-
1
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
L. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Moran, D.3
-
2
-
-
84867276590
-
-
04
-
Business Insider, "Inside Amazon's Cloud Disaster," http://www.businessinsider.com/amazon-outage-enters-its-second-day-lots-of- sites-still-down-2011-4, 04 2011.
-
(2011)
Inside Amazon's Cloud Disaster
-
-
-
6
-
-
84861681567
-
-
Federal Office for Information Security (BSI). IT-Grundschutz Catalogues. https://www.bsi.bund.de/EN/Topics/ITGrundschutz/itgrundschutz node.html.
-
IT-Grundschutz Catalogues
-
-
-
8
-
-
84863127613
-
Study on the third-party audit in cloud storage service
-
L. Li, L. Xu, J. Li, and C. Zhang, "Study on the third-party audit in cloud storage service," in Cloud and Service Computing (CSC), 2011 International Conference on, dec. 2011, pp. 220 -227.
-
Cloud and Service Computing (CSC), 2011 International Conference On, Dec. 2011
, pp. 220-227
-
-
Li, L.1
Xu, L.2
Li, J.3
Zhang, C.4
-
9
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in INFOCOM, 2010 Proceedings IEEE, march 2010, pp. 1 -9.
-
INFOCOM, 2010 Proceedings IEEE, March 2010
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
80053957073
-
Dynamic Audit Services for Outsourced Storages in Clouds
-
Y. Zhu, G. Ahn, H. Hu, S. Yau, H. An, and S. Chen, "Dynamic Audit Services for Outsourced Storages in Clouds," Services Computing, IEEE Transactions on, vol. PP, no. 99, p. 1, 2011.
-
(2011)
Services Computing, IEEE Transactions on
, vol.PP
, Issue.99
, pp. 1
-
-
Zhu, Y.1
Ahn, G.2
Hu, H.3
Yau, S.4
An, H.5
Chen, S.6
-
11
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
Proceedings of the 2009 ACM workshop on Cloud computing security, ser. New York, NY, USA: ACM, [Online]. Available
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning, "Managing security of virtual machine images in a cloud environment," in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW '09. New York, NY, USA: ACM, 2009, pp. 91-96. [Online]. Available: http://doi.acm.org/10.1145/ 1655008.1655021
-
(2009)
CCSW '09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
13
-
-
33646811831
-
Agent-based network intrusion detection system using data mining approaches
-
july vol.1
-
C.-L. Lui, T.-C. Fu, and T.-Y. Cheung, "Agent-based network intrusion detection system using data mining approaches," in Information Technology and Applications, 2005. ICITA 2005. Third International Conference on, vol. 1, july 2005, pp. 131-136 vol.1.
-
(2005)
Information Technology and Applications, 2005. ICITA 2005. Third International Conference on
, vol.1
, pp. 131-136
-
-
Lui, C.-L.1
Fu, T.-C.2
Cheung, T.-Y.3
-
14
-
-
0038391162
-
Agent based intrusion detection and response system for wireless lans
-
May
-
M. Chirumamilla and B. Ramamurthy, "Agent based intrusion detection and response system for wireless lans," in Communications, 2003. ICC '03. IEEE International Conference on, vol. 1, May 2003, pp. 492-496.
-
(2003)
Communications, 2003. ICC '03. IEEE International Conference on
, vol.1
, pp. 492-496
-
-
Chirumamilla, M.1
Ramamurthy, B.2
-
15
-
-
24344493979
-
Cids: An agent-based intrusion detection system
-
[Online]. Available
-
D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii, "Cids: An agent-based intrusion detection system," Computers & Security, vol. 24, no. 5, pp. 387-398, 2005. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404805000179
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
Yarramsettii, R.5
-
17
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
J. Balasubramaniyan, J. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," in Computer Security Applications Conference, 1998, Proceedings., 14th Annual, dec 1998, pp. 13-24.
-
Computer Security Applications Conference, 1998, Proceedings., 14th Annual, Dec 1998
, pp. 13-24
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
18
-
-
78249269487
-
Designing cloud services adhering to government privacy laws
-
F. Dölitzscher, C. Reich, and A. Sulistio, "Designing cloud services adhering to government privacy laws," in CIT, 2010, pp. 930-935.
-
(2010)
CIT
, pp. 930-935
-
-
Dölitzscher, F.1
Reich, C.2
Sulistio, A.3
-
19
-
-
84867248465
-
-
Proceedings, no. 978-1-61208-174-8, iSBN: 978-1-61208-174-8. [Online]. Available
-
F. Doelitzscher, C. Reich, M. Knahl, and N. Clarke, "Incident detection for cloud environments," in Proceedings, no. 978-1-61208-174-8, 2011, pp. 100-105, iSBN: 978-1-61208-174-8. [Online]. Available: http://www.thinkmind.org/index.php?view=article&articleid= emerging-2011-5-30-40134
-
(2011)
Incident Detection for Cloud Environments
, pp. 100-105
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
20
-
-
79952065844
-
-
[Online]. Available
-
Cloud Security Alliance, "Top Threats to Cloud Computing V1.0," 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats.html
-
(2010)
Top Threats to Cloud Computing V1.0
-
-
-
21
-
-
84857161828
-
An autonomous agent based incident detection system for cloud environments
-
F. Dölitzscher, C. Reich, M. Knahl, and N. Clarke, "An autonomous agent based incident detection system for cloud environments," in CloudCom, 2011, pp. 197-204.
-
(2011)
CloudCom
, pp. 197-204
-
-
Dölitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
22
-
-
59649128238
-
Agent mobility architecture based on ieee-fipa standards
-
J. Cucurull, R. Mart, G. Navarro-Arribas, S. Robles, B. Overeinder, and J. Borrell, "Agent mobility architecture based on ieee-fipa standards," Computer Communications, vol. 32, no. 4, pp. 712-729, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 712-729
-
-
Cucurull, J.1
Mart, R.2
Navarro-Arribas, G.3
Robles, S.4
Overeinder, B.5
Borrell, J.6
|