
Backhouse, J., & Dhillon, G. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1), 2-9.
Bandura, A. & Jourden, F. J. (1991). Self-regulatory mechanisms governing the impact of social comparison n complex decision making. Journal of Personality and Social Psychology, 60(6), 941-951.
Bandura, A. (1997). Self-efficacy the exercise of control. New York: W. H. Freeman and Company.
Bang, J., Lee, C., Lee, S., & Lee, K. (2013). Damaged backup data recovery method for Windows mobile. Journal of Supercomputing, 66(2), 875-887.
Bari, M. F., Boutaba, R., Esteves, R., Granville, L. Z., Podlesny, M., Rabbani, M. G., Zhang, Q., & Zhani, M. F. (2013). Data center network virtualization: A survey. IEEE Communications Surveys and Tutorials, 15(2), 909-928.
Barki, H., & Hartwick J. (1994). Measuring user participation, user involvement, and user attitude. MIS Quarterly, 18(1), 59-82.
Barsoum, A., & Hasan, A. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems, 24(12), 2375-2385.
Baskerville, R. (1993). Information systems security design methods: implications for information systems development, ACM Computing Surveys, 25(4), 375-414.
Bennett, C. J., & Raab, C. D. (2006). The governance of privacy: Policy instruments in global perspective. Cambridge, MA: MIT Press.
Bhattacherjee, A. (2000). Acceptance of e-commerce services: the case of electronic brokerages. IEEE Transactions on Systems and Humans, 30(4), 411-420.
Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726-733.
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos J. (2004). Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems, 8(3), 203-236.
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-548.
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3), 431-448.
Candan, K. S., Li, W., Phan, T. & Zhou, M. (2009). Frontiers in information and software as services. Proceedings of the 2009 IEEE International Conference on Data Engineering, 1761-1768.
Cao, C. L., Zhang, R., Zhang, MY., & Yang, Y. X. (2013). IBC-based entity authentication protocols for federated cloud systems. KSII Transactions on Internet and Information Systems, 7(5), 1291-1312.
Carbunar, B., & Tripunitara, M. V. (2012). Payments for outsourced computations. IEEE Transactions on Parallel and Distributed Systems, 48(7), 167-178.
Casola, V., Cuomo, A., Rak, M., & Villano, U. (2013). The CloudGrid approach: Security analysis and performance evaluation. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(1), 387-401.
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). A model for evaluating IT security investments. Communications of the ACM, 47(7), 87-92.
Chang, R. I., Wang, T. C., Wang, C. H., Liu, J. C., & Ho, J. M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Information Systems Frontiers, 14(3), 499-515.
Chard, K., Bubendorfer, K., Caton, S., & Rana, O. F. (2012). Social cloud computing: A vision for socially motivated resource sharing. IEEE Transactions on Services Computing, 5(4), 551-563.
Chen, C., Maniatis, P., Perrig, A., Vasudevan, A., & Sekar, V. (2013). Towards verifiable resource accounting for outsourced computation. ACM Sigplan Notices, 16(4), 787-796.
Chen, C. Y., & Tu, J. F. (2013). A novel cloud computing algorithm of security and privacy. Mathematical Problems in Engineering, 2013. http://www.hindawi.com/journals/mpe/2013/871430/
Chen, H. C., Violetta, MA., & Yang, C. Y. (2013). Contract RBAC in cloud computing. Journal of Supercomputing, 66(2), 1111-1131.
Chen, T. S., Liu, C. H., Chen, T. L., Chen, C. S., Bau, J. G., & Lin, T. C. (2012). Secure dynamic access control scheme of PHR in cloud computing. Journal of Medical Systems, 36(6), 4005-4020.
Chen, Y. Y., Lu, J. C., & Jan, J. K. (2012). A secure EHR system based on hybrid clouds. Journal of Medical Systems, 36(5), 3375-3384.
Chonka, A., Xiang, Y., Zhou, WL., & Bonti, A. (2011). Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications, 55(8), 979-994.
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: outsourcing computation without outsourcing control. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 85-90.
Chu, C. H., Ouyang, YC., & Jang, C. B. (2012). Secure data transmission with cloud computing in heterogeneous wireless networks. Security and Communication Networks, 5(12), 1325-1336.
Chung, C. J., Khatkar, P., Xing, T. Y., Lee, J., & Huang, D. J. (2013). NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Transactions on Dependable and Secure Computing, 10(4), 198-211.
Clarke, R. (2009). Privacy impact assessment: Its origins and development. Computer Law & Security Review, 25, 123-135.
Colomo-Palacios, R., Fernandes, E., Sabbagh, M., & Seco, A. D. (2012). Human and intellectual capital management in the cloud: Software vendor perspective. Journal of Universal Computer Science, 18(11), 1544-1557.
Common Criteria. (2009). Common criteria for information security evaluation. Retrieved May 1, 2010 from Common Criteria web site: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf
Crotty, J. (2009). Structural causes of the global financial crisis: a critical assessment of the new financial architecture. Cambridge Journal of Economics, 33(4), 563-580.
Cui, ZM., Zhu, H., & Chi, L. H. (2013). Lightweight key management on sensitive data in the cloud. Security and Communication Networks, 6(10), 1290-1299.
Culnan, M. J. (2000). Protecting privacy online: is self-regulation working? Journal of Public Policy Marketing, 19(1), 10-19.
Cusumano, M. (2009). Technology strategy and management: The legacy of Bill Gates [Electronic version]. Communications of the ACM, 52(1), 25-26.
Cusumano, M. (2010). Cloud computing and SaaS as new computing platforms. Communications of the ACM, 53(4), 27-29.
D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98.
