-
2
-
-
77956353411
-
Cloud computing security issues and challenges
-
K. Popović and Z. Hocenski, "Cloud computing security issues and challenges," 33rd Int. Convention on Information and Communication Technology, Electronics and Microelectronics, 2010, pp. 344-349.
-
33rd Int. Convention on Information and Communication Technology, Electronics and Microelectronics, 2010
, pp. 344-349
-
-
Popović, K.1
Hocenski, Z.2
-
3
-
-
2942753973
-
Specifying reusable security requirements
-
D. Firesmith, "Specifying reusable security requirements," J of Object Technology, 3(1), 2004, pp. 61-75.
-
(2004)
J of Object Technology
, vol.3
, Issue.1
, pp. 61-75
-
-
Firesmith, D.1
-
4
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
L. M. Vaquero, L. Rodero-Merino, and D. Morán, "Locking the sky: A survey on IaaS cloud security," Computing 91(1), 2011, pp. 93-118.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
-
5
-
-
79952979621
-
Storm clouds rising: Security challenges for IaaS cloud computing
-
B. Hay, K. Nance, and M. Bishop, "Storm clouds rising: Security challenges for IaaS cloud computing," HICSS, 2011, pp. 1-7.
-
(2011)
HICSS
, pp. 1-7
-
-
Hay, B.1
Nance, K.2
Bishop, M.3
-
6
-
-
77950516969
-
A systematic review of security requirements engineering
-
D. Mellado, C. Blanco, L. E. Sánchez, and E. Fernández- Medina, "A systematic review of security requirements engineering," Computer Standards & Interfaces, 32(4), 2010, pp. 153-165.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.4
, pp. 153-165
-
-
Mellado, D.1
Blanco, C.2
Sánchez, L.E.3
Fernández-Medina, E.4
-
7
-
-
0012903874
-
Analyzing the Past to Prepare for the Future: Writing a Literature Review
-
J. Webster and R. Watson, "Analyzing the Past to Prepare for the Future: Writing a Literature Review," MISQ, 26(2) 2002, pp. 13-23.
-
(2002)
MISQ
, vol.26
, Issue.2
, pp. 13-23
-
-
Webster, J.1
Watson, R.2
-
9
-
-
77956580783
-
Cloud computing security management
-
S.A. Almulla and C. Y. Yeun, "Cloud computing security management," ICESMA 2010, pp. 1-7.
-
ICESMA 2010
, pp. 1-7
-
-
Almulla, S.A.1
Yeun, C.Y.2
-
10
-
-
79955718012
-
Building a security aware cloud by extending internal control to cloud
-
H. Sato, A. Kanai, and S. Tanimoto, "Building a security aware cloud by extending internal control to cloud," ISADS 2011, pp. 323-326.
-
ISADS 2011
, pp. 323-326
-
-
Sato, H.1
Kanai, A.2
Tanimoto, S.3
-
11
-
-
78651302566
-
Towards a data-centric view of cloud security
-
W. Zhou, M. Sherr, W. R. Marczak, Z. Zhang, T. Tao, B. T. Loo, and I. Lee, "Towards a data-centric view of cloud security," Int Conf on Information and Knowledge Management, 2010, pp. 25-32.
-
Int Conf on Information and Knowledge Management, 2010
, pp. 25-32
-
-
Zhou, W.1
Sherr, M.2
Marczak, W.R.3
Zhang, Z.4
Tao, T.5
Loo, B.T.6
Lee, I.7
-
12
-
-
79957556040
-
3 Dimensional security in cloud computing
-
P. Prasad, B. Ojha, R. R. Shahi, R. Lal, A. Vaish, and U. Goel, "3 Dimensional security in cloud computing," ICCRD 2011 (3), pp. 198-201.
-
ICCRD 2011
, Issue.3
, pp. 198-201
-
-
Prasad, P.1
Ojha, B.2
Shahi, R.R.3
Lal, R.4
Vaish, A.5
Goel, U.6
-
13
-
-
78049338474
-
A brief survey on the security model of cloud computing
-
J. Xue and J. Zhang, "A brief survey on the security model of cloud computing," Int. Symp. on Distributed Computing and Applications to Business, Engineering and Science, 2010, pp. 475-478.
