-
3
-
-
72249117765
-
Ma.gnolia Suffers Major Data Loss, Site Taken Offline
-
January 30
-
M. Calore, Ma.gnolia Suffers Major Data Loss, Site Taken Offline, Wired Magazine, January 30, 2009, http://www.wired.com/epicenter/2009/01/magnolia- suffer/
-
(2009)
Wired Magazine
-
-
Calore, M.1
-
4
-
-
51249123658
-
-
3rd Edition, Version 3.1, January
-
D. Cappelli, A. Moore, R. Trzeciak, T. J. Shimeall, Common Sense Guide to Prevention and Detection of Insider Threats, 3rd Edition, Version 3.1, CERT, January 2009, http://www.cert.org/archive/pdf/CSG-V3.pdf
-
(2009)
Common Sense Guide to Prevention and Detection of Insider Threats
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
Shimeall, T.J.4
-
5
-
-
79952907837
-
USA Patriot Act Comes under Fire in B.C. Report
-
October 30
-
USA Patriot Act Comes under Fire in B.C. Report, CBC News, October 30, 2004, http://www.cbc.ca/canada/story/2004/10/29/patriotact-bc041029.html
-
(2004)
CBC News
-
-
-
7
-
-
79952914908
-
Microsoft's Azure Cloud Suffers First Crash
-
March 16
-
G. Clarke, Microsoft's Azure Cloud Suffers First Crash, The Register, March 16, 2009, http://www.theregister.co.uk/2009/03/16/azure-cloud-crash/
-
(2009)
The Register
-
-
Clarke, G.1
-
8
-
-
79952956959
-
The Bank Robber, the Quote, and the Final Irony, nFront
-
S. Cocheo, The Bank Robber, the Quote, and the Final Irony, nFront, ABA Banking Journal, 1997, http://www.banking.com/aba/profile-0397.htm
-
(1997)
ABA Banking Journal
-
-
Cocheo, S.1
-
9
-
-
0042181282
-
-
U.S. Department of Commerce, July 21
-
Safe Harbor Privacy Principles, U.S. Department of Commerce, July 21, 2000, http://www.export.gov/safeharbor/eg-main-018247.asp
-
(2000)
Safe Harbor Privacy Principles
-
-
-
11
-
-
79952929374
-
-
February 22
-
J. E. Dunn, Virtualised USB Key Beats Keyloggers, Techworld, February 22, 2010, http://news.techworld.com/security/3213277/virtualised-usb-key-beats- keyloggers/
-
(2010)
Virtualised USB Key Beats Keyloggers
-
-
Dunn, J.E.1
-
13
-
-
38349023177
-
-
White Paper, January
-
P. Ferrie, Attacks on Virtual Machine Emulators, White Paper, Symantec Corporation, January 2007, http://www.symantec.com/avcenter/reference/Virtual- Machine-Threats.pdf
-
(2007)
Attacks on Virtual Machine Emulators
-
-
Ferrie, P.1
-
14
-
-
84863655989
-
Salesforce.com Outage Hits Thousands of Businesses
-
January 8
-
T. Ferguson, Salesforce.com Outage Hits Thousands of Businesses, CNET News, January 8, 2009, http://news.cnet.com/8301-1001-3-10136540-92.html
-
(2009)
CNET News
-
-
Ferguson, T.1
-
15
-
-
70350696400
-
-
Tech Report Nr. 288
-
