dc.contributor.author | Yildiz, M. | |
dc.contributor.author | Abawajy, J. | |
dc.contributor.author | Ercan, T. | |
dc.contributor.author | Bernoth, A. | |
dc.date.accessioned | 2021-01-25T20:51:48Z | |
dc.date.available | 2021-01-25T20:51:48Z | |
dc.date.issued | 2009 | |
dc.identifier | 10.1109/I-SPAN.2009.157 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-77949849343&doi=10.1109%2fI-SPAN.2009.157&partnerID=40&md5=a0834f792ceb7f30c1f48218ab886a76 | |
dc.identifier.uri | https://dspace.yasar.edu.tr/xmlui/handle/20.500.12742/10703 | |
dc.description.abstract | This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet In | |
dc.language.iso | English | |
dc.publisher | I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks | |
dc.title | A layered security approach for cloud computing infrastructure | |
dc.type | Conference Paper | |
dc.relation.firstpage | 763 | |
dc.relation.lastpage | 767 | |
dc.description.affiliations | Global Technology Services, IBM Australia, Melbourne, VIC, Australia; Department of Computer Engineering, Yasar University, Izmir, Turkey; School of Engineering and Information Technology, Deakin University, Geelong, VIC, Australia | |