-
Int. Symp. on Distributed Computing and Applications to Business, Engineering and Science, 2010
, pp. 475-478
-
-
Xue, J.1
Zhang, J.2
-
14
-
-
67649651643
-
Secure enterprise services consumption for SaaS technology platforms
-
Y. Karabulut and I. Nassi, "Secure enterprise services consumption for SaaS technology platforms," ICDE 2009, pp. 1749-1756.
-
ICDE 2009
, pp. 1749-1756
-
-
Karabulut, Y.1
Nassi, I.2
-
15
-
-
79952392071
-
Personal cloud computing security framework
-
S.-H. Na, J.-Y. Park, and E.-N. Huh, "Personal cloud computing security framework," IEEE Asia-Pacific Services Computing Conference, 2010, pp. 671-675.
-
IEEE Asia-Pacific Services Computing Conference, 2010
, pp. 671-675
-
-
Na, S.-H.1
Park, J.-Y.2
Huh, E.-N.3
-
16
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On technical security issues in cloud computing," CLOUD 2009, pp. 109-116.
-
CLOUD 2009
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
17
-
-
79952498688
-
Managing a security program in a cloud computing environment
-
M. Townsend, "Managing a security program in a cloud computing environment," IInfoSecCD 2009, pp. 128-133.
-
IInfoSecCD 2009
, pp. 128-133
-
-
Townsend, M.1
-
18
-
-
79952671882
-
Network security for virtual machine in cloud computing
-
H. Wu, Y. Ding, L. Yao, and C. Winer, "Network security for virtual machine in cloud computing," Int Conf on Computer Sciences and Convergence Information Technology, 2010, pp. 18-21.
-
Int Conf on Computer Sciences and Convergence Information Technology, 2010
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Yao, L.3
Winer, C.4
-
19
-
-
79951636171
-
RBAC-based access control for SaaS systems
-
D. Li, C. Liu, Q. Wei, Z. Liu, and B. Liu, "RBAC-based access control for SaaS systems," ICIECS 2010, pp. 1-4.
-
ICIECS 2010
, pp. 1-4
-
-
Li, D.1
Liu, C.2
Wei, Q.3
Liu, Z.4
Liu, B.5
-
20
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Security and cloud computing: Intercloud identity management infrastructure," WET ICE 2010, pp. 263-265.
-
WET ICE 2010
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
21
-
-
78650052308
-
An in-VM measuring framework for increasing virtual machine security in clouds
-
Q. Liu, C. Weng, M. Li, and Y. Luo, "An In-VM measuring framework for increasing virtual machine security in clouds," IEEE Security & Privacy, 8(6), pp. 56-62, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 56-62
-
-
Liu, Q.1
Weng, C.2
Li, M.3
Luo, Y.4
-
23
-
-
71749100243
-
Finding security in the cloud
-
N. Hawthorn, "Finding security in the cloud," Computer Fraud and Security, 2009(10), pp. 19-20, 2009.
-
(2009)
Computer Fraud and Security
, vol.2009
, Issue.10
, pp. 19-20
-
-
Hawthorn, N.1
-
24
-
-
77952779347
-
The construction and realization of the intelligent NIPS based on the cloud security
-
T. Jia and X. Wang, "The construction and realization of the intelligent NIPS based on the cloud security," Int. Conf on Information Science and Engineering, 2009, pp. 1885-1888.
-
Int. Conf on Information Science and Engineering, 2009
, pp. 1885-1888
-
-
Jia, T.1
Wang, X.2
-
25
-
-
78449234587
-
Construction of a trusted SaaS platform
-
C. Zhong, J. Zhang, Y. Xia, and H. Yu, "Construction of a trusted SaaS platform," SOSE 2010, pp. 244-251.
-
SOSE 2010
, pp. 244-251
-
-
Zhong, C.1
Zhang, J.2
Xia, Y.3
Yu, H.4
-
27
-
-
78650598095
-
Challenges for cloud networking security
-
P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub, and D. Zeghlache, "Challenges for cloud networking security," HP Laboratories Technical Report, no. 137, 2010, pp. 1-17.