S. Frei, T. Duebendorfer, G. Ollmann, M. May, Understanding the Web Browser Threat, ETH Zurich, Tech Report Nr. 288, 2008, http://ecollection. ethbib.ethz.ch/eserv/eth:30892/eth-30892-01.pdf
-
(2008)
Understanding the Web Browser Threat
-
-
Frei, S.1
Duebendorfer, T.2
Ollmann, G.3
May, M.4
-
16
-
-
77954014042
-
The Internet Industry is on a Cloud - Whatever That May Mean
-
March 26
-
G. Fowler, B. Worthen, The Internet Industry is on a Cloud - Whatever That May Mean, The Wall Street Journal, March 26, 2009
-
(2009)
The Wall Street Journal
-
-
Fowler, G.1
Worthen, B.2
-
17
-
-
70449469222
-
Analysis of Signature Wrapping Attacks and Countermeasures
-
S. Gajek, M. Jensen, L. Liao, and J. Schwenk, Analysis of Signature Wrapping Attacks and Countermeasures, IEEE International Conference on Web Services, Los Angeles, CA, July 2009
-
IEEE International Conference on Web Services, Los Angeles, CA, July 2009
-
-
Gajek, S.1
Jensen, M.2
Liao, L.3
Schwenk, J.4
-
18
-
-
79952914498
-
When Virtual is Harder than Real
-
T. Garfinkel, M. Rosenblum, When Virtual is Harder than Real, HotOS'05, Santa Fe, NM, June 2005
-
HotOS'05, Santa Fe, NM, June 2005
-
-
Garfinkel, T.1
Rosenblum, M.2
-
19
-
-
52149124050
-
-
Technical Report TR-08-07, Center for Research on Computation and Society, Harvard University, July
-
S. Garfinkel, An Evaluation of Amazon's Grid Computing Services: EC2, S3 and SQS, Technical Report TR-08-07, Center for Research on Computation and Society, Harvard University, July 2007
-
(2007)
An Evaluation of Amazon's Grid Computing Services: EC2, S3 and SQS
-
-
Garfinkel, S.1
-
20
-
-
79952928562
-
Salesforce.com Outage Exposes Cloud's Dark Linings
-
January 6
-
D. Goodin, Salesforce.com Outage Exposes Cloud's Dark Linings, The Register, January 6, 2009, http://www.theregister.co.uk/2009/01/06/salesforce- outage/
-
(2009)
The Register
-
-
Goodin, D.1
-
21
-
-
79952977104
-
Webhost Hack Wipes Out Data for 100,000 Sites
-
June 8
-
D. Goodin, Webhost Hack Wipes Out Data for 100,000 Sites, The Register, June 8, 2009, http://www.theregister.co.uk/2009/06/08/webhost-attack/
-
(2009)
The Register
-
-
Goodin, D.1
-
22
-
-
79952983449
-
IBM's Blindfolded Calculator
-
July 13
-
A. Greenberg, IBM's Blindfolded Calculator, Forbes Magazine, July 13, 2009
-
(2009)
Forbes Magazine
-
-
Greenberg, A.1
-
23
-
-
70449472667
-
Vulnerable Cloud: SOAP Message Security Validation Revisited
-
N. Gruschka, L. L. Iacono, Vulnerable Cloud: SOAP Message Security Validation Revisited, IEEE International Conference on Web Services, Los Angeles, CA, July 2009
-
IEEE International Conference on Web Services, Los Angeles, CA, July 2009
-
-
Gruschka, N.1
Iacono, L.L.2
-
24
-
-
79952939046
-
Who Protects Your Cloud Data?
