Ekonomiczne Problemy Usług

Previously: Zeszyty Naukowe Uniwersytetu Szczecińskiego. Ekonomiczne Problemy Usług

ISSN: 1896-382X     eISSN: 2353-2866    OAI    DOI: 10.18276/epu.2016.123-18
CC BY-SA   Open Access   DOAJ

Issue archive / nr 123 2016
Bezpieczeństwo prywatnych chmur obliczeniowych w kontekście dynamicznego rozwoju ICT
(Private clouds security in the context of ICT dynamic development)

Authors: Piotr Czerwonka
Uniwersytet Łódzki

Łukasz Zakonnik
Uniwersytet Łódzki
Keywords: cloud computing open source security
Data publikacji całości:2016
Page range:9 (193-201)
Cited-by (Crossref) ?:

Abstract

The article presents general trends in the development of cloud computing with an emphasis on aspects of security. The authors present three trends that through the development of cloud computing technology will affect the overall safety level of information systems in organizations. The study also outlines the challenges facing organizations that wish to deploy cloud technologies in the form of private cloud computing.
Download file

Article file

Bibliography

1.(July 2015), 2015 Top Markets Report Cloud Computing, A Market Assessment Tool for U.S. Exporters, http://trade.gov/topmarkets/pdf/ Cloud_Computing_
2.Top_Markets_Report.pdf.
3.Columbus, L. (2014), IDC Predicts SaaS Enterprise Applications Will Be A $50.8B Market By 2018, http://www.forbes.com/sites/louiscolumbus/2014/ 12/20/idc-predicts-saas-enterprise-applications-will-be-a-50-8b-market-by-2018.
4.Czerwonka P., Zakonnik Ł., Ewolucja i perspektywy rozwoju prywatnych chmur obli-czeniowych. Mity i fakty, „Przedsiębiorczość i Zarządzanie”, 16(9) (w druku).
5.Fagerland S., Grance W. (2015), The Inception framework: Cloud Hosted APT, https://www.bluecoat.com/security-blog/2014-12-09/blue-coat-exposes-%E2%
6.80%9C-inception-framework%E2%80%9D-very-sophisticated-layered-malware.
7.Florian C. (2014), Most vulnerable operating systems and applications in 2014, http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/.
8.Meulen R., Rivera J. (2014), Gartner Highlights the Top 10 Cloud Myths, http://www.gartner.com/newsroom/id/2889217.
9.Prysmakou A. (2015), Cloud Foundry Security Overview, http://events.
10.linuxfoundation.org/sites/events/files/slides/CFSummit_Security.pdf.
11.Reed A., Rezek C., Simmonds P. (2011), Security guidance for critical areas of focus in cloud computing V3.0, https://cloudsecurityalliance.org/download/
12.security-guidance-for-critical-areas-of-focus-in-cloud-computing-v3/.
13.Rovelli P. (2015), Don’t believe these four myths about Linux security, https://blogs.sophos.com/2015/03/26/dont-believe-these-four-myths-about-linux-security/.
14.State of cloud security report, AlertLogic 2014, https://www.alertlogic.com/
15.resources/cloud-security-report-2014.
16.State of cloud security report, AlertLogic 2010, https://www.alertlogic.com/
17.resources/cloud-security-report-2010
18.Weins K. (2015), Cloud Computing Trends: 2015 State of the Cloud Survey, http://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2015-state-cloud-survey.
19.Wyrok Trybunału Sprawiedliwości Unii Europejskiej z dnia 6 października 2015 roku, http://curia.europa.eu/juris/document/document.jsf?text=&docid= 169195&
20.pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=125031.