BULUTLI HISOBLASH PROVAYDERLARI RISKLARNI BOSHQARISH TIZIMI TAHLILI

Authors

  • Laziz Toxirovich Shirinov Muhammad al Xorazmiy nomidagi TATU, doktorant
  • Nurbek Baxtiyorovich Nasrullayev (Muhammad al-Xorazmiy nomidagi TATU Nurafshon filiali, PhD)

Keywords:

bulut, risk, Risk Management Framework, RMF, tahdid, cloud computing.

Abstract

Ushbu maqolada bulutli hisoblash provayderlari uchun ularning turlari va modellaridan qat’i nazar, NIST risklarni boshqarish jarayoni va risklarni boshqarish tizimi taklif etiladi. Bulutli hisoblash provayderlari asosan mahsulot va xizmatlarni taqdim etish va o‘z foydalariga xizmat qilishi bayon etilgan.

 

References

Brender, Nathalie, & Markov, Iliya. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726-733. doi: 10.1016/j.ijinfomgt.2013.05.004

Chonka, Ashley, Xiang, Yang, Zhou, Wanlei, & Bonti, Alessio. (2011). Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications, 34(4), 1097-1107. doi: 10.1016/j.jnca.2010.06.004

Liu, Wentao. (2012). Research on cloud computing security problem and strategy. Paper presented at the Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on.

Salah, Khaled, Calero, Jose M. Alcaraz, Zeadally, Sherali, Al-Mulla, Sameera, & Alzaabi, Mohammed. (2013). Using cloud computing to implement a security overlay network. IEEE Security & Privacy, 44-53.

Xia, Li. (2012, 2012/10//). Issue about Security of E-business Under the Pattern of Cloud Computing.

Xiao, Zhifeng, & Xiao, Yang. (2013). Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE, 15(2), 843-859.

Downloads

Published

2023-04-30

How to Cite

Shirinov , L. T., & Nasrullayev, N. B. (2023). BULUTLI HISOBLASH PROVAYDERLARI RISKLARNI BOSHQARISH TIZIMI TAHLILI. RESEARCH AND EDUCATION, 2(4), 447–455. Retrieved from https://researchedu.org/index.php/re/article/view/3298