-
January 13
-
M. Gunderloy, Who Protects Your Cloud Data?, Web Worker Daily, January 13, 2008, http://webworkerdaily.com/2008/01/13/who-protects-your-cloud-data/
-
(2008)
Web Worker Daily
-
-
Gunderloy, M.1
-
25
-
-
79952945500
-
Twitter Email Account Hack Highlights Cloud Dangers
-
July 23
-
Twitter Email Account Hack Highlights Cloud Dangers, Infosecurity Magazine, July 23, 2009, http://www.infosecurity-magazine.com/view/2668/twitter- email-account-hack-highlights-cloud-dangers-/
-
(2009)
Infosecurity Magazine
-
-
-
26
-
-
79952954027
-
-
March
-
D. Jacobs, S. Aulbach, Ruminations on Multi-Tenant Databases, Fachtagung für Datenbanksysteme in Business, Technologie und Web, March 2007, http://www.btw2007.de/paper/p514.pdf
-
(2007)
Ruminations on Multi-Tenant Databases, Fachtagung für Datenbanksysteme in Business, Technologie und Web
-
-
Jacobs, D.1
Aulbach, S.2
-
28
-
-
74349113474
-
On Technical Security Issues in Cloud Computing
-
M. Jensen, J. Schwenk, N. Gruschka, L. L. Iacono, On Technical Security Issues in Cloud Computing, IEEE International Conference on Cloud Computing, Bangalore, India, September 21-25, 2009
-
IEEE International Conference on Cloud Computing, Bangalore, India, September 21-25, 2009
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
30
-
-
74049112206
-
Cloud Security Issues
-
B. R. Kandukuri, R. Paturi V, A. Rakshit, Cloud Security Issues, IEEE International Conference on Services Computing, Bangalore, India, September 21-25, 2009
-
IEEE International Conference on Services Computing, Bangalore, India, September 21-25, 2009
-
-
Kandukuri, B.R.1
Paturi V, R.2
Rakshit, A.3
-
31
-
-
54049158161
-
I/O for Virtual Machine Monitors: Security and Performance Issues
-
September/October
-
P. A. Karger, I/O for Virtual Machine Monitors: Security and Performance Issues, IEEE Security and Privacy, September/October 2008
-
(2008)
IEEE Security and Privacy
-
-
Karger, P.A.1
-
32
-
-
79952926741
-
Austin Plane Crash: Pilot Joseph Andrew Stack May Have Targeted IRS Offices, Says FBI
-
February 18
-
N. Katz, Austin Plane Crash: Pilot Joseph Andrew Stack May Have Targeted IRS Offices, Says FBI, CBS News, February 18, 2010, http://www.cbsnews.com/8301- 504083-162-6220271-504083.html?tag=contentMain%3bcontentBody
-
(2010)
CBS News
-
-
Katz, N.1
-
33
-
-
84869834969
-
-
Y. Keleta, J. H. P. Eloff, H. S. Venter, Proposing a Secure XACML Architecture Ensuring Privacy and Trust, Research in Progress Paper, University of Pretoria, 2005, http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/093- Article.pdf
-
(2005)
Proposing A Secure XACML Architecture Ensuring Privacy and Trust, Research in Progress Paper
-
-
Keleta, Y.1
Eloff, J.H.P.2
Venter, H.S.3
-
34
-
-
79952937347
-
Mozilla Confirms Security Threat from Malicious Firefox Add-Ons
-
February 5
-
S. M. Kerner, Mozilla Confirms Security Threat from Malicious Firefox Add-Ons, eSecurity Planet, February 5, 2010, http://www.esecurityplanet.com/ news/article.php/3863331/Mozilla-Confirms-Security-Threat-From-Malicious- Firefox-Add-Ons.htm
-
(2010)
eSecurity Planet
-
-
Kerner, S.M.1
-
36
-
-
79952965443
-
Salesforce.com Acknowledges Data Loss, Security Fix
-
November 6
-
B. Krebs, Salesforce.com Acknowledges Data Loss, Security Fix, The Washington Post, November 6, 2007
-
(2007)
The Washington Post
-
-
Krebs, B.1
-
39
-
-
79952926291
-
2 Men Held in Attempt to Bomb I.R.S. Office
-
December 29
-
S. Labaton, 2 Men Held in Attempt to Bomb I.R.S. Office, New York Times, December 29, 1995
-
(1995)
New York Times
-
-
Labaton, S.1
-
40
-
-
79952915824
-
20-Year Term in Plot to Bomb IRS Offices, Nation in Brief
-
August 10
-
20-Year Term in Plot to Bomb IRS Offices, Nation In Brief, Los Angeles Times, August 10, 1996
-
(1996)
Los Angeles Times
-
-
-
41
-
-
59849089966
-
Is Cloud Computing Really Ready for Prime Time?