-
(2010)
HP Laboratories Technical Report
, Issue.137
, pp. 1-17
-
-
Schoo, P.1
Fusenig, V.2
Souza, V.3
Melo, M.4
Murray, P.5
Debar, H.6
Medhioub, H.7
Zeghlache, D.8
-
28
-
-
77956971530
-
Deployment models: Towards eliminating security concerns from cloud computing
-
G. Zhao, C. Rong, M. G. Jaatun, and F. E. Sandnes, "Deployment models: Towards eliminating security concerns from cloud computing," HPCS 2010, pp. 189-195.
-
HPCS 2010
, pp. 189-195
-
-
Zhao, G.1
Rong, C.2
Jaatun, M.G.3
Sandnes, F.E.4
-
29
-
-
78751697134
-
Security in multi-tenancy cloud
-
A. Jasti, P. Shah, R. Nagaraj, and R. Pendse, "Security in multi-tenancy cloud," Int. Carnahan Conference on Security Technology, 2010, pp. 35-41.
-
Int. Carnahan Conference on Security Technology, 2010
, pp. 35-41
-
-
Jasti, A.1
Shah, P.2
Nagaraj, R.3
Pendse, R.4
-
30
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not (just) virtualization security: A short paper," ACM CCCS 2009, pp. 97-102.
-
ACM CCCS 2009
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
31
-
-
77954983075
-
Security for the cloud infrastructure: Trusted virtual data center implementation
-
S. Berger et al., "Security for the cloud infrastructure: Trusted virtual data center implementation," IBM Journal of Research and Development, 53(4), 2009.
-
(2009)
IBM Journal of Research and Development
, vol.53
, Issue.4
-
-
Berger, S.1
-
32
-
-
77957970511
-
SaaS integration for software cloud
-
F. Liu, W. Guo, Z. Q. Zhao, and W. Chou, "SaaS integration for software cloud," CLOUD 2010, pp. 402-409
-
CLOUD 2010
, pp. 402-409
-
-
Liu, F.1
Guo, W.2
Zhao, Z.Q.3
Chou, W.4
-
34
-
-
79551559146
-
Ensuring data storage security in cloud computing using Sobol sequence
-
P. S. Kumar, R. Subramanian, and D. T. Selvam, "Ensuring data storage security in cloud computing using Sobol sequence," PDGC 2010, pp. 217-222.
-
PDGC 2010
, pp. 217-222
-
-
Kumar, P.S.1
Subramanian, R.2
Selvam, D.T.3
-
35
-
-
79951783095
-
Analysis on cloud-based security vulnerability assessment
-
H.-C. Li, P. Liang, J. Yang, and S. Chen, "Analysis on cloud-based security vulnerability assessment," ICEBE 2010, pp. 490-494.
-
ICEBE 2010
, pp. 490-494
-
-
Li, H.-C.1
Liang, P.2
Yang, J.3
Chen, S.4
-
37
-
-
79951486911
-
An investigation into cloud configuration and security
-
K. Wood and E. Pereira, "An investigation into cloud configuration and security," ICITST 2010, pp. 1-6.
-
ICITST 2010
, pp. 1-6
-
-
Wood, K.1
Pereira, E.2
-
38
-
-
78650122895
-
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
-
S. Bleikertz, M. Schunter, C. W. Probst, D. Pendarakis, and K. Eriksson, "Security audits of multi-tier virtual infrastructures in public infrastructure clouds," ACM CCCS 2010, pp. 93-102.
