-
1
-
-
80053142617
-
-
Amazon Web Services Blog [Online]
-
Amazon Web Services Blog, "Amazon S3 - Bigger and Busier Than Ever." [Online]. Available: http://aws.typepad.com/aws/2011/01/amazon-s3- bigger-and-busier-than-ever.html
-
Amazon S3 - Bigger and Busier Than Ever
-
-
-
3
-
-
77954051808
-
-
National Institute of Standards and Technology, Information Technology Laboratory [Online]
-
P. Mell and T. Grance, "The NIST Definition of Cloud Computing, Version 15," National Institute of Standards and Technology, Information Technology Laboratory, 2010. [Online]. Available: http://csrc.nist.gov/groups/ SNS/cloud-computing/
-
(2010)
The NIST Definition of Cloud Computing, Version 15
-
-
Mell, P.1
Grance, T.2
-
6
-
-
80053133698
-
-
[Online]
-
Savvis, "Savvis Symphony." [Online]. Available: http://www.savvisknowscloud.com/services/
-
Savvis Symphony
-
-
-
7
-
-
84872355901
-
-
[Online]
-
RackSpace, "RackSpace Cloud." [Online]. Available: http://www.rackspacecloud.com/index.php
-
RackSpace Cloud
-
-
-
8
-
-
77957936026
-
-
Google [Online]
-
Google, "Google App Engine." [Online]. Available: https://appengine.google.com
-
Google App Engine
-
-
-
9
-
-
84864720397
-
-
[Online]
-
Microsoft, "Windows Azure." [Online]. Available: http://www.microsoft.com/windowsazure/
-
Windows Azure
-
-
-
10
-
-
80053146554
-
-
[Online]
-
Cloudscale, "The Cloudscale Platform." [Online]. Available: http://cloudscale.com/
-
The Cloudscale Platform
-
-
-
11
-
-
80053134066
-
-
SalesForce [Online]
-
SalesForce, "SalesForce." [Online]. Available: http://www.salesforce.com/
-
-
-
-
12
-
-
70349950116
-
-
Google [Online]
-
Google, "Google Docs." [Online]. Available: https://www.google.com/docs
-
Google Docs
-
-
-
16
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "On technical security issues in cloud computing," in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II), 2009.
-
(2009)
Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-II)
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
19
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
New York, NY, USA: ACM Press
-
M. McIntosh and P. Austel, "XML signature element wrapping attacks and countermeasures," in SWS '05: Proceedings of the 2005 workshop on Secure web services. New York, NY, USA: ACM Press, 2005, pp. 20-27.
-
(2005)
SWS '05: Proceedings of the 2005 Workshop on Secure Web Services
, pp. 20-27
-
-
McIntosh, M.1
Austel, P.2
-
21
-
-
80053157669
-
-
(in submission)
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "Breaking the clouds - security analysis of cloud management interfaces," (in submission), 2011.
-
(2011)
Breaking the Clouds - Security Analysis of Cloud Management Interfaces
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
22
-
-
70349755377
-
Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
-
International Conference on 0
-
D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the intercloud - protocols and formats for cloud computing interoperability," Internet and Web Applications and Services, International Conference on, vol. 0, pp. 328-336, 2009.
-
(2009)
Internet and Web Applications and Services
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
23
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
Los Alamitos, CA, USA: IEEE Computer Society
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to enhance cloud architectures to enable cross-federation," in 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD). Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 337-345.
-
(2010)
2010 IEEE 3rd International Conference on Cloud Computing (CLOUD)
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
24
-
-
0021372186
-
Extending binary byzantine agreement to multivalued byzantine agreement
-
DOI 10.1016/0020-0190(84)90027-9
-
R. Turpin and B. A. Coan, "Extending binary byzantine agreement to multivalued byzantine agreement," Inf. Process. Lett., vol. 18, no. 2, pp. 73-76, 1984. (Pubitemid 14570886)
-
(1984)
Information Processing Letters
, vol.18
, Issue.2
, pp. 73-76
-
-
Turpin Russell1
Coan Brian, A.2
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
Springer
-
I. Damgård, M. Geisler, M. Krøigaard, and J. B. Nielsen, "Asynchronous multiparty computation: Theory and implementation," in Public Key Cryptography, PKC '09, ser. Lecture Notes in Computer Science. Springer, 2009, pp. 160-179.
-
(2009)
Public Key Cryptography, PKC '09, ser. Lecture Notes in Computer Science
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
31
-
-
84863447066
-
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
-
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, "SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics," in USENIX Security Symposium, 2010.
-
(2010)
USENIX Security Symposium
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
33
-
-
70350379222
-
Secure multiparty computation goes live
-
R. Dingledine and P. Golle, Eds. Springer
-
P. Bogetoft, D. L. Christensen, I. Damgrd, M. Geisler, T. P. Jakobsen, M. Krigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. I. Schwartzbach, and T. Toft, "Secure multiparty computation goes live." in Financial Cryptography and Data Security, FC'09, ser. Lecture Notes in Computer Science, R. Dingledine and P. Golle, Eds., vol. 5628. Springer, 2009, pp. 325-343.
-
(2009)
Financial Cryptography and Data Security, FC'09, ser. Lecture Notes in Computer Science
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgrd, I.3
Geisler, M.4
Jakobsen, T.P.5
Krigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
|