Résumé de section
-
[ACC03] R. Alfieri, R. Cecchini, V. Ciaschini, et al.: VOMS: an authorization system for virtual organizations, In: 1st European across grids conference, Spain, February 2003.
[ACC+05] R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, Á. Frohner, K. Lrentey, F. Spataro, From gridmap-file to VOMS: managing authorization in a Grid environment, In: Future Generation Computer Systems, v.21 n.4, p.549-558, April 2005.
[AMM+10] V. Asavei, A. D. B. Moldoveanu, F. Moldoveanu, A. Morar, A. Egner: GPGPU for Cheaper 3D MMO Servers. In: Proceedings of the 9th WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS (TELE-INFO '10): New Aspects of Telecommunications and Informatics, Catania, Sicily, Italy, May 29-31, 2010, pp. 238-243.
[B17] S. Bhowmik. Cloud Computing. Cambridge University Press, 2017. ISBN 978-1-316-63810-1.
[BBF+06] T. Barton, J. Basney, T. Freeman, T. Scavo, F. Siebenlist, V. Welch, R. Ananthakrishnan, B. Baker, M. Goode, K. Keahey: Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, GridShib, and MyProxy. In: Proceedings of the fifth annual PKI R&D workshop, April 2006.
[BDG04] M. L. Bote-Lorenzo, Y.A. Dimitriadis, E. Gómez-Sánchez: Grid characteristics and uses: a grid definition. In: First European across grids conference, Santiago de Compostela, Spain, February 13- 14, 2004.
[BEE16] K. Benzekki, A. El Fergougui, and A. Elbelrhiti Elalaoui. Software‐defined networking (SDN): a survey. Security and communication networks, 2016, 9(18), 5803-5833.
[BGM+03] R. Baker, L. Gommans, A. McNab, M. Lorch, L. Ramakrishnan, K. Sarkar, M. R. Thompson: Conceptual Grid Authorization Framework and Classification. In: Global Grid Forum Working Group on Authorization Frameworks and Mechanisms, (2003).
[BJR+06] J. Brainard, A. Juels, R. Rivest, M. Szydlo, M. Yung: Fourth Factor Authentication: Somebody You Know, In: ACM CCS, pp. 168 – 178, 2006.
[C10] Čo je to due diligence a kedy sa s ním podnikateľ môže stretnúť?, 2010. Dostupné na: https://www.podnikajte.sk/investor/due-diligence [9.11.2019].
[CD19] C. Dotson. “Practical Cloud Security”. O’Reilly Media, Inc. 2019
[CERN] Worldwide LHC Computing Grid (WLCG), Dostupné na: wlcg-public.web.cern.ch [9.11.2019].
[CG08] M. Creel, W. L. Goffe: Multi-core CPUs, clusters, and grid computing: A tutorial, In: Computational Economics, 32 (4), Springer, pp. 353-382.
[Colla] “Collaboratory for Multi-scale Chemical Sciences (CMCS),” Web Page. Dostupné na: http://cmcs.ca.sandia.gov/ [9.11.2019].
[CO02] D. W. Chadwick, O. Otenko: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), June 2002.
[CR16] V. Chang, M. Ramachandran: Towards achieving Data Security with the Cloud Computing Adoption Framework. In: IEEE Transactions on Services Computing, 9(1), 138-151, 2016.
[CRA+17] A. Cook, M. Robinson, M. A. Ferrag, L. A. Maglaras, Y. He, K. Jones, H. Janicke: Internet of Cloud: Security and Privacy issues. arXiv:1711.00525. Dostupné na: https://arxiv.org/pdf/1711.00525.pdf [9.11.2019].
[CSA17] Cloud Security Alliance: The Treacherous 12 - Top Threats to Cloud Computing + Industry Insights. 2017.
[CSA19] Cloud Security Alliance: Top Threats to Cloud Computing The Egregious 11. 2019.
[CTK19] L. Chen, H. Takabi, N-A. Le-Khac (Eds.): Security, Privacy, and Digital Forensics in the Cloud. High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385.
[D19] Ch. Dotson. Practical Cloud Security: A Guide for Secure Design and Deployment, O'Reilly Media, 2019. 196 s. ISBN 9781492037514.
[DW16] B. Duncan, M. Whittington: Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail, In: Conference on CLOUD COMPUTING, 2016, pp. 119-144.
[F09] F. Magoules, et al. Introduction to grid computing. CRC press, 2009.
[FC04] A. Frohner, V. Ciaschini: VOMS Credential Format. Technischer Bericht, DataGRID, 2004, Dostupné na: http://edg-wp2.web.cern.ch/edg-wp2/security/voms/edg-voms-credential.pdf.
[FC05] I. Foster, L. Childers: Introduction to GT4. Tutorial at the APAC Conference and Exhibition on Advanced Computing, Grid Applications and eResearch (APAC’05), Royal Pines Resort, Gold Coast, Australien, September 2005.