-
ACM CCCS 2010
, pp. 93-102
-
-
Bleikertz, S.1
Schunter, M.2
Probst, C.W.3
Pendarakis, D.4
Eriksson, K.5
-
39
-
-
79959322079
-
Cloud application logging for forensics
-
R. Marty, "Cloud application logging for forensics," ACM SAC, 2011, pp. 178-184.
-
(2011)
ACM SAC
, pp. 178-184
-
-
Marty, R.1
-
41
-
-
77953172125
-
Infrastructure as a service security: Challenges and solutions
-
W. Dawoud, I. Takouna, and C. Meinel, "Infrastructure as a service security: Challenges and solutions," INFOS 2010, pp.1-8.
-
INFOS 2010
, pp. 1-8
-
-
Dawoud, W.1
Takouna, I.2
Meinel, C.3
-
42
-
-
77957948646
-
On-demand dynamic security for risk-based secure collaboration in clouds
-
S. Bertram, M. Boniface, M. Surridge, N. Briscombe, and M. Hall-May, "On-demand dynamic security for risk-based secure collaboration in clouds," CLOUD 2010, pp. 518-525.
-
CLOUD 2010
, pp. 518-525
-
-
Bertram, S.1
Boniface, M.2
Surridge, M.3
Briscombe, N.4
Hall-May, M.5
-
43
-
-
78649624954
-
Towards wider cloud service applicability by security, privacy and trust measurements
-
R. M. Savola, A. Juhola, and I. Uusitalo, "Towards wider cloud service applicability by security, privacy and trust measurements," AICT 2010.
-
AICT 2010
-
-
Savola, R.M.1
Juhola, A.2
Uusitalo, I.3
-
45
-
-
79952393404
-
Meta-data driven data chunk based secure data storage for SaaS
-
Y. Shi, K. Zhang, and Q. Li, "Meta-data driven data chunk based secure data storage for SaaS," IJ DCTA, 5(1), 2011pp. 173-185.
-
(2011)
IJ DCTA
, vol.5
, Issue.1
, pp. 173-185
-
-
Shi, Y.1
Zhang, K.2
Li, Q.3
-
46
-
-
77649302043
-
Enhance the user data privacy for SAAS by separation of data
-
ICIII
-
Z. Qiang and C. Dong, "Enhance the user data privacy for SAAS by separation of data," Int Conf on Information Management, Innovation Management and Industrial Engineering, ICIII 2009 (3), pp. 130-132.
-
(2009)
Int Conf on Information Management, Innovation Management and Industrial Engineering
, Issue.3
, pp. 130-132
-
-
Qiang, Z.1
Dong, C.2
-
47
-
-
77957263904
-
The security of cloud computing system enabled by trusted computing technology
-
Z. Shen and Q. Tong, "The security of cloud computing system enabled by trusted computing technology," ICSPS 2010 (2), p. V211-V215
-
ICSPS 2010
, Issue.2
-
-
Shen, Z.1
Tong, Q.2
-
48
-
-
79957885122
-
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
-
J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, "Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol," CNNC 2011, pp. 521-522.
-
CNNC 2011
, pp. 521-522
-
-
Feng, J.1
Chen, Y.2
Summerville, D.3
Ku, W.-S.4
Su, Z.5
-
49
-
-
79951609863
-
A view about cloud data security from data life cycle," cycle
-
X. Yu and Q. Wen, "A view about cloud data security from data life cycle," cycle," CiSE 2010.
-
CiSE 2010
-
-
Yu, X.1
Wen, Q.2
-
50
-
-
77949632117
-
Quantification of security for compute intensive workloads in clouds
-
J. Arshad, P. Townend, and J. Xu, "Quantification of security for compute intensive workloads in clouds," ICPADS, 2009, pp. 479-486.
-
(2009)
ICPADS
, pp. 479-486
-
-
Arshad, J.1
Townend, P.2
Xu, J.3
-
51
-
-
77958132271
-
Don't trust. and verify: A security architecture stack for the cloud
-
G. Peterson, "Don't trust. and verify: A security architecture stack for the cloud," IEEE Security & Privacy, 8(5), 2010, pp. 83-86.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.5
, pp. 83-86
-
-
Peterson, G.1
-
52
-
-
79952749520
-
Information security of cloud computing for enterprises
-
C.-L. Tsai and U.-C. Lin, "Information security of cloud computing for enterprises," Advances in ISSS 3(1), 2011, pp. 132-142.
