Analisis Teknik-Teknik Keamanan Pada Future Cloud Computing vs Current Cloud Computing: Survey Paper
(1) Universitas Mercu Buana
(*) Corresponding Author
Abstrak
Kata Kunci
Teks Lengkap:
PDFReferensi
P. Mell, T. Grance, The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, 2009, tersedia pada laman situs: http://csrc.nist.gov/groups/SNS/cloud-computing (Diakses pada: 14 Oktober 2015).
Cisco Global Cloud Index: Forecast and Methodology, 2012–2017, tersedia pada laman situs: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.html (Diakses pada: 14 Oktober 2015).
Ida Bagus Verry Hendrawan Manuaba, Risanuri Hidayat, dan Sri Suning Kusumawardani. Evaluasi Keamanan Akses Jaringan Komputer Nirkabel (Kasus : Kantor Pusat Fakultas Teknik Universitas Gadjah Mada). Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Vol. 1 No. 1, pp 13-17. Mei 2012.
Sugiyanto. Prototipe Sistem Informasi Haji Untuk Menangani Jemaah Tersesat Menggunakan SMS Gateway. Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI). Vol. 03 No. 2, pp 123-128. Mei 2014.
Andrew B. Osmond, Lukito Edi Nugroho, dan Sri Suning Kusumawardhani. Aplikasi Pengumpulan Data Survei Memanfaatkan SMS Gateway. Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Vol. 5 No. 1, Februari 2016.
Rahamatullah Khondoker, Beny Nugraha, Ronald Marx, and Kpatcha Bayarou. Security Of Selected Future Internet Architectures: A Survey. In Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pages 433-440. July 2014.
Steve Hanna. Cloud Computing: Finding the Silver Lining. Juniper Networks. 2009.
Klöti, Rowan. “Open flow: A security analysis. Master’s thesis”, Eidgenössische Technische Hochschule Zürich, 2013.
Jelena Mirkovic, Sven Dietrich, David Dittrich, and Peter Reiher. Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, 2005.
Ciampa, Mark. Security Plus Guide to Network Security Fundamentals. Cengage Learning, 3rd edition, 2009.
EagleNet. Layer 3 Virtual Private Network Service, tersedia pada laman situs: https://www.co-eaglenet.net/services/layer-3-virtual-private-network/ (Diakses pada: Juli 2015).
Bob Hunt. Windows Azure Hybrid Cloud Authentication and Access Architectures, tersedia pada laman situs: http://blogs.technet.com/b/bobh/archive/2013/01/31/windows-azure-hybrid-cloud-authentication-and-access-architectures-discussion-31-days-of-windows-servers-vms-in-the-cloud-part-31-of-31.aspx (Diakses pada: Juli 2015).
Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naeslund, dan Makan Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. In International Journal of Cloud Computing: Advances, Systems and Applications. Volume 1, Issue 11. 2012.
Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, dan Christopher S. Yoo. The nebula future internet architecture. Lecture Notes in Computer Science, pages 1–24. Volume 7858, 2013.
Jianli Pan, Subharthi Paul, dan Raj Jain. A survey of the research on future internet architectures. In IEEE Communication Magazine, pages 20–36, July 2011.
Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael Freedman, Andreas Haeberlen, Zack Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, dan Christopher Yoo. Technical report. nebula - a future internet that supports trustworthy cloud computing. Pages 1–31, 2011.
Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazieres, Michael Miller, and Arun Seehra. Verifying and enforcing network paths with ICING, in Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (CoNEXT 2011), Article No. 30, 2011.
Artikel Statistik
PDF telah dilihat : 4194 kali
Refbacks
- Saat ini tidak ada refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Alamat Redaksi : Departemen Sistem Informasi, Fakultas Teknologi Informasi Universitas Andalas Kampus Limau Manis, Padang 25163, Sumatera Barat email: teknosi@fti.unand.ac.id |
Jumlah Pengunjung :
This work by JSI-Unand and licensed under a CC BY-SA 4.0 International License.