ITM Web Conf.
Volume 18, 20187th Seminar on Industrial Control Systems: Analysis, Modeling and Computing (ICS 2018)
|Number of page(s)||4|
|Section||Devices, equipment and assistive technologies|
|Published online||09 April 2018|
- N. Sultan, International Journal of Information Management, 34, 177 (2014) [CrossRef] [Google Scholar]
- E. Nikulchev; E. Pluzhnik, D. Biryukov et al., International Journal of Advanced Computer Science and Applications,, 6, 22 (2015) [Google Scholar]
- Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, https://cloudsecurityalliance.org/csaguide.pdf (2009) [Google Scholar]
- Ch. Hoff, Security guidance for critical areas of focus in cloud computing, pp. 12–20. https://cloudsecurityalliance.org/guidnce/csaguide.v3.0.pdf (2011) [Google Scholar]
- C. Hewitt, IEEE Internet Computing, 12, 96 (2008) [CrossRef] [Google Scholar]
- A.V. Brednik, Security issues of cloud computing. Analysis of methods of protection of the clouds from cloud security alliance (2013) Tambov, [In Rus] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.