Dastjerdi, A. V., Tabatabaei, S. G. H., & Buyya, R. (2012). A dependency-aware ontology-based approach for deploying service level agreement monitoring services in Cloud. Software-Practice & Experience, 42(4), 501-518.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
Davis, M., & Sedsman, A. (2010) .Grey areas: The legal dimensions of cloud computing. International Journal of Digital Crime and Forensics, 2(1), 30-39.
Defense Healthcare Information Assurance Program, DHIAP. (2003). OCTAVE-best practices comparative analysis (Technical report ATI-IPT 03-4). Frederick, Maryland: U.S. Army Medical Research and Materiel Command, Fort Detrick.
Delahunty, S. (2009, January). State of enterprise storage [Electronic version]. Presented by Byte & Switch. InformationWeek Analytics.com. Manhassett, NY: United Business Media Limited.
Denning, D. E. (1976). A lattice model of secure information flow. Communication of the ACM, 19(5), 236-243.
Denning, D. E. (1987). An Intrusion-Detection model. IEEE Transactions on Software Engineering, 13(2), 222-232.
Dhillon, G., & Backhouse, J. (2000). Technical opinion: Information system security management in the new millennium. Communications of the ACM, 43(7), 125-128.
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal, 11(2), 127-153.
Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal, 16(3), 293-314.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
Donadio, P. (2012). Virtual intrusion detection systems in the cloud. Bell Labs Technical Journal, 17(3), 113-128.
Dou, W. C., Chen, Q., & Chen, J. J. (2013). A confidence-based filtering method for DDoS attack defense in cloud environment. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(7), 1838-1850.
Dukaric, R., & Juric, M. B. (2013). Towards a unified taxonomy and architecture of cloud frameworks. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(5), 1196-1210.
Eastlick, M. A., Lotz, S. L., & Warrington, P. (2006). Understanding onlie B-to-C relationships: An integrated model of privacy concerns, trust, and commitment, Journal of Business Research, 59(8), 877-886.
Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532-550.
Eloff, M. M., & von Solms, S. H. (2000). Information security management: A hierarchical framework for various approaches. Computers & Security, 19(3), 243-256.
Fan, C. I., Huang, SY., & Artan, W. (2013). Design and implementation of privacy preserving billing protocol for smart grid. Journal of Supercomputing, 63(2), 561-592.
Feng, Z. Q., Bai, B., Zhao, B. K., & Su, J. S. (2012). Redball: Throttling shrew attack in cloud data center networks. Journal of Internet Technology, 13(4), 667-679.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 4(3), 224-274.
Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention and behavior: an introduction to theory and research. Reading, MA: Addison-Wesley.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
Foster, I., Zhao, Y., Raicu, I. & Lu, S. (2008). Cloud computing and grid computing 360- degree compared. Proceedings of the IEEE Grid Computing Environments, 1-10.
Freeman, J. W., Darr, T. C., Neely, R. B. (1997). Risk assessment for large heterogeneous systems. Proceedings of the 13th Annual Computer Security Applications Conference, 44- 52.
Futcher, L., & von Solms, R. (2008). Guidelines for secure software development. Proceedings of the 2008 Annual Research Conference of the South African Institute of computer Scientists and Information Technologists, 338, 56-65.
Gal-Or, E., & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186-208.
Garfield, E. (1979). Citation Indexing: Its Theory and Application in Science, Technology, and Humanities. New York: Wiley.
Gentzsch, W. (2009). Porting applications to Grids and Clouds. International Journal of Grid and High Performance Computing, 1(1), 55-77.
Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438-457.
Goscinski, A., & Brock, M. (2010). Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Generation Computer Systems, 26(7), 947-970.
Grawrock, D. (2009). Dynamics of a trusted platform. Hillsboro, OR: Intel Press.
Green, (2009). Moving video games to the clouds. Technology Review. Retrieved May 4, 2009 from http://www.technologyreview.com/business/22338/
Greenberg, A. (2008). A Cloud Filled Debate. Forbes. Retrieved May 4, 2009 from forbes.com.
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2), 50-57.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(7), 1645-1660.
Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203-236.
Gupta, M., Banerjee, S., Agrawal, M., & Rao, H. R. (2008). Security analysis of Internet technology components enabling globally distributed workplaces—a framework. ACM Transactions on Internet Technology, (8)4, 1-38.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5), 861-874.
Gutierrez, C., Fernandez-Medina, E., & Piattini, M. (2006). PWSSec: Process for web services security. IEEE International Conference on Web Services, 213-222.
Hair, J. F., Tatham, R. L., Anderson, R. E., & Black, W. (1998). Multivariate Data Analysis. New Jersey, USA: Prentice Hall.
Hajjat, M., Sun, X., Sung, Y. W. E., Maltz, D., Rao, S., Sripanidkulchai, K., & Tawarmalani, M. (2010). Cloudward bound: Planning for beneficial migration of enterprise applications to the cloud. ACM Sigcomm Computer Communication Review, 40(4), 243-254.
Hall, E. M. (1998). Managing Risk (1st). Upper Saddle River, NJ: Addison-Wesley.
Hamdi, M. & Boudriga, N. (2003). Algebraic specification of network security risk management. Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, 52-60.
Han, J. G., Susilo, W., & Mu, Y. (2013). Identity-based data storage in cloud computing. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(3), 673-681.
Hand, E. (2007). Head in the cloud. Nature, 449, 963.
Hao, Z., Zhong, S., & Yu, N. (2011a). A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Transactions on Knowledge and Data Engineering, 23(9), 1432-1437.
Hao, Z., Zhong, S., & Yu, N. (2011b). A Time-bound ticket-based mutual authentication scheme for cloud computing. International Journal of Computers Communications & Control, 6(2), 227-235.
Hardgrave, B. C., & Johnson, R. A. (2003). Toward an information systems development acceptance model: the case of object-oriented systems development, IEEE Transactions on Engineering Management, 50(3), 322-336.