-
(2011)
Advances in ISSS
, vol.3
, Issue.1
, pp. 132-142
-
-
Tsai, C.-L.1
Lin, U.-C.2
-
53
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," CloudCom 2010, pp. 693-702.
-
CloudCom 2010
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
54
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, 8(6), 2010, pp. 24-31.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
55
-
-
68649085917
-
Security dynamics of cloud computing
-
K. M. Khan, "Security dynamics of cloud computing," Cutter IT Journal, 22(6-7), 2009, pp. 38-43.
-
(2009)
Cutter IT Journal
, vol.22
, Issue.6-7
, pp. 38-43
-
-
Khan, K.M.1
-
56
-
-
79952483316
-
User experience and security in the cloud - An empirical study in the Finnish Cloud Consortium
-
N. Oza, K. Karppinen, and R. Savola, "User experience and security in the cloud - An empirical study in the Finnish Cloud Consortium," CloudCom 2010, pp. 621-628.
-
CloudCom 2010
, pp. 621-628
-
-
Oza, N.1
Karppinen, K.2
Savola, R.3
-
57
-
-
77649278531
-
Security scheme for sensitive data in management-type SaaS
-
ICIII
-
X. Jing, J. Tang, D. He, and Y. Zhang, "Security scheme for sensitive data in management-type SaaS," Int Conf on Information Management, Innovation Management and Industrial Engineering, ICIII 2009 (4), pp. 47-50
-
(2009)
Int Conf on Information Management, Innovation Management and Industrial Engineering
, Issue.4
, pp. 47-50
-
-
Jing, X.1
Tang, J.2
He, D.3
Zhang, Y.4
-
58
-
-
78349299500
-
The management of security in cloud computing
-
S. Ramgovind, M. M. Eloff, and E. Smith, "The management of security in cloud computing," ISSA 2010, pp. 1-7.
-
ISSA 2010
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
59
-
-
79952677080
-
-
SPIE - The International Society for Optical Engineering
-
Z. He and Y. He, "Analysis on the security of cloud computing," SPIE - The International Society for Optical Engineering, 2011, vol. 7752.
-
(2011)
Analysis on the Security of Cloud Computing
, vol.7752
-
-
He, Z.1
He, Y.2
-
60
-
-
79952952264
-
Cloud hooks: Security and privacy issues in cloud computing
-
W. A. Jansen, "Cloud hooks: Security and privacy issues in cloud computing," in HICSS 2011, pp.1-10.
-
HICSS 2011
, pp. 1-10
-
-
Jansen, W.A.1
-
61
-
-
79957737703
-
Managing data access on clouds: A generic framework for enforcing security policies
-
C. Bǎsescu, C. Leordeanu, A. Costan, A. Carpen-Amarie, and G. Antoniu, "Managing data access on clouds: A generic framework for enforcing security policies," AINA, 2011, pp. 459-466.
-
(2011)
AINA
, pp. 459-466
-
-
Bǎsescu, C.1
Leordeanu, C.2
Costan, A.3
Carpen-Amarie, A.4
Antoniu, G.5
-
62
-
-
84865017009
-
-
[Online]. Available: Accessed: 24-Sep-2011
-
P. Wainewright, "Lightning strike zaps EC2 Ireland | ZDNET," 2011. [Online]. Available: http://www.zdnet.com/blog/saas/lightning-strike-zaps- ec2-ireland/1382?tag=search-results-rivers;item0. [Accessed: 24-Sep-2011].
-
(2011)
Lightning Strike Zaps EC2 Ireland | ZDNET
-
-
Wainewright, P.1
-
63
-
-
0003696305
-
-
Springer
-
L. Chung, B.A. Nixon, E. Yu, and J. Mylopoulos, Non-functional Requirements in Software Engineering, Springer, 2000.
-
(2000)
Non-functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
|