Résumé de section

  • [ACC03]  R. Alfieri, R. Cecchini, V. Ciaschini, et al.: VOMS: an authorization system for virtual organizations, In: 1st European across grids conference, Spain, February 2003.

    [ACC+05] R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, Á. Frohner, K. Lrentey, F. Spataro, From gridmap-file to VOMS: managing authorization in a Grid environment, In: Future Generation Computer Systems, v.21 n.4, p.549-558, April 2005.

    [AMM+10] V. Asavei, A. D. B. Moldoveanu, F. Moldoveanu,  A. Morar, A. Egner: GPGPU for Cheaper 3D MMO Servers. In: Proceedings of the 9th WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS (TELE-INFO '10): New Aspects of Telecommunications and Informatics, Catania, Sicily, Italy, May 29-31, 2010, pp. 238-243.

    [B17] S. Bhowmik. Cloud Computing. Cambridge University Press, 2017. ISBN 978-1-316-63810-1.

    [BBF+06] T. Barton, J. Basney, T. Freeman, T. Scavo, F. Siebenlist, V. Welch, R. Ananthakrishnan, B. Baker, M. Goode, K. Keahey: Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, GridShib, and MyProxy. In: Proceedings of the fifth annual PKI R&D workshop, April 2006.

    [BDG04] M. L. Bote-Lorenzo, Y.A. Dimitriadis, E. Gómez-Sánchez: Grid characteristics and uses: a grid definition. In: First European across grids conference, Santiago de Compostela, Spain, February 13- 14, 2004.

    [BEE16] K. Benzekki, A. El Fergougui, and A. Elbelrhiti Elalaoui. Software‐defined networking (SDN): a survey. Security and communication networks, 2016, 9(18), 5803-5833.

    [BGM+03] R. Baker, L. Gommans, A. McNab, M. Lorch, L. Ramakrishnan, K. Sarkar, M. R. Thompson: Conceptual Grid Authorization Framework and Classification. In: Global Grid Forum Working Group on Authorization Frameworks and Mechanisms, (2003).

     [BJR+06] J. Brainard, A. Juels, R. Rivest, M. Szydlo, M. Yung: Fourth Factor Authentication: Somebody You Know, In: ACM CCS, pp. 168 – 178, 2006.

    [C10] Čo je to due diligence a kedy sa s ním podnikateľ môže stretnúť?, 2010. Dostupné na: https://www.podnikajte.sk/investor/due-diligence [9.11.2019].

    [CD19] C. Dotson. “Practical Cloud Security”. O’Reilly Media, Inc. 2019

    [CERN] Worldwide LHC Computing Grid (WLCG), Dostupné na: wlcg-public.web.cern.ch [9.11.2019].

    [CG08] M. Creel, W. L. Goffe: Multi-core CPUs, clusters, and grid computing: A tutorial, In:  Computational Economics, 32 (4), Springer, pp. 353-382.

    [Colla] “Collaboratory for Multi-scale Chemical Sciences (CMCS),” Web Page. Dostupné na: http://cmcs.ca.sandia.gov/ [9.11.2019].

    [CO02] D. W. Chadwick, O. Otenko: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), June 2002.

    [CR16] V. Chang,  M. Ramachandran: Towards  achieving  Data  Security  with  the  Cloud Computing Adoption Framework. In: IEEE Transactions on Services Computing, 9(1), 138-151, 2016.

    [CRA+17] A. Cook, M. Robinson, M. A. Ferrag, L. A. Maglaras, Y. He, K. Jones, H. Janicke: Internet of Cloud: Security and Privacy issues. arXiv:1711.00525. Dostupné na: https://arxiv.org/pdf/1711.00525.pdf [9.11.2019].

    [CSA17] Cloud Security Alliance: The Treacherous 12 - Top Threats to Cloud Computing + Industry Insights. 2017.

    [CSA19] Cloud Security Alliance:  Top Threats to Cloud Computing The Egregious 11. 2019.

    [CTK19]  L. Chen, H. Takabi, N-A. Le-Khac (Eds.): Security, Privacy, and Digital Forensics in the Cloud. High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385.

    [D19] Ch. Dotson. Practical Cloud Security: A Guide for Secure Design and Deployment, O'Reilly Media, 2019. 196 s. ISBN 9781492037514.

    [DW16] B. Duncan, M. Whittington: Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail,  In: Conference on CLOUD COMPUTING, 2016, pp. 119-144.

    [F09] F. Magoules, et al. Introduction to grid computing. CRC press, 2009.

    [FC04] A. Frohner, V. Ciaschini: VOMS Credential Format. Technischer Bericht, DataGRID, 2004, Dostupné na: http://edg-wp2.web.cern.ch/edg-wp2/security/voms/edg-voms-credential.pdf.

    [FC05] I. Foster, L. Childers: Introduction to GT4. Tutorial at the APAC Conference and Exhibition on Advanced Computing, Grid Applications and eResearch (APAC’05), Royal Pines Resort, Gold Coast, Australien, September 2005.

    [FH17] R. Fox, W. Hao. Internet Infrastructure: Networking, Web Services, and Cloud Computing. CRC Press, 2017. ISBN 9781138039919.