Harrison, M. A., Ruzzo, W. L., & Ullman, J. D. (1976). Protection in operating systems. Communication of the ACM, 19(8), 461-471.
Hayes, B. (2008). Cloud computing: As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride. Communications of the ACM, 51(7). 9-11.
He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989-1995.
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
Hermann, D. S. (2007). Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI. Boca Raton, FL: Auerbach Publications.
Hossfeld, T., & Phuoc, T. G. (2011). EuroView 2010: Visions of future generation networks. ACM Sigcomm Computer Communication Review, 9(3), 52-55.
Hu, H. X., Ahn, G. J., & Kulkarni, K. (2012). Detecting and resolving firewall policy anomalies. IEEE Transactions on Dependable and Secure Computing, 10(3), 67-75.
Hu, H. X., Ahn, G. J., & Kulkarni, K. (2013). Discovery and resolution of anomalies in Web access control policies. IEEE Transactions on Dependable and Secure Computing, 20(4), 561-578.
Hu, J., & Klein, A. (2009). A benchmark of transparent data encryption for migration of web applications in the cloud. Eighth IEEE International Conference on Dependable, Autonomic, and Secure Computing, 735-740.
Hu, L. K., Ying, S., Jia, X. Y., Zhao, K. (2010). A semantics based approach for cross domain access control. Journal of Internet Technology, 8(6), 44-50.
Huang, D. J., Xing, T. Y., & Wu, H. J. (2013). Mobile cloud computing service models: A user-centric approach. IEEE Network, 27(5), 6-11.
Huang, D. L., Rau, P.-L. P., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computers Studies, 69(12), 870-883.
Huang, S. M., Chang, S. I., & Su, K. H. (2006). Critical success factors for implementing BS7799 information security management system - based on petrochemical industry. Journal of Information Management, 13(2), 171-192.
Huebscher, M. C., & McCann, J. A. (2008). A survey of autonomic computing - degrees, models, and applications. ACM Computing Surveys, 40(3), 7-28.
Hui, T. K., & Wan, D. (2009). Who are the online grocers? The Service Industries Journal, 29(11), 1479-1489.
Hung, S. Y., Chang, S. I., & Guo, J. Y. (2011). Critical factors influence organizational adoption and application of information security management system certification. Journal of Computer Audit, (23).
Hunter, J. E., Schmidt, F. L., & Jackson, G. B. (1982). Meta-analysis: Cumulating research findings across studies. Beverly Hills, CA: Sage.
Hur, J. (2013). Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271-2282.
Hwang, K., Li, D. Y. (2010). Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing, 8(6), 24-31.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95
ISO/IEC 15408. (2009). Information technology -- security techniques -- evaluation criteria for IT security. Retrieved May 17, 2009, from International Standards Organization web site: http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html
Itani, W., Kayssi, A., & Chehab, A. (2013). SNUAGE: an efficient platform-as-a-service security framework for the cloud. Cluster Computing-The Journal of Networks Software Tools and Applications, 16(4), 707-724.
Jackson, J. (2009). Intellipedia suffers midlife crisis. Government ComputerNews. http://gcn.com/Articles/2009/02/18/Intellipedia.aspx?Page=2.
Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt. Upper Saddle River, NJ: Addison-Weslley.
Javidi, B., & Nomura, T. (2000). Securing information by use of digital holography. Optics Letters, 25(1), 28-30.
Jeong, K. (2013). Cryptanalysis of block cipher Piccolo suitable for cloud computing. Journal of Supercomputing, 66(2), 829-840.
Jeyakanthan, M., & Nayak, A. (2012). Policy management: Leveraging the open virtualization format with contract and solution models. IEEE Network, 9(3), 318-331.
Jin, H., Xiang, G. F., Zou, D. Q., Wu, S., Zhao, F., Li, M., & Zheng, W. D. (2013). A VMM-based intrusion prevention system in cloud computing environment. Journal of Supercomputing, 66(3), 1133-1151.
Jing, S. Y., Ali, S., She, K., & Zhong, Y. (2013). State-of-the-art research study for green cloud computing. Journal of Supercomputing, 65(1), 445-468.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34(3), 549-566.
Kaliski, B. (2008). Multi-tenant cloud computing: From cruise liners to container ships. Proceeding of the Third Asia-Pacific Trusted Infrastructure Technologies Conference, 4-4.
Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139-154.
Karadsheh, L. (2012). Applying security policies and service level agreement to IaaS service model to enhance security and transition. Computers & Security, 28(2), 379-390.
Katzan, H. (2010). On an ontological view of cloud computing. Journal of Service Science, 3(1), 1-6.
Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security & Privacy, 7(4), 61-64.
Keahey, K., Tsugawa, M., Matsunaga, A., & Fortes, J. A. B. (2009). Sky computing. IEEE Internet Computing, 13(5), 43-51.
Khan, A. N., Kiah, M. L. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(5), 1278-1299.
Khan, A. N., Kiah, M. L. M., Madani, S. A., Khan, AUR., & Ali, M. (2013). Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. Journal of Supercomputing, 66(3), 1687-1706.
Khorshed, M. T., Ali, A. B. M. S., & Wasimi, S. A. (2012a). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 14(4), 471-481.
Khorshed, M. T., Ali, A. B. M. S., & Wasimi, S. A. (2012b). Classifying different denial-of-service attacks in cloud computing using rule-based learning. Security and Communication Networks, 15(2), 843-859.
Kim, T. H., & Mohammed, S. (2013). Toward designing a secure biosurveillance cloud. Journal of Supercomputing, 65(1), 61-70.
Kino, T. (2010). Grand Design for Next-Generation Data Centers. Fujitsu Scientific & Technical Journal, 46(4), 329-335.