[FH17] R. Fox, W. Hao. Internet Infrastructure: Networking, Web Services, and Cloud Computing. CRC Press, 2017. ISBN 9781138039919.
[FK03] I. Foster, C. Kesselman: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2003.
[FKT01] Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations, In: International Journal of Supercomputer Applications, 15, 2001.
[FZR+08] I. Foster, Y. Zhao, I. Raicu and S. Lu, “Cloud Computing and Grid Computing 360-Degree Compared”, Proceedings of the IEEE Grid Computing Environments Workshop, pp. 1-10, 2008.
[Glob] The Globus Toolkit, Dostupné na: http://www.globus.org/toolkit/.
[G19] Gartner Glossary: Cloud Computing. Dostupné na: https://www.gartner.com/en/information-technology/glossary/cloud-computing [9.11.2019].
[GJ18] F.M. Groom, S. S. Jones (Eds.). Enterprise Cloud Computing for Non-Engineers. CRC Press. 2018. ISBN 9781138106215.
[HGK+15] W. Huang, A. Ganjali, B. H. Kim, S. Oh, and D. Lie: The state of public infrastructure-as-a-service cloud security. ACM ComputingSurveys (CSUR), vol. 47, no. 4, p. 68, 2015.
[IKD+16] S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain,S. Khan, M. K. Khan, K.-K. R. Choo, On CloudSecurity Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service, Journal of Network and Computer Applications. 74 (2016) 98–120, doi:10.1016/j.jnca.2016.08.016.
[IMZ16] T. Islam, D. Manivannan, S. Zeadally: A Classification and Characterization of Security Threats in Cloud Computing. Int. J. Next-Gener. Comput 7.1 (2016).
[IF01] A. Iamnitchi, I. Foster: On fully decentralized resource discovery in grid environments. In: GRID '01: Proceedings of the Second International Workshop on Grid Computing. London, UK: Springer-Verlag, 2001, pp. 51-62.
[ISO14] ISO/IEC 17789:2014. Information Technology-Cloud computing-Reference architecture. Technical report, International Organization for Standardization. 2014.
[JAE10] W. Jie, J. Arshad, P. Ekin: Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences, In: The Journal of Supercomputing, Volume 52 Issue 1, April 2010, 82-96.
[JJS98] H. Jägers W. Jansen, W. Steenbakkers: Characteristics of Virtual Organizations [online]. In: Organizational Virtualness: Proceedings of the VoNet Workshop, April 27-28, 1998, Bern, Switzerland pp 65-76.
[K18] S. Khillar: Difference between Grid Computing and Cloud Computing. DifferenceBetween.net. November 13, 2018 Dostupné na: http://www.differencebetween.net/technology/difference-between-grid-computing-and-cloud-computing/ [17.1.2019]
[Kou05] D. Kouřil: Bezpečnost v distribuovaném prostředí. In: Zpravodaj ÚVT MU. ISSN 1212-0901, 2005, roč. XV, č. 4, s. 2-6.
[KF98] C. Kesselman, I. Foster, The Grid: Blueprint for a New Computing Infrastructure, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1998.
[KS15] R. Kumar, C. Shilpi: Comparison between cloud computing, grid computing, cluster computing and virtualization. International Journal of Modern Computer Science and Applications 3.1 (2015): 42-47.
[KSD07] M. Kratz, J. Silverstein, P. Dev: Integrated Research Team Final Report: Health Grid: grid technologies for biomedicine (1-2 March 2006). Stud Health Technol Inform 2008, 138:201-223.
[KZ15] M. Kazim, S. Y. Zhu: A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA), 6 (3). 2015. doi: 10.14569/ IJACSA.2015.060316#sthash.hDOJaK6L.dpuf
[L+03] M. Lorch, et al.: Conceptual Grid Authorization Framework and Classification. Global Grid Forum Authorization Frameworks and Mechanisms–WG. GFD-I.038. February 2003 (Revised November 2004).
[M04] D. Minoli: A networking approach to grid computing. John Wiley & Sons, 2004.
[M17] D. C. Marinescu: Cloud computing: theory and practice. Morgan Kaufmann, 2017.
[MB16] S. Murugesan, I. Bojanova, eds. Encyclopedia of cloud computing. John Wiley & Sons, IEEE Press, 2016. ISBN 9781118821978.
[MBH05] J. Martin, J. Basney, M. Humphrey: Extending Existing Campus Trust Relationships to the Grid through the Integration of Pubcookie and MyProxy. International Conference on Computational Science (ICCS 2005), Emory University, Atlanta, GA, USA, May 2005.
[MG11] P. Mell, P., T. Grance. The NIST definition of cloud computing. Recommendations of the National Institute of Standards and Technology. NIST. Special Publication 800-145. 2011.
[MGM10] M. A. Morsy, J. Grundy, I. Müller: An Analysis of The Cloud Computing Security Problem. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
[MOV96] A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC Press, 1996, ISBN 0-8493-8523-7.