    [FK03] I. Foster, C. Kesselman: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2003.

    [FKT01] Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations, In: International Journal of Supercomputer Applications, 15, 2001.

    [FZR+08] I. Foster, Y. Zhao, I. Raicu and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared”, Proceedings of the IEEE Grid Computing Environments Workshop, pp. 1-10, 2008.

    [Glob] The Globus Toolkit, Dostupné na: http://www.globus.org/toolkit/.

    [G19] Gartner Glossary: Cloud Computing. Dostupné na: https://www.gartner.com/en/information-technology/glossary/cloud-computing [9.11.2019].

    [GJ18] F.M. Groom, S. S. Jones (Eds.). Enterprise Cloud Computing for Non-Engineers. CRC Press. 2018. ISBN 9781138106215.

    [HGK+15] W.  Huang,  A.  Ganjali,  B.  H.  Kim,  S.  Oh,  and  D.  Lie: The  state of  public  infrastructure-as-a-service  cloud  security. ACM ComputingSurveys (CSUR), vol. 47, no. 4, p. 68, 2015.

    [IKD+16] S.  Iqbal, M.  L.  M.  Kiah, B.  Dhaghighi,  M.  Hussain,S.  Khan,  M.  K.  Khan,  K.-K.  R.  Choo,  On  CloudSecurity Attacks:  A Taxonomy and Intrusion Detection  and  Prevention  as  a  Service,  Journal  of  Network  and  Computer  Applications. 74  (2016)  98–120, doi:10.1016/j.jnca.2016.08.016.

    [IMZ16] T. Islam, D. Manivannan, S. Zeadally: A Classification and Characterization of Security Threats in Cloud Computing. Int. J. Next-Gener. Comput 7.1 (2016).

    [IF01] A. Iamnitchi, I. Foster: On fully decentralized resource discovery in grid environments. In: GRID '01: Proceedings of the Second International Workshop on Grid Computing. London, UK: Springer-Verlag, 2001, pp. 51-62.

    [ISO14] ISO/IEC 17789:2014. Information Technology-Cloud computing-Reference architecture. Technical report, International Organization for Standardization. 2014.

    [JAE10] W. Jie, J. Arshad, P. Ekin: Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences, In: The Journal of Supercomputing, Volume 52 Issue 1, April 2010, 82-96.

    [JJS98] H. Jägers W. Jansen, W. Steenbakkers: Characteristics of Virtual Organizations [online]. In: Organizational Virtualness: Proceedings of the VoNet Workshop, April 27-28, 1998, Bern, Switzerland pp 65-76.

     [K18] S. Khillar: Difference between Grid Computing and Cloud Computing. DifferenceBetween.net. November 13, 2018 Dostupné na: http://www.differencebetween.net/technology/difference-between-grid-computing-and-cloud-computing/ [17.1.2019]

    [Kou05] D. Kouřil: Bezpečnost v distribuovaném prostředí. In: Zpravodaj ÚVT MU. ISSN 1212-0901, 2005, roč. XV, č. 4, s. 2-6.

    [KF98] C. Kesselman, I. Foster, The Grid: Blueprint for a New Computing Infrastructure, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1998.

     [KMR07] D. Klusáček, L. Matyska, H. Rudová, Problematika plánování úloh v prostředí Gridu. In Širokopásmové sítě a jejich aplikace, pages 55-59. Univerzita Palackého v Olomouci, 2007. 

    [KS15] R. Kumar, C. Shilpi: Comparison between cloud computing, grid computing, cluster computing and virtualization. International Journal of Modern Computer Science and Applications 3.1 (2015): 42-47.

     [KSD07] M. Kratz, J. Silverstein, P. Dev: Integrated Research Team Final Report: Health Grid: grid technologies for biomedicine (1-2 March 2006). Stud Health Technol Inform 2008, 138:201-223.

    [KZ15]  M. Kazim, S. Y. Zhu: A survey on top security
threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA), 6 (3). 2015. doi: 10.14569/ IJACSA.2015.060316#sthash.hDOJaK6L.dpuf

    [L+03] M. Lorch, et al.: Conceptual Grid Authorization Framework and Classification. Global Grid Forum Authorization Frameworks and Mechanisms–WG. GFD-I.038. February 2003 (Revised November 2004).

    [M04] D. Minoli: A networking approach to grid computing. John Wiley & Sons, 2004.

    [M17] D. C. Marinescu: Cloud computing: theory and practice. Morgan Kaufmann, 2017.

    [MB16] S. Murugesan, I. Bojanova, eds. Encyclopedia of cloud computing. John Wiley & Sons, IEEE Press, 2016. ISBN 9781118821978.

    [MBH05] J. Martin, J. Basney, M. Humphrey: Extending Existing Campus Trust Relationships to the Grid through the Integration of Pubcookie and MyProxy. International Conference on Computational Science (ICCS 2005), Emory University, Atlanta, GA, USA, May 2005.

    [MG11] P. Mell, P., T. Grance. The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology. NIST. Special Publication 800-145. 2011.