-
January
-
N. Leavitt. Is Cloud Computing Really Ready for Prime Time?, IEEE Computer, January 2009
-
(2009)
IEEE Computer
-
-
Leavitt, N.1
-
42
-
-
84869779921
-
Salesforce.com Warns Customers of Phishing Scam
-
IDG News Network, November 6
-
R. McMillan, Salesforce.com Warns Customers of Phishing Scam, PC Magazine, IDG News Network, November 6, 2007, http://www.pcworld.com/ businesscenter/article/139353/salesforcecom-warns-customers-of-phishing-scam. html
-
(2007)
PC Magazine
-
-
McMillan, R.1
-
43
-
-
84869779212
-
-
IDG News Network, December 10
-
R. McMillan, Hackers Find a Home in Amazon's EC2 Cloud, Infoworld, IDG News Network, December 10, 2009, http://www.infoworld.com/d/cloud-computing/ hackers-find-home-in-amazons-ec2-cloud-742
-
(2009)
Hackers Find A Home in Amazon's EC2 Cloud
-
-
McMillan, R.1
-
44
-
-
79952905279
-
Misdirected Spyware Infects Ohio Hospital
-
IDG News Service Sept. 17
-
R. McMillan, Misdirected Spyware Infects Ohio Hospital, PC Magazine, IDG News Service Sept. 17, 2009, http://www.pcworld.com/businesscenter/article/ 172185/misdirected-spyware-infects-ohio-hospital.html
-
(2009)
PC Magazine
-
-
McMillan, R.1
-
45
-
-
77954051808
-
-
Version 15, October 7
-
P. Mell, T. Grance, The NIST Definition of Cloud Computing, Version 15, National Institute of Standards and Technology, October 7, 2009, http://csrc.nist.gov/groups/SNS/cloud-computing
-
(2009)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
46
-
-
79953809001
-
DDoS Attack Rains Down on Amazon Cloud
-
October 5
-
C. Metz, DDoS Attack Rains Down on Amazon Cloud, The Register, October 5, 2009, http://www.theregister.co.uk/2009/10/05/amazon-bitbucket-outage/
-
(2009)
The Register
-
-
Metz, C.1
-
47
-
-
79952910883
-
Major Outage for Amazon S3 and EC2
-
February 15
-
R. Miller, Major Outage for Amazon S3 and EC2, Data Center Knowledge, February 15, 2008, http://www.datacenterknowledge.com/archives/2008/02/15/major- outage-for-amazon-s3-and-ec2/
-
(2008)
Data Center Knowledge
-
-
Miller, R.1
-
48
-
-
79952939987
-
Lightning Strike Triggers Amazon EC2 Outage
-
June 11
-
R. Miller, Lightning Strike Triggers Amazon EC2 Outage, Data Center Knowledge, June 11, 2009, http://www.datacenterknowledge.com/archives/2009/06/ 11/lightning-strike-triggers-amazon-ec2-outage/
-
(2009)
Data Center Knowledge
-
-
Miller, R.1
-
49
-
-
79952939045
-
Empirical Exploitation of Live Virtual Machine Migration
-
J. Oberheide, E. Cooke, F. Jahanian, Empirical Exploitation of Live Virtual Machine Migration, Black Hat Security Conference, Washington, DC, February 2008
-
Black Hat Security Conference, Washington, DC, February 2008
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
52
-
-
70349836055
-
Taking Account of Privacy when Designing Cloud Computing Services
-
S. Pearson, Taking Account of Privacy when Designing Cloud Computing Services, ICSE Workshop on Software Engineering Challenges of Cloud Computing, May 23, 2009, Vancouver, Canada
-
ICSE Workshop on Software Engineering Challenges of Cloud Computing, May 23, 2009, Vancouver, Canada
-
-
Pearson, S.1
-
53
-
-
85080711655
-
The Ghost in the Browser: Analysis of Web-based Malware
-
April 10, Cambridge, MA
-
N. Provos et al., The Ghost In The Browser: Analysis of Web-based Malware, Hot Topics in Understanding Botnets (HotBots), April 10, 2007, Cambridge, MA
-
(2007)
Hot Topics in Understanding Botnets (HotBots)
-
-