Kiravuo, T., Sarela, M., & Manner, J. (2013). A survey of ethernet LAN security. IEEE Communications Surveys and Tutorials, 15(3), 1477-1491.
Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67-93.
Knapp, K. J., Denney, G. D., & Barner, M. E. (2011). Key issues in data center security: An investigation of government audit reports. Government Information Quarterly, 28(4), 533-541.
Kotulic, A. G., & Clark, J. G. (2004). Why there aren’t more information security research studies. Information & Management, 41(5), 597-607.
Kumar, P. S., & Subramanian, R. (2011). Homomorpic distributed verification protocol for ensuring data storage security in cloud computing. Information-An International Interdisciplinary Journal, 14(10), 3465-3476.
Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care services. Journal of Medical Internet Research, 13(3).
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3222190/
Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41(6), 707-718.
Lee, Y., and Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. European Journal of Information Systems, 18, 177-187.
Li, C. X., Raghunathan, A., & Jha, N. K. (2012). A trusted virtual machine in an untrusted management environment. IEEE Transactions on Services Computing, 5(4), 472-483.
Li, J. X., Li, B., Wo, T. Y., Hu, C. M., Huai, J. P., Liu, L., & Lam, K. P. (2012). CyberGuarder: A virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 26(5), 22-27.
Li, J., & Chen, X. F. (2013). Efficient multi-user keyword search over encrypted data in cloud computing. Computing and Informatics, 32(4), 723-738.
Li, M., Yu, S. C., Zheng, Y., Ren, K., & Lou, W. J. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131-143.
Li, X., Hess, T. J., & Valacich, J. S. (2006). Trust in organizations: Frontiers of theory and research. Sage, Thousand Oaks, CA, pp.357-389.
Li, Z., Yu, NH., & Li, Y. (2010). Asynchronous parallel finite automaton: A new mechanism for deep packet inspection in cloud computing. Journal of Internet Technology, 11(2), 269-277.
Liao, C., Liu, C.-C., & Chen, K. (2011). Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications, 10(6), 702-715.
Lien, I. T., Lin, Y. H., Shieh, JR., & Wu, J. L. (2013). A Novel privacy preserving location-based service protocol with secret circular shift for k-NN search. IEEE Transactions on Information Forensics and Security, 66(2), 841-862.
Lin, A., & Chen, N. C. (2012). Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal of Information Management, 32(6), 533-540.
Lin, C. C., McLee, Y., & Kuo, J. H. (2011). Web services: themes, concepts and relationships. International Journal of Machine Learning and Computing, 1(2), 199-204.
Lin, H., Shao, J., Zhang, C., & Fang, Y. G. (2013). CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Transactions on Information Forensics and Security, 8(6), 985-997.
Litty, L., & Lie, D. (2011). Patch auditing in Infrastructure as a Service clouds. ACM Sigplan Notices, 46(7), 145-155.
Liu, C., Zhang, X. Y., Yang, C., & Chen, J. J. (2013). CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Generation Computer Systems-The International Journal of Grid Computing and eScience, 29(5), 1300-1308.
Liu, F. H., Lo, HF., Chen, L. C., & Lee, W. T. (2013). Comprehensive security integrated model and ontology within cloud computing. Journal of Internet Technology, 14(6), 935-945.
Liu, X.F., Zhang, YQ., Wang, BY., & Yan, J. B. (2013). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1182-1191.
Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: today’s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173-186.
Lombardi, F; Di Pietro, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113-1122.
Lonea, A. M., Popescu, D. E., & Tianfield, H. (2013). Detecting DDoS attacks in cloud computing environment. International Journal of Computers Communications & Control, 8(1), 70-78.
Lopez-Nicolas, C., Molina-Castillo, F. J., & Bouwman H. (2008). An assessment of advanced mobile services acceptance: contributions from TAM and diffusion theory models. Information & Management, 45(6) 359-364.
Ma, J. (2012). A formal approach for risk assessment in RBAC systems. Journal of Universal Computer Science, 18(17), 2432-2451.
Ma, X., Li, J., & Zhang, F. G. (2013). Outsourcing computation of modular exponentiations in cloud computing. Cluster Computing- The Journal of Networks Software Tools and Applications, 24(6), 1172-1181.
Ma, Z., Lee, Y. & Yu, K. S. (2007). Ten years of conflict management studies: themes, concepts, and relationships. International Journal of Conflict Management, 19(3), 234-248.
Malhotra, N., Kim, S. S. & Agarwal J. (2004). Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Information Systems Research, 9(2), 126-163.
Marshall, P. (2008). City in the cloud. Government Computer News, 27(28), 29-29.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing -The business perspective. Decision Support Systems, 51(1), 176-189.
Martens, B., & Teuteberg, F. (2012). Decision-making in cloud computing environments: A cost and risk based approach. Information Systems Frontiers, 14(4), 871-893.
Matoba, O., & Javidi, B. (1999). Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Optics Letters, 24(11), 762-764.
Matsuhashi, Y., Shinagawa, T., Ishii, Y., Hirooka, N., & Kato, K. (2012). Transparent VPN failure recovery with virtualization. Future Generation Computer Systems- The International Journal of Grid Computing and eScience, 28(1), 78-84.
Menezes, A., & Paul, C. (1997). Handbook of applied cryptography, Blvd. NW, USA.
Merritt, R. (2009). Vendors call for cloud computing standards. EE Times. Retrieved March 31, 2009 from EETimes.com.
Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541-552.
Milne, G. R., & Boza, M. E. (1998) Trust and concern in consumers’ perceptions of marketing information management practices. Working Paper Cambridge MA 02138: Marketing Science Institute, 98-117.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. Journal of Supercomputing, 86(9), 2276-2293.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing enabling the future internet of services. IEEE Internet Computing, 11(1), 44-53.
