Open Access
Issue
ITM Web Conf.
Volume 18, 2018
7th Seminar on Industrial Control Systems: Analysis, Modeling and Computing (ICS 2018)
Article Number 02004
Number of page(s) 4
Section Devices, equipment and assistive technologies
DOI https://doi.org/10.1051/itmconf/20181802004
Published online 09 April 2018
  1. N. Sultan, International Journal of Information Management, 34, 177 (2014) [CrossRef] [Google Scholar]
  2. E. Nikulchev; E. Pluzhnik, D. Biryukov et al., International Journal of Advanced Computer Science and Applications,, 6, 22 (2015) [Google Scholar]
  3. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, https://cloudsecurityalliance.org/csaguide.pdf (2009) [Google Scholar]
  4. Ch. Hoff, Security guidance for critical areas of focus in cloud computing, pp. 12–20. https://cloudsecurityalliance.org/guidnce/csaguide.v3.0.pdf (2011) [Google Scholar]
  5. C. Hewitt, IEEE Internet Computing, 12, 96 (2008) [CrossRef] [Google Scholar]
  6. A.V. Brednik, Security issues of cloud computing. Analysis of methods of protection of the clouds from cloud security alliance (2013) Tambov, [In Rus] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.