Provos, N.1
-
56
-
-
74049152260
-
Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds, ACM Conference on Computer and Communications Security, November 2009
-
ACM Conference on Computer and Communications Security, November 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
Hey, Y.5
-
58
-
-
70449874293
-
Kernel-based Virtualization with KVM
-
January
-
A. Shah, Kernel-based Virtualization with KVM, Linux Magazine, issue 86, January 2008, http://www.linuxmagazine. com/w3/issue/86/Kernel-Based- Virtualization-With-KVM.pdf
-
(2008)
Linux Magazine
, Issue.86
-
-
Shah, A.1
-
59
-
-
79952934786
-
-
ID: ACSSEC-2005-11-25 - 0x1
-
T. Shelton, Remote Heap Overflow, ID: ACSSEC-2005-11-25 - 0x1, http://packetstormsecurity.org/0512-advisories/ACSSEC-2005-11-25-0x1.txt
-
Remote Heap Overflow
-
-
Shelton, T.1
-
62
-
-
68649100902
-
A Break in the Clouds: Towards a Cloud Definition
-
January
-
L. M. Vaquero1, L. Rodero-Merino1, J. Caceres, M. Lindner, A Break in the Clouds: Towards a Cloud Definition, Computer Communication Review, January 2009, http://ccr.sigcomm.org/online/files/p50-v39n1l-vaqueroA.pdf
-
(2009)
Computer Communication Review
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
63
-
-
79952942992
-
-
IEEE Computer Society, August 26
-
K. Vieira, A. Schulter, C. Westphall, C. Westphall, Intrusion Detection Techniques in Grid and Cloud Computing Environment, IT Professional, IEEE Computer Society, August 26, 2009.
-
(2009)
Intrusion Detection Techniques in Grid and Cloud Computing Environment, IT Professional
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
65
-
-
79952909645
-
Many Degrees of Multi-tenancy
-
June 16
-
P. Wainewright. Many Degrees of Multi-tenancy, ZDNET News and Blogs, June 16, 2008, http://blogs.zdnet.com/SAAS/?p=533
-
(2008)
ZDNET News and Blogs
-
-
Wainewright, P.1
-
66
-
-
74049145625
-
Managing Security of Virtual Machine Images in a Cloud Environment
-
J. Wei et al., Managing Security of Virtual Machine Images in a Cloud Environment, ACM Cloud Computing Security Workshop, Nov. 13, 2009, Chicago, IL
-
ACM Cloud Computing Security Workshop, Nov. 13, 2009, Chicago, IL
-
-
Wei, J.1
-
67
-
-
79952961415
-
Amazon EC2 Cloud Service Hit by Botnet, Outage
-
December 11
-
L. Whitney, Amazon EC2 Cloud Service Hit by Botnet, Outage, December 11, 2009, CNET News, http://news.cnet.com/8301-1009-3-10413951-83.html
-
(2009)
CNET News
-
-
Whitney, L.1
-
68
-
-
79952959748
-
Xen Architecture Overview
-
Version 1.2, February 13
-
Xen Architecture Overview, Version 1.2, Xen Wiki Whitepaper, February 13, 2008, http://wiki.xensource.com/xenwiki/XenArchitecture?action= AttachFile&do=get&target=Xen+Architecture-Q1+2008.pdf
-
(2008)
Xen Wiki Whitepaper
-
-
-
69
-
-
62949146437
-
-
L. Youseff, M. Butrico, D. D. Silva, Toward a Unified Ontology of Cloud Computing, Grid Computing Environments Workshop, held with SC08, November 2008. http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntology.pdf
-
Toward A Unified Ontology of Cloud Computing, Grid Computing Environments Workshop, Held with SC08, November 2008
-
-
Youseff, L.1
Butrico, M.2
Silva, D.D.3
-
70
-
-
79952934355
-
FBI Defends Disruptive Raids on Texas Data Centers
-
April 7
-
K. Zetter, FBI Defends Disruptive Raids on Texas Data Centers, Wired Magazine, April 7, 2009, http://www.wired.com/threatlevel/2009/04/data-centers- ra/
-
(2009)
Wired Magazine
-
-
Zetter, K.1
|