Misra, S. C. & Mondal, A. (2011). Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding return on investment. Mathematical and Computer Modelling, 53(3-4), 504-521.
Mouratidis, H., Islam, S., Kalloniatis, C., & Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software, 14(5), 14-22.
Mousannif, H., Khalil, I., & Kotsis, G. (2013). Collaborative learning in the clouds. Information Systems Frontiers, 15(2), 159-165.
Mowbray, M. & Pearson, S. (2009). A client-based privacy manager for cloud computing. Proceedings of the Fourth international ICST Conference on Communication System Software and middleware, 1-8.
Munoz, A., Gonzalez, J., & Mana, A. (2011). A performance-oriented monitoring system for security properties in cloud computing applications. Computer Journal, 61(2), 337-352.
Myers, A. C., & Liskov, B. (2000). Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 9(4), 410-442.
Nagakura, H., & Sakurai, A. (2011). Middleware for Creating Private Clouds. Fujitsu Scientific & Technical Journal, 47(3), 263-269.
Nahra, K. J. & Rein, W. (2008). HIPAA security enforcement is here. IEEE Security & Privacy, 6(6), 70-72.
National Institute of Standards and Technology, Computer Security Division. (2009). Computer security resource center. Retrieved September 3, 2009, from National Institute of Standards and Technology Web site: http://csrc.nist.gov/publications/PubsSPs.html
National Institute of Standards and Technology. (2009). Cloud computing. information technology laboratory. Retrieved May 31, 2009 from http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
National Institute of Standards and Technology. (2011). Definition of cloud computing. Retrieved December 17, 2011, from National Institute of Standards and Technology Web site: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Nepal, S., & Zic, J. (2008). A conflict neighboring negotiation algorithm for resource services in dynamic collaborations. IEEE International Conference on Services Computing, 2, 283-290.
Nitoh, S., Nagakura, H., & Sakurai, A. (2011). Middleware for Supporting Private Clouds. Fujitsu Scientific & Technical Journal, 47(4), 451-458.
Noureddine, M.,& Bashroush, R. (2013). An authentication model towards cloud federation in the enterprise. Journal of Systems and Software, 86(9), 2269-2275.
Nunnally, J. C. (1978). Psychometric theory. New York: McGraw-Hill.
Nyre, A. A., & Jaatun, M. G. (2010). A probabilistic approach to information control. Journal of Internet Technology, 11(3), 407-416.
OCTAVE. (2009). Operationally critical threat, asset, and vulnerability evaluation. Retrieved September 3, 2009, from Carnegie Mellon University’s Computer Emergency Response Team Web site: http://www.cert.org/octave/
Okuhara, M., Shiozaki, T., & Suzuki, T. (2010). Security architectures for cloud computing. Fujitsu Scientific & Technical Journal, 46(4), 397-402.
Okuhara, M., Suzuki, T., Shiozaki, T., & Hattori, M. (2011). Fujitsu''s approach to cloud-related information security. Fujitsu Scientific & Technical Journal, 47(4), 459-465.
Pan, L., Liu, N., & Zi, X. C. (2013). Visualization framework for inter-domain access control policy integration. China Communications, 30(2), 194-203.
Papastergiou, S., & Polemi, D. (2008) A secure and trustful e-ordering architectures (TOES) for small and medium enterprises (SMEs). International Journal of Information Security and Privacy, 2(2), 14-30.
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245-253.
Parikh, T. S. (2009). Engineering rural development [Electronic version]. Communications of the ACM, 52(1), 54-63.
Parthasarathy, M., & Bhattacherjee, A. (1998). Understanding post-adoption behavior in the context of online services. Information System Research, 9(4), 362-379.
Pauley, W. A. (2010). Cloud provider transparency: An empirical evaluation. Security & Privacy, 8(6), 32-39.
Pavlou, P. A. & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115-143.
Pearson, S. (2009). Taking account of privacy when designing cloud computing services. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 44-52.
Podsakoff, P. M., Mackenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
Polze, A., & Troger, P. (2011). Trends and challenges in operating systemsufrom parallel computing to cloud computing. Concurrency and Computation-Practice & Experience, 24(7), 676-686.
Popsecu, D. E., & Lonea, A. M. (2013). An hybrid text-image based authentication for cloud services. International Journal of Computers Communications & Control, 8(2), 263-274.
Pym, D., & Sadler, M. (2010). Information stewardship in cloud computing. International Journal of Service Science, Management, Engineering, and Technology, 1(1), 50-67.
Qian, H. F., Gong, J. Q., & Zhou, Y. (2012). Anonymous password-based key exchange with low resources consumption and better user-friendliness. Security and Communication Networks, 5(12), 1379-1393.
Qin, B., Wang, H. Q., Wu, Q. H., Liu, J. W., & Domingo-Ferrer, J. (2013). Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Computing-The Journal of Networks Software Tools and Applications, 16(4), 845-859.
Ray, I., Belyaev, K., Strizhov, M., Mulamba, D., & Rajaram, M. (2013). Secure logging as a service-delegating log management to the cloud. IEEE Systems Journal, 7(2), 323-334.
Refregier, P., & Javidi, B. (1995). Optical image encryption based on input plane and fourier plane random encoding. Optics Letters, 20(7), 767-769.
Regola, N., & Chawla, N. V. (2013). Storing and using health data in a virtual private cloud. Journal of Medical Internet Research, 15(3), 3-14.
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69-73.
Renzl, B. (2008). Trust in management and knowledge sharing: The mediating effects of fear and knowledge documentation. OMEGA- International Journal of Management Science, 36(2), 206-220.
Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816-826.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Rodrigues, J. J. P. C., de la Torre, I., Fernandez, G., & Lopez-Coronado, M. (2013). Analysis of the security and privacy requirements of cloud-based electronic health records systems. Journal of Medical Internet Research, 15(8), -.
