-
1
-
-
77954051808
-
-
NIST Special Publication 800-145 (Draft) Retrieved September 10, 2011
-
P. Mell and T. Grance, "The NIST Definition of Cloud Computing. NIST Special Publication 800-145 (Draft)", Retrieved September 10, 2011, from http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145. cloud-definition.pdf
-
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
5
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G. J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy, Vol. 8, No. 6, pp. 25-31, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 25-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
6
-
-
78649806730
-
SecureCloud: Towards a comprehensive security framework for cloud computing environments
-
Seoul, South Korea
-
H. Takabi, J. B. D. Joshi, and G. J. Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments", In Proc. of the 1st IEEE International Workshop Emerging Applications for Cloud Computing (CloudApp 2010), pp. 393-398, Seoul, South Korea, 2010.
-
(2010)
Proc. of the 1st IEEE International Workshop Emerging Applications for Cloud Computing (CloudApp 2010)
, pp. 393-398
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
7
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
T. Jaeger and J. Schiffman, "Outlook: Cloudy with a Chance of Security Challenges and Improvements", IEEE Security and Privacy, Vol. 8, No. 1, pp. 77-80, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
8
-
-
77957968012
-
Security models and requirements for healthcare application clouds
-
Miami, FL, USA
-
R. Zhang and L. Liu, "Security Models and Requirements for Healthcare Application Clouds", In Proc. of the 3rd IEEE International Conference on Cloud Computing (Cloud 2010), pp. 268-275, Miami, FL, USA, 2010.
-
(2010)
Proc. of the 3rd IEEE International Conference on Cloud Computing (Cloud 2010)
, pp. 268-275
-
-
Zhang, R.1
Liu, L.2
-
9
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
Miami, FL, USA
-
N. Gruschka and M. Jensen, "Attack Surfaces: A Taxonomy for Attacks on Cloud Services", In Proc. of the 3rd IEEE International Conference on Cloud Computing (Cloud 2010), pp. 276-279, Miami, FL, USA, 2010.
-
(2010)
Proc. of the 3rd IEEE International Conference on Cloud Computing (Cloud 2010)
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
10
-
-
74349107924
-
DSP RE-encryption: A flexible mechanism for access control enforcement management in DaaS
-
Bangalore, India
-
X. Tian, X. Wang, and A. Zhou, "DSP RE-Encryption: A Flexible Mechanism for Access Control Enforcement Management in DaaS", In Proc. of the 2nd IEEE International Conference on Cloud Computing (Cloud 2009), pp. 25-32, Bangalore, India, 2009.
-
(2009)
Proc. of the 2nd IEEE International Conference on Cloud Computing (Cloud 2009)
, pp. 25-32
-
-
Tian, X.1
Wang, X.2
Zhou, A.3
-
11
-
-
74349113474
-
On technical security issues in cloud computing
-
Bangalore, India
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing", In Proc. of the 2nd IEEE International Conference on Cloud Computing (Cloud 2009), pp. 109-116, Bangalore, India, 2009.
-
(2009)
Proc. of the 2nd IEEE International Conference on Cloud Computing (Cloud 2009)
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
12
-
-
74049112206
-
Cloud security issues
-
Bangalore, India
-
B. R. Kandukuri, R. Paturi, and A. Rakshit, "Cloud Security Issues", In Proc. of the 6th IEEE International Conference on Services Computing (SCC'09), pp. 517-520, Bangalore, India, 2009.
-
(2009)
Proc. of the 6th IEEE International Conference on Services Computing (SCC'09
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturi, R.2
Rakshit, A.3
-
13
-
-
79958134937
-
Exploring reactive access control
-
Vancouver, BC, Canada, May 7-12
-
M. L. Mazurek, P. F. Klemperer, R. Shay, H. Takabi, L. Cranor, and L. Bauer, "Exploring Reactive Access Control", In Proc. of the 29th ACM Conference on Human Factors in Computing Systems (CHI 2011), Vancouver, BC, Canada, May 7-12, 2011.
-
(2011)
Proc. of the 29th ACM Conference on Human Factors in Computing Systems (CHI 2011)
-
-
Mazurek, M.L.1
Klemperer, P.F.2
Shay, R.3
Takabi, H.4
Cranor, L.5
Bauer, L.6
-
14
-
-
33645970213
-
Designing natural language and structured entry methods for privacy policy authoring
-
Rome, Italy
-
J. Karat, C. M. Karat, C. Brodie, and J. Feng, "Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring", In Proc. of the IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2005), Rome, Italy, 2005.
-
(2005)
Proc. of the IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2005)
-
-
Karat, J.1
Karat, C.M.2
Brodie, C.3
Feng, J.4
-
15
-
-
85027481839
-
-
http://www.research.ibm.com/sparcle
-
-
-
-
16
-
-
85027485845
-
-
http://www.oasis-open.org/committees/tchome.php?wgabbrev=xacml
-
-
-
-
17
-
-
85027484816
-
-
Protocol for Web Description Resources (POWDER): Description Resources http://www.w3.org/TR/powder-dr
-
-
-
-
19
-
-
85027487448
-
-
http://tools.ietf.org/html/draft-hammer-hostmeta-13
-
-
-
-
20
-
-
85027485022
-
-
http://www.w3.org/TR/rif-overview
-
-
-
|