1 김희열, "하이브리드 보안 프로토콜을 이용한 신뢰 클라우드 컴퓨팅 플랫폼 개선" 한국정보기술학회 13 (13): 65-72, 2015
2 김재상, "프라이빗 클라우드 환경에 적합한 WHDI 기반 스마트 디바이스간의 콘텐츠 공유 기술" 한국정보기술학회 13 (13): 109-115, 2015
3 "https://en.wikipedia.org/wiki/OneDrive"
4 Shengmei Luo, "Virtualization security for cloud computing service" 174-179, 2011
5 Min Zhu, "VASP : Virtualization assisted security monitor for cross-platform protection" SAC 554-559, 2011
6 J. Linden, "Twinstrata publishes a snapshot into cloud storage adoption from 2012 cloud computing expo"
7 A. Nusca., "The future of cloud computing:9 trends for 2012 @ONLINE"
8 National Institute of Standards and Technology, "The NIST Definition of Cloud Computing, nist special publication 800-145 edition"
9 Patricia Arias Cabarcos, "SuSSo : Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices" 58 (58): 1425-1433, 2012
10 H. Wang, "On the impact of virtualization on dropbox-like cloud file storage/synchronization services" 1-9, 2012
1 김희열, "하이브리드 보안 프로토콜을 이용한 신뢰 클라우드 컴퓨팅 플랫폼 개선" 한국정보기술학회 13 (13): 65-72, 2015
2 김재상, "프라이빗 클라우드 환경에 적합한 WHDI 기반 스마트 디바이스간의 콘텐츠 공유 기술" 한국정보기술학회 13 (13): 109-115, 2015
3 "https://en.wikipedia.org/wiki/OneDrive"
4 Shengmei Luo, "Virtualization security for cloud computing service" 174-179, 2011
5 Min Zhu, "VASP : Virtualization assisted security monitor for cross-platform protection" SAC 554-559, 2011
6 J. Linden, "Twinstrata publishes a snapshot into cloud storage adoption from 2012 cloud computing expo"
7 A. Nusca., "The future of cloud computing:9 trends for 2012 @ONLINE"
8 National Institute of Standards and Technology, "The NIST Definition of Cloud Computing, nist special publication 800-145 edition"
9 Patricia Arias Cabarcos, "SuSSo : Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices" 58 (58): 1425-1433, 2012
10 H. Wang, "On the impact of virtualization on dropbox-like cloud file storage/synchronization services" 1-9, 2012
11 P. Madsen, "Liberty ID-WSF Multi-Device SSO Deployment Guide"
12 I. Drago, "Inside dropbox : understanding personal cloud storage services" 481-494, 2012
13 F. Hao, "How to sync with Alice" 170-178, 2011
14 D. Quick, "Forensic collection of cloud storage data : Does the act of collection result in changes to the data or its metadata?" 10 (10): 266-277, 2013
15 P. Arias Cabarcos, "FamTV : An architecture for Presence-Aware Personalized Television" 57 (57): 6-13, 2011
16 S. Nimgaonkar, "Energy efficient memory authentication mechanism in embedded systems" 248-253, 2011
17 M. Barisch, "Design and Evaluation of an Architecture for Ubiquitous user Authentication based on Identity Management Systems" 863-872, 2011
18 M. Almorsy, "Collaboration-based cloud computing security management framework" 364-371, 2011
19 Fengzhe Zhang, "Cloudvisor : Retrofitting protection of virtual machines in multi-tenant cloud with Nested Virtualization" SOSP 203-216, 2011
20 A. S. Ibrahim, "Cloudsec : A security monitoring appliance for virtual machines in the iaas cloud model" 113-120, 2011
21 Satyajeet Nimgaonkar, "CTrust : A framework for Secure and Trustworthy application execution in Cloud computing" 24-31, 2012
22 Abhilash Sreeramaneni, "CIMS : A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing" 228-245, 2015
23 Hamid Banirostam, "A Trust Based Approach for Increasing Security in Clou Computing Infrastructure" 717-721, 2013