Rogers, R. (1975). A protection motivation theory of fear appeals and attitude change. MIS Quarterly, 32(1), 1-22.
Romero-Mariona, J., Ziv, H., & Richardson, D. J. (2008). SRRS: A recommendation system for security requirements. Proceedings of the 2008 international Workshop on Recommendation Systems For Software Engineering, 50-52.
Ross, J. W., & Westerman, G. (2004). Preparing for utility computing: The role of IT architecture and relationship management. IBM Systems Journal, 43(1), 5-19.
Ross, P. E. (2009). Cloud computing’s killer app: Gaming. IEEE Spectrum, 46(3), 14-14.
Ryan, M. D. (2011). Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), 36-38.
Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268.
Sabnis, S., Verbruggen, M., Hickey, J., & McBride, A. J. (2012). Intrinsically secure next-generation networks. Bell Labs Technical Journal, 17(3), 17-36.
Salah, K., Calero, J. M. A., Bernabe, J. B., Perez, J. M. M., & Zeadally, S. (2013). Analyzing the security of Windows 7 and Linux for cloud computing. Computers & Security, 34(), 113-122.
Salah, K., Calero, J. M. A., Zeadally, S., Al-Mulla, S., & Alzaabi, M. (2013). Using cloud computing to implement a security overlay network. IEEE Security & Privacy, 11(2), 279-288.
Saleh, M. S., Albrabiah, A., Bakry, S. H, (2006). Using ISO 17799: 2005 information security management: a STOPE view with six sigma approach. International Journal of Network Management, Association of Computing Machinery, 17(1), 85-97.
Samarati, P., Bertino, E., Ciampichetti, A., & Jajodia, S. (1997). Information flow control in object-oriented systems. IEEE Transactions on Knowledge and Data Engineering, 9(4), 524-538.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. Computer, 29(2), 38-47.
Sandhu, R., Bhamidipati, V., & Munawer, Q. (1999). The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security, 2(1), 105-135.
Santana, C., Leite, J. C. B., & Mosse, D. (2011). Power management by load forecasting in web server clusters. Cluster Computing- The Journal of Networks Software Tools and Applications, 24(2), 338-352.
Schneier, B. (1996). Applied cryptography: protocols, algorithms, and source code in C, Wiley, USA.
Schneier, B. (2000). Secrets and Lies: digital security in a networked world. New York: John Wiley & Sons.
Sharp, R. (2012). Latency in cloud-based interactive streaming content. Bell Labs Technical Journal, 17(2), 67-80.
Shea, R., & Liu, J. C. (2013). Performance of virtual machines under networked denial of service attacks: Experiments and analysis. IEEE Systems Journal, 7(2), 335-345.
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., & Sekar, V. (2012). Making middleboxes someone else''s problem: network processing as a cloud service. ACM Sigcomm Computer Communication Review, 42(4), 13-24.
Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428-438.
Shin, D. H. (2013). User centric cloud service model in public sectors: Policy implications of cloud services. Government Information Quarterly, 10(6), 341-354.
Sidorova, A., Evangelopoulos, N. Valacich, J. S., & Ramakrishnan, T. (2008). Uncovering the intellectual core of the information systems discipline. MIS Quarterly, 32(3) 467-482.
Sidorova, A., Evangelopoulos, N., & Valacich, J. S. (2008). Uncovering the intellectual core of the information systems discipline. MIS Quarterly, 32(3), 467-482.
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
Siponen, M., & Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-502.
Situ, G. H., & Zhang, J. J. (2004). Double random-phase encoding in the Fresnel domain. Optics Letters, 29(14), 1584-1586.
Small, H. (1993). Macro-level changes in the structure of co-citation clusters: 1983-1989. Scientometrics, 26(1), 5-20.
Sommerville, I. (2013). Teaching cloud computing: A software engineering perspective. Journal of Systems and Software, 86(9), 2330-2332.
Son, J.-Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529.
Sood, S.K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 1831-1838.
Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management. MIS Quarterly, 34(3), 503-522.
Spiekerman, S., & Cranor, L. F. (2009) Engineering privacy. IEEE Transaction on Software Engineering, 35(1), 67-82.
Spring, J. (2011a). Monitoring cloud computing by layer, part 1. IEEE Security & Privacy, 9(2), 66-68.
Spring, J. (2011b). Monitoring cloud computing by layer, part 2. IEEE Security & Privacy, 9(3), 52-55.
Stanton, J. M., Stam, K. R., & Mastrangelo, P. (2005). Analysis of end user security behaviors. Computers & Security, 24(2), 124-133.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research, 13(1), 36-49.
Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255-276.
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
Su, C. Y., Chiang, W. M., & Roan, J. S. (2010). A study of the effect of implementing information security policy on information security culture and information security effectiveness in an organization. Journal of Information Management, 17(4), 61-87.
Sun, D. W., Chang, G. R., Tan, C. G., Sun, L. N., & Wang, X. W. (2011). Dependability analysis and evaluation of cloud computing environments from a redundancy perspective. Information-An International Interdisciplinary Journal, 34(4), 1097-1107.
Takabi, H., Joshi, J. B. D., & Ahn, G. J.(2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 28(3), 583-592.
Takebayashi, T., Tsuda, H., Hasebe, T., & Masuoka, R. (2010). Data loss prevention technologies. Fujitsu Scientific & Technical Journal, 46(1), 47-55.
Tan, C. H., & Teh, Y. W. (2013a). Secure hardware performance analysis in virtualized cloud environment. Mathematical Problems in Engineering, 2013.
http://www.hindawi.com/journals/mpe/2013/685764/
Tan, C. H., & Teh, Y. W. (2013b). Synthetic hardware performance analysis in virtualized cloud environment for healthcare organization. Journal of Medical Systems, 37(4).
http://link.springer.com/article/10.1007%2Fs10916-013-9950-7
Tanenbaum, A. S., & Steen, A. V. (2007) Distributed systems: principles and paradigms. Pearson Prentice Hall: Upper Saddle River, NJ.
