-
1
-
-
71749105371
-
Assessing the security risks of cloud computing
-
[Online]. Available
-
J. Heiser and M. Nicolett, "Assessing the security risks of cloud computing," Gartner Report, 2009. [Online]. Available: http://www.gartner. com/DisplayDocument?id=685308.
-
(2009)
Gartner Report
-
-
Heiser, J.1
Nicolett, M.2
-
3
-
-
70449636536
-
On a classification approach for soa vulnerabilities
-
L. Lowis and R. Accorsi, "On a classification approach for soa vulnerabilities," in COMPSAC (2), 2009, pp. 439-444.
-
(2009)
COMPSAC
, Issue.2
, pp. 439-444
-
-
Lowis, L.1
Accorsi, R.2
-
5
-
-
60649121295
-
Invisible intruders: Rootkits in practice
-
D. Brumley, "invisible intruders: rootkits in practice," USENIX, 1999.
-
(1999)
USENIX
-
-
Brumley, D.1
-
7
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
New York, NY, USA: ACM Press
-
M. McIntosh and P. Austel, "XML signature element wrapping attacks and countermeasures," in SWS '05: Proceedings of the 2005 workshop on Secure web services. New York, NY, USA: ACM Press, 2005, pp. 20-27.
-
(2005)
SWS '05: Proceedings of the 2005 Workshop on Secure Web Services
, pp. 20-27
-
-
Mcintosh, M.1
Austel, P.2
-
8
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
9
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "On technical security issues in cloud computing," in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II), 2009.
-
(2009)
Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II)
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
10
-
-
49049087362
-
The impact of flooding attacks on network-based services
-
M. Jensen, N. Gruschka, and N. Luttenberger, "The Impact of Flooding Attacks on Network-based Services," in Proceedings of the IEEE International Conference on Availability, Reliability and Security, 2008.
-
(2008)
Proceedings of the IEEE International Conference on Availability, Reliability and Security
-
-
Jensen, M.1
Gruschka, N.2
Luttenberger, N.3
|