    [MGM10] M. A. Morsy, J. Grundy, I. Müller: An Analysis of The Cloud Computing Security Problem. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.

    [MOV96] A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7.

    [MSZ07] J. M. Milke, M. Schiffers, W. Ziegler: Rahmenkonzept für das Management Virtueller Organisationen im D-Grid (Version 1.0). Technischer Bericht, D-Grid, 2007, http://dgi.d-grid.de/fileadmin/user_upload/documents/DGI-FG1-10/VO_Rahmenkonzept_0.9.3.3.doc.

    [MTS+01] C. Lee, S. Matsuoka, D. Talia, A. Sussman, N. Karonis, G. Allen, J. Saltz: A Grid Programming Primer, August 2001, Global Grid Forum, Advanced Programming Models Working Group. Available from <www.gridforum.org> <http://www.gridforum.org/7_APM/APS.htm>.

    [NT94] B. C. Neumann, T. Ts’o: Kerberors: an Authentication Service for Computer Networks. In: IEEE Communications, 32(9):33-38, Sept 1994.

    [OAF18] I. Odun-Ayo, O. Ajayi, A. Falade. Cloud Computing and Quality of Service: Issues and Developments. Proceedings of the International MultiConference of Engineers and Computer Scientists 2018 Vol I, IMECS 2018, 2018, Hong Kong.

    [PKW+03] l. Pearlman, C. Kesselman, V. Welch, I. Foster, S. Tuecke: The Community Authorization Service: Status and Future. In: Proceedings of Computing in High Energy Physics 03 (CHEP’03), 2003, http://www.globus.org/alliance/publications/papers/CAS_update_CHEP_03-final.pdf.

    [R16] N. B. Ruparelia, N. Ruparelia. Cloud computing. MIT Press, 2016.

    [R19] RightScale STATE OF THE CLOUD REPORT from Flexera. 2019. Dostupné na: http://googliers.net/static/media/uploads/download_files/2019_state_of_the_cloud_report.pdf

    [RFC2704] M. Blaze, et.al.: The KeyNote Trust Management System. IETF RFC 2704, http://www.ietf.org/rfc/rfc2704.txt?number=2704.

    [RSA78] R. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. In: Communications of the ACM, vol. 21, 1978, no. 2, pp. 120-126, ISSN 0001-0782.

    [RTH+09] T. Ristenpart, E. Tromer, H. Shacham, S. Savage. Hey, you, get off of mycloud: exploring information leakage in third-party compute clouds. In CCS, 2009.

    [S13] P. Sharma. Grid Computing Vs. Cloud Computing, International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582.

    [S14] S. Srinivasan. Cloud computing basics. Springer, 2014. ISBN 978-1-4614-7698-6.

    [SB17] S. Bhowmik. Cloud Computing. Cambridge University Press. 2017

    [SLW98] Y.P. Shao, S.Y. Liao, H.Q. Wang: A model of virtual organizations. In: Journal of Information Science, 24(5):305-312, 1998.

    [SPB+16] j. Singh, T. Pasquier, J. Bacon, H. Ko, D. Eyers: Twenty Security Considerations for Cloud- Supported Internet of Things. IEEE Internet of Things Journal 3(3) (2016): 269–284. doi:10.1109/jiot.2015.2460333.

    [SR19] Cloud Security Threat Report (CSTR) - Adapting to the New Reality of Evolving Cloud Threats. Symantec. 2019

    [SSB02] Y. Shi, A. Shortridge, J. Bartholic: Grid Computing for Real Time Distributed Collaborative Geoprocessing. In: Proceedings of ISPRS (International Society for Photogrammetry and Remote Sensing) Commission IV Symposium on Geospatial Theory, Processing and Applications: 9–12 July 2002; Ottawa, Canada.

    [Sto07] H. Stockinger: Defining the grid: a snapshot on the current view, In: The Journal of Supercomputing, v.42 n.1, p.3-17, October 2007.

    [TEM03] M. Thompson, A. Essiari, S. Mudumbai: Certificate-based Authorization Policy in a PKI Environment. In: ACM Transactions on Information and System Security (TISSEC), Volume 6, Issue 4 (Nov. 2003) pp 566-588.

    [Val09] Valmis BalticGrid-II projekti raport DSA3.3: Best practices in Grid-enabling applications for EGEE-like infrastructure. 7th Frame project, 2009.

    [Vegee] Úvod do gridového počítania. Projekt EGEE. Dostupné na http://www.ui.sav.sk/egee/uploads/gridove_pocitanie.pdf.

    [WCG] World Community Grid. Dostupné na https://www.worldcommunitygrid.org

    [TYP+15] Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil,“Security and privacy in cloud computing: Vision, trends, andchallenges,”IEEE Cloud Computing, vol. 2, no. 2, pp. 30–38,2015.

    [Zim95] P. R. Zimmermann: The Official PGP User’s Guide. MIT Press, 1995, ISBN 0-2627-4017-6.

    [ZCD+17] J. Zhou, Z. Cao, X. Dong, A. V. Vasilakos. Security and privacyfor cloud-based IoT: Challenges. IEEE Commun. Mag., vol. 55, no. 1,pp. 26–33, Jan. 2017.