Tapiador, J. E., Hernandez-Castro, J. C., & Peris-Lopez, P. (2012). Online randomization strategies to obfuscate user behavioral patterns. Journal of Network and Systems Management, 5(11), 1235-1247.
Taylor, H., Dillon S., & van Wingen, M. (2010). Focus and diversity in information systems research: meeting the dual demands of a healthy applied discipline. MIS Quarterly, 34(4), 647-667.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: a test of competing models. Information Systems Research, 6(2), 144-176.
Tetali, S. D., Lesani, M., Majumdar, R., & Millstein, T. (2012). MrCrypt: Static analysis for secure cloud computations. ACM Sigplan Notices, 48(10), 271-286.
Tsuda, H., Matsuo, A., Abiru, K., & Hasebe, T. (2012). Inter-cloud data security for secure cloud-based business collaborations. Fujitsu Scientific & Technical Journal, 48(2), 169-176.
Uemura, T., Dohi, T., & Kaio, N. (2010). Dependability analysis of a scalable intrusion tolerant architecture with two detection modes. Journal of Internet Technology, 11(2), 289-298.
Unnikrishnan, G., Joseph, J., & Singh, K. (2000). Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, 25(12), 887-889.
van den Bossche, R., Vanmechelen, K., & Broeckhove, J. (2013). Online cost-efficient scheduling of deadline-constrained workloads on hybrid clouds. Future Generation Computer Systems- The International Journal of Grid Computing and eScience, 29(4), 973-985.
van Deursen, N., Buchanan, W. J., & Duff, A. (2013). Monitoring information security risks within health care. Computers & Security, 37(), 31-45.
Varshney, R. Vetter, A. (2002). Mobile commerce: framework, applications and networking support. Mobile networks and applications, 7(3), 185-198.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
Viriyasitavat, W., & Martin, A. (2012). A survey of trust in workflows and relevant contexts. IEEE Communications Surveys and Tutorials, 20(4), 513-533.
von Solms, B., & von Solms, R. (2004). The 10 deadly sins of information security management. Computers & Security, 23(5), 371-376.
Vorster, A. & Labuschagne, L. (2005). A framework for comparing different security risk analysis methodologies. Proceedings of the 2005 Annual Research Conference in South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 150, 95-103.
Walstrom, K. A., & Leonard, L. N. K. (2000). Citation classics from the information systems literature, Information & Management, 38(2), 59-72.
Wan, J. F., Zou, C. F., Ullah, S., Lai, C. F., Zhou, M., & Wang, X. F. (2013). Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network, 27(5), 56-61.
Wan, Z. G., Liu, J., & Deng, R. H. (2012). HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security, 7(2), 743-754.
Wang, C. H., McLee, Y., & Kuo, J. H. (2011). Mapping the intellectual structure of digital divide. International Journal of Social Science and Humanity, 1(1), 49-54.
Wang, C. J., & Luo, J. F. (2013). An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering.
http://www.hindawi.com/journals/mpe/2013/810969/
Wang, C., Cao, N., Ren, K., & Lou, W. J. (2012). Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1467-1479.
Wang, C., Ren, K., Lou, W. J., & Li, J. (2010). Toward publicly auditable secure cloud data storage services. IEEE Network, 24(4), 19-24.
Wang, C., Ren, K., Wang, J., & Wang, Q. (2013). Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Transactions on Parallel and Distributed Systems, 41(3), 19-23.
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W.J. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220-232.
Wang, P. S., Mu, Y., Susilo, W., & Yan, J. (2012). Privacy preserving protocol for service aggregation in cloud computing. Software-Practice & Experience, 42(4), 467-483.
Wang, Q. A., Wang, C., Ren, K., Lou, W. J., & Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847-859.
Waqar, A., Raza, A., Abbas, H., & Khan, M. K. (2013). A framework for preservation of cloud users'' data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications, 36(1), 235-248.
Wazzan, M., & Fayoumi, A. (2012). A survey of researches on the challenge issues in cloud computing. Information-An International Interdisciplinary Journal, 15(10), 4245-4254.
Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16-25.
Westin, A.F. (1967). Privacy and Freedom. New York: Atheneum.
White, H. D., & Griffith, B. C. (1981). Author cocitation: A literature measure of intellectual structure. Journal of the American Society for Information Science, 32(3), 163-171.
Whitman, M. E. (2003). Enemy at the gate: threats to information security. Communication of the ACM, 46(8), 91-95.
Winter, S. J., Chudoba, K. M., & Gutek, B. A. (1998). Attitudes toward computers: when do they predict computer use? Information & Management, 34(5), 275-284.
Witte, K. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59, 329-349.
Witte, K., Cameron, K. A., McKeon, J. K., & Berkowitz, J. M. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communications, 1(4), 317-342.
Wood, T., Ramakrishnan, K. K., Shenoy, P., & Van der Merwe, J. (2012). Enterprise-ready virtual cloud pools: Vision, opportunities and challenges. Computer Journal, 55(8), 995-1004.
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measure: An empirical test of the threat control model. Journal of Computers in Human Behavior, 24(6), 2799-2816.
Workman, M., Bommer, W. H., & Straub, D. (2009). The amplification effects of procedural justice on a threat control model of information systems security behaviours. Behaviour & Information Technology, 28(6), 563-575.
Wu, X. X., Wang, W., Lin, B., & Miao, K. (2012). Composable IO: A novel resource sharing platform in personal Clouds. Journal of Supercomputing, 61(2), 353-370.
