

An Overview of Social Network in Cloud Computing Threats to Privacy
Abstract
Keywords
References
Security Within a Virtualized Environment: A New Layer in Layered Security, White Paper, Reflex Security, retrieved April 23, 2010,URL:http://www.vmware.com/files/pdf/partners/security/security-virtualizedwhitepaper.pdf>.
Ransomware: Would You Pay Up? Naked Security, ttp://nakedsecurity .sophos.com/2012/09/25/ransomware-would-you-pay-up/
eve McDonald, Legal and Quasi-Legal Issues in Cloud Computing Contracts, Workshop Document, EDUCAUSE and NACUBO Workshop on Cloud Computing .
Robert McMillan, Salesforce.com Warns Customers of Phishing Scam, PC Magazine, IDG News Network, November 6, 2007, .
Robert McMillan, Hackers Find a Home in Amazon's EC2 Cloud, Infoworld, IDG News Network, December 10, 2009,URL: .
Cloud Standards Customer Council (2011). Practical Guide to Cloud Computing http://www.cloud‐council.org/2011_Practical_Guide_to_Cloud%20Computing.pdf
Cloud Standards Customer Council (2012). Practical Guide to Cloud Service Level Agreements http://www.cloud‐council.org/2012_Practical_Guide_to_Cloud_SLAs.pdf
Cloud Standards Customer Council (2012). Security for Cloud Computing: 10 Stepsto Ensure Success. http://www.cloud-council.org/Security_for_Cloud_Computing-Final_080912.pdf
A Look Inside Facebook's Data Center.http://www.datacenterknowledge.com/ archives/2009/04/17/a-look-inside-facebooks-data-center/. [Online: accessed August 2012].
Facebook: Virtualisation does not scale.http://www.zdnet.co.uk/blogs/mappingbabel-0017967/facebook-virtualisation-does-not-scale-10021998/. [Online: accessed June 2012].
DOI: http://dx.doi.org/10.36039/AA122013003
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.