[MSZ07] J. M. Milke, M. Schiffers, W. Ziegler: Rahmenkonzept für das Management Virtueller Organisationen im D-Grid (Version 1.0). Technischer Bericht, D-Grid, 2007, http://dgi.d-grid.de/fileadmin/user_upload/documents/DGI-FG1-10/VO_Rahmenkonzept_0.9.3.3.doc.
[MTS+01] C. Lee, S. Matsuoka, D. Talia, A. Sussman, N. Karonis, G. Allen, J. Saltz: A Grid Programming Primer, August 2001, Global Grid Forum, Advanced Programming Models Working Group. Available from <www.gridforum.org> <http://www.gridforum.org/7_APM/APS.htm>.
[NT94] B. C. Neumann, T. Ts’o: Kerberors: an Authentication Service for Computer Networks. In: IEEE Communications, 32(9):33-38, Sept 1994.
[OAF18] I. Odun-Ayo, O. Ajayi, A. Falade. Cloud Computing and Quality of Service: Issues and Developments. Proceedings of the International MultiConference of Engineers and Computer Scientists 2018 Vol I, IMECS 2018, 2018, Hong Kong.
[PKW+03] l. Pearlman, C. Kesselman, V. Welch, I. Foster, S. Tuecke: The Community Authorization Service: Status and Future. In: Proceedings of Computing in High Energy Physics 03 (CHEP’03), 2003, http://www.globus.org/alliance/publications/papers/CAS_update_CHEP_03-final.pdf.
[R16] N. B. Ruparelia, N. Ruparelia. Cloud computing. MIT Press, 2016.
[R19] RightScale STATE OF THE CLOUD REPORT from Flexera. 2019. Dostupné na: http://googliers.net/static/media/uploads/download_files/2019_state_of_the_cloud_report.pdf
[RFC2704] M. Blaze, et.al.: The KeyNote Trust Management System. IETF RFC 2704, http://www.ietf.org/rfc/rfc2704.txt?number=2704.
[RSA78] R. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. In: Communications of the ACM, vol. 21, 1978, no. 2, pp. 120-126, ISSN 0001-0782.
[RTH+09] T. Ristenpart, E. Tromer, H. Shacham, S. Savage. Hey, you, get off of mycloud: exploring information leakage in third-party compute clouds. In CCS, 2009.
[S13] P. Sharma. Grid Computing Vs. Cloud Computing, International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582.
[S14] S. Srinivasan. Cloud computing basics. Springer, 2014. ISBN 978-1-4614-7698-6.
[SB17] S. Bhowmik. Cloud Computing. Cambridge University Press. 2017
[SLW98] Y.P. Shao, S.Y. Liao, H.Q. Wang: A model of virtual organizations. In: Journal of Information Science, 24(5):305-312, 1998.
[SPB+16] j. Singh, T. Pasquier, J. Bacon, H. Ko, D. Eyers: Twenty Security Considerations for Cloud- Supported Internet of Things. IEEE Internet of Things Journal 3(3) (2016): 269–284. doi:10.1109/jiot.2015.2460333.
[SR19] Cloud Security Threat Report (CSTR) - Adapting to the New Reality of Evolving Cloud Threats. Symantec. 2019
[SSB02] Y. Shi, A. Shortridge, J. Bartholic: Grid Computing for Real Time Distributed Collaborative Geoprocessing. In: Proceedings of ISPRS (International Society for Photogrammetry and Remote Sensing) Commission IV Symposium on Geospatial Theory, Processing and Applications: 9–12 July 2002; Ottawa, Canada.
[Sto07] H. Stockinger: Defining the grid: a snapshot on the current view, In: The Journal of Supercomputing, v.42 n.1, p.3-17, October 2007.
[TEM03] M. Thompson, A. Essiari, S. Mudumbai: Certificate-based Authorization Policy in a PKI Environment. In: ACM Transactions on Information and System Security (TISSEC), Volume 6, Issue 4 (Nov. 2003) pp 566-588.
[Val09] Valmis BalticGrid-II projekti raport DSA3.3: Best practices in Grid-enabling applications for EGEE-like infrastructure. 7th Frame project, 2009.
[Vegee] Úvod do gridového počítania. Projekt EGEE. Dostupné na http://www.ui.sav.sk/egee/uploads/gridove_pocitanie.pdf.
[WCG] World Community Grid. Dostupné na https://www.worldcommunitygrid.org
[TYP+15] Z. Tari, X. Yi, U. S. Premarathne, P. Bertok, and I. Khalil,“Security and privacy in cloud computing: Vision, trends, andchallenges,”IEEE Cloud Computing, vol. 2, no. 2, pp. 30–38,2015.
[Zim95] P. R. Zimmermann: The Official PGP User’s Guide. MIT Press, 1995, ISBN 0-2627-4017-6.
[ZCD+17] J. Zhou, Z. Cao, X. Dong, A. V. Vasilakos. Security and privacyfor cloud-based IoT: Challenges. IEEE Commun. Mag., vol. 55, no. 1,pp. 26–33, Jan. 2017.