Xi, K., Tang, Y., & Hu, J. K. (2011). Correlation keystroke verification scheme for user access control in cloud computing environment. Computer Journal, 54(10), 1632-1644.
Xiao, Z. F., & Xiao, Y. (2013). Security and privacy in cloud computing. IEEE Communications Surveys and Tutorials, 8(6), 863-873.
Xu, K., Wang, F., & Wang, H. Y. (2012). Lightweight and informative traffic metrics for data center monitoring. Journal of Network and Systems Management, 20(2), 226-243.
Xu, L., Cao, X., Zhang, Y. X., & Wu, W. (2013). Software service signature (S-3) for authentication in cloud computing. Cluster Computing- The Journal of Networks Software Tools and Applications, 16(4), 905-914.
Yan, D. F., Yang, F. C., & Yeap, T. (2011). Service security architecture and access control model for cloud computing. China Communications, 31(3), 315-326.
Yang, J. C., Xiong, N. X., Vasilakos, A. V., Fang, Z. J., Park, D., Xu, X. H., Yoon, S., Xie, S. J., & Yang, Y. (2011). A fingerprint recognition scheme based on assembling invariant moments for cloud computing communications. Computer Journal, 5(4), 574-583.
Yang, K., & Jia, X. H. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717-1726.
Yang, S. J. (2013). Using SLA strategy to design an SOC platform in data center on the cloud computing. Journal of Internet Technology, 14(5), 751-758.
Yang, X. Y., Nasser, B., Surridge, M., & Middleton, S. (2012). A business-oriented cloud federation model for real-time applications. Future Generation Computer Systems- The International Journal of Grid Computing and eScience, 28(8), 1158-1167.
Yiu, M. L., Assent, I., Jensen, C. S., & Kalnis, P. (2012). Outsourced similarity search on metric data assets. IEEE Transactions on Knowledge and Data Engineering, 23(2), 313-320.
Yoon, Y. B., Oh, J., & Lee, B. G. (2013). The establishment of security strategies for introducing cloud computing. KSII Transactions on Internet and Information Systems, 7(4), 860-877.
Youseff, L., Butrico, M., & Da Silva, D. (2008). Toward a unified ontology of cloud computing [Electronic version]. Proceedings of the Grid Computing Environments Workshop, 2008, 1-10.
Yu, J. D., Lu, P., Zhu, YM., Xue, G. T., & Li, M. L. (2013). Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 10(4), 239-250.
Yu, W. D., Doddapaneni, S., & Murthy, S. (2006). A privacy assessment approach for serviced oriented architecture application. Second IEEE International Symposium on Service-Oriented System Engineering, 66-75.
Yu, Z. W., Wang, C. K., Thomborson, C., Wang, J. M., Lian, S. G., & Vasilakos, A. V. (2012). Multimedia applications and security in MapReduce: opportunities and challenges. Concurrency and Computation-Practice & Experience, 24(17), 2083-2101.
Yu, Z. W., Wang, C. K., Thomborson, C., Wang, J. M., Lian, S. G., & Vasilakos, A. V. (2012). A novel watermarking method for software protection in the cloud. Software- Practice & Experience, 42(4), 409-430.
Zhang, F. Z., & Chen, H. B. (2013). Security-preserving live migration of virtual machines in the cloud. Journal of Network and Systems Management, 21(4), 562-587.
Zhang, J., Chen, C. M., & Li, J. X. (2009). Visualizing the intellectual structure with paper-reference matrices. IEEE Transactions on Visualization and Computer Graphics, 15(6), 1153-1160.
Zhang, J., & Mao, E. (2008). Understanding the acceptance of mobile SMS advertising among young Chinese consumers. Psychology & Marketing, 25(8), 787-805.
Zhang, J., Xiang, Y., Zhou, W. L., Ye, L., & Mu, Y. (2011). Secure image retrieval based on visual content and watermarking protocol. Computer Journal, 54(10), 1661-1674.
Zhang, L. Y., & Hu, Y. P. (2013). New constructions of hierarchical attribute-based encryption for fine-grained access control in cloud computing. KSII Transactions on Internet and Information Systems, 7(5), 1343-1356.
Zhang, Q. K., Li, Y. Z., Song, D. J., & Tan, Y. (2011). Alliance-authentication protocol in clouds computing environment. China Communications, 9(7), 42-54.
Zhang, W. F., Wang, L. Z., Liu, D. S., Song, W. J., Ma, Y., Liu, P., & Chen, D. (2013). Towards building a multi-datacenter infrastructure for massive remote sensing image processing. Concurrency and Computation- Practice & Experience, 25(12), 1798-1812.
Zhao, G. S., Rong, C. M., Jaatun, M. G., & Sandnes, F. E. (2012). Reference deployment models for eliminating user concerns on cloud security. Journal of Supercomputing, 17(4), 18-25.
Zhao, R. Y., & Wang, J. (2011). Visualizing the research on pervasive and ubiquitous computing. Scientometrics, 86(3), 593-612.
Zhou, L., Varadharajan, V., & Hitchens, M. (2011). Enforcing role-based access control for secure data storage in the cloud. Computer Journal, 54(10), 1675-1687.
Zhou, L., Varadharajan, V., & Hitchens, M. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions on Information Forensics and Security, 8(12), 1947-1960.
Zhu, Y., Hu, H. X., Ahn, G. J., & Yau, S. S. (2012). Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software, 85(5), 1083-1095.
Zissis, D., & Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239-251.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems- The International Journal of Grid Computing and eScience, 14(3), 911-940.
Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., & Sanders, W. (2013). Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security, 37(), 215-227.
Zou, D. Q., Zhang, W. R., Qiang, W. Z., Xiang, G. F., Yang, L. T., Jin, H., & Hu, K. (2013). Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems- The International Journal of Grid Computing and eScience, 29(8), 2092-2102.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top