Page 121 - Ujčič, Anton, in Viktorija Florjančič, 2017. Javna uprava v računalniškem oblaku. Koper: Založba Univerze na Primorskem.
P. 121
Viri in literatura 121

blement-services/docs/idc-marketscape-ww-cloud-prof-svcs-vendor-
analysis.pdf (11. 11. 2014).
Liveri, Dimitra in M. A. C. Dekker. 2015. Security Framework for Go-
vernmental Clouds. Heraklion: ENISA.
Mahoney, Michael S. 1988. The history of computing in the history of
technology. IEEE Annals of the History of Computing 10 (2): 113–
125.
Marston, Sean, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhangl in
Anand Ghalsasi. 2011. Cloud computing: the business perspective.
Http://papers.ssrn.com/sol3/Deliver y.cfm/SSR N_ID1732819_
code423677.pdf?abstractid =1413545&mirid=1 (26. 5. 2015).
McNee, Bill. 2014. Digital business rethinking fundamentals. Http://
cbs2014 . saugatucktechnolog y.com/images/Documents/Presenta-
tions/CBS14%20 McNee%20Keynote%20–%20Cloud%20and%20
Digital%20Business–12Nov2014.pdf (18. 10. 2014).
Mell, Peter in Tim Grance. 2011. The NIST definition of cloud compu-
ting. Http://permanent.access.gpo.gov/gpo17628/SP800-145.pdf
(24. 11. 2014).
Mitchell, Chris. 2015. Privacy, compliance and the cloud. V Guide to se-
curity assurance for cloud computing, ur. Shao Ying Zhu, Richard
Hill in Marcello Trovati, 3–14. Heidelberg: Springer.
MNZ – Ministrstvo za notranje zadeve. 2013. Izhodišča za prenovo dr-
žavne informatike. Interno gradivo, Ministrstvo za notranje zadeve.
MNZ – Ministrstvo za notranje zadeve. 2014a. Načrt prenove in program
ukrepov za prenovo informatike v državni upravi. Interno gradivo,
Ministrstvo za notranje zadeve.
MNZ – Ministrstvo za notranje zadeve. 2014b. Sklep ministra za notran-
je zadeve: potrditev projekta DRO. Interno gradivo, Ministrstvo za
notranje zadeve.
MNZ – Ministrstvo za notranje zadeve. 2014c. Projekt »vzpostavitev dr-
žavnega računalniškega oblaka – DRO«, dokument identifikacije in-
vesticijskega projekta. Interno gradivo, Ministrstvo za notranje zade-
ve.
Mojgan, Afshari. 2014. Computing security. Http://cloudtweaks.
com/2014/07/computing– security–network–application–levels/
(22. 5. 2015).
   116   117   118   119   120   121   122   123   124   125   126