-
1
-
-
84947196919
-
-
viewed December 21, 2011
-
Cloud Security Alliance (Online), https://cloudsecurityalliance.org/ topthreats (viewed December 21, 2011)
-
Cloud Security Alliance (Online)
-
-
-
2
-
-
84947196556
-
-
Online, viewed January 21, 2012
-
Europe Network and Information Security Agency (Online), http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- assessment (viewed January 21, 2012)
-
-
-
-
3
-
-
84947196790
-
-
updated October 26, 2011
-
Microsoft Security Bulletin MS10 (Online), http://www.microsoft.com/ technet/security/bulletin/ms10070.mspx (updated October 26, 2011)
-
Microsoft Security Bulletin MS10 (Online)
-
-
-
4
-
-
84947197388
-
-
viewed July 02, 2011
-
Security of data (Online), http://news.cnet.com/8301-138463-20052571-62 (viewed July 02, 2011)
-
Security of Data (Online)
-
-
-
5
-
-
84947196751
-
-
viewed November 21, 2011
-
Security labs Blog (Online), http://securitylabs.websense.com/content/ Blogs/3402.asp (viewed November 21, 2011)
-
Security Labs Blog (Online)
-
-
-
6
-
-
69949102391
-
-
Nurmi, D., Wolski, R., Grzegorczyk, C., Obertellli, G., Soman, S., Youseff, L., Zagorodnov, D.: The Eucalyptus Open-source Cloud computing System, http://www.eucalyptus.com/whitepapers
-
The Eucalyptus Open-source Cloud Computing System
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertellli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
7
-
-
70449483229
-
Modeling and Siulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities
-
Bhuya, R., Ranjan, R., Calheiros, R.N.: Modeling and Siulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities. In: Proceedings of the 7th High Performance Computing and Simulation Conference, Leipzig, Germany, June 21-24 (2009)
-
Proceedings of the 7th High Performance Computing and Simulation Conference, Leipzig, Germany, June 21-24 (2009)
-
-
Bhuya, R.1
Ranjan, R.2
Calheiros, R.N.3
-
9
-
-
51349112877
-
Detection SYN Flooding Attacks Using Fuzzy Logic
-
Tuncer, T., Tatar, Y.: Detection SYN Flooding Attacks Using Fuzzy Logic. In: International Conference on Information Security and Assurance, ISA 2008, April 24-26, pp. 321-325 (2008)
-
(2008)
International Conference on Information Security and Assurance, ISA 2008, April 24-26
, pp. 321-325
-
-
Tuncer, T.1
Tatar, Y.2
-
10
-
-
77952377075
-
A General Model of Probabilistic Packet Marking for IP Traceback
-
ACM, Tokyo
-
Lu, L., et al.: A General Model of Probabilistic Packet Marking for IP Traceback. In: ASIACCS 2008, March 18-20. ACM, Tokyo (2008)
-
(2008)
ASIACCS 2008, March 18-20
-
-
Lu, L.1
-
11
-
-
79956153885
-
Cloud security defense to protect cloud computing against HTTP -DoS and XML-DoS attacks
-
Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defense to protect cloud computing against HTTP -DoS and XML-DoS attacks. Journal of Network and Computer Applications 34, 1097-1107 (2011)
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
12
-
-
77954319839
-
Towards secure SOAP message exchange in a SOA
-
ACM Press
-
Rahaman, M.A., Schaad, A., Rits, M.: Towards secure SOAP message exchange in a SOA. In: SWS 2006: Proceedings of the 3rd ACM Workshop on Secure Web Services, pp. 77-84. ACM Press (2006)
-
(2006)
SWS 2006: Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 77-84
-
-
Rahaman, M.A.1
Schaad, A.2
Rits, M.3
|