-
2
-
-
84874242180
-
-
And Beyond
-
K. Subramanian. Research Report: Cloud Trends In 2011 And Beyond. [Online]. Available: http://www.cloudave.com/9587/research-report-cloud-trends- in-2011-and-beyond/
-
(2011)
Research Report: Cloud Trends
-
-
Subramanian, K.1
-
3
-
-
74049087607
-
The RESERVOIR model and architecture for open federated cloud computing
-
July
-
B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I. M. Llorente, R. Montero, Y. Wolfsthal, E. Elmroth, J. Cáceres, M. Ben-Yehuda, W. Emmerich, and F. Galán, "The RESERVOIR model and architecture for open federated cloud computing," IBM J. Res. Dev., vol. 53, pp. 535-545, July 2009. [Online]. Available: http://portal.acm.org/citation.cfm?id=1850659. 1850663
-
(2009)
IBM J. Res. Dev
, vol.53
, pp. 535-545
-
-
Rochwerger, B.1
Breitgand, D.2
Levy, E.3
Galis, A.4
Nagin, K.5
Llorente, I.M.6
Montero, R.7
Wolfsthal, Y.8
Elmroth, E.9
Cáceres, J.10
Ben-Yehuda, M.11
Emmerich, W.12
Galán, F.13
-
4
-
-
84874240071
-
-
K. Salmon, "Demystifying the Cloud." [Online]. Available: http://www.kurtsalmon.com/publications/demystifying-the-cloud/
-
Demystifying the Cloud
-
-
Salmon, K.1
-
7
-
-
84856104767
-
Service injection: A threat to self-managed complex systems
-
Los Alamitos, CA, USA: IEEE Computer Society
-
P. H. Meland, "Service injection: A threat to self-managed complex systems," in Dependable, Autonomic and Secure Computing, IEEE International Symposium on. Los Alamitos, CA, USA: IEEE Computer Society, 2011, pp. 1-6.
-
(2011)
Dependable, Autonomic and Secure Computing IEEE International Symposium on
, pp. 1-6
-
-
Meland, P.H.1
-
8
-
-
80455144630
-
Security SLAs for federated cloud services
-
K. Bernsmed, M. G. Jaatun, P. H. Meland, and A. Undheim, "Security SLAs for Federated Cloud Services," in Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011), 2011.
-
(2011)
Proceedings of the Sixth International Conference on Availability, Reliability and Security (AReS 2011)
-
-
Bernsmed, K.1
Jaatun, M.G.2
Meland, P.H.3
Undheim, A.4
-
9
-
-
84872361020
-
-
Trend Micro Inc.
-
(2011) Cloud Security Survey Global Executive Summary. Trend Micro Inc. [Online]. Available: http://us.trendmicro.com/imperia/md/content/us/trendwatch/ cloud/global cloud survey exec summary final.pdf
-
(2011)
Cloud Security Survey Global Executive Summary
-
-
-
10
-
-
77954327465
-
-
EECS Department University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5 Jan
-
Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5, Jan 2010. [Online]. Available: http://www.eecs. berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
14
-
-
84874229322
-
Cloud computing: Emerging legal issues for access to data, anywhere, anytime
-
July
-
W. M. H. and D. J. Buller, "Cloud computing: Emerging legal issues for access to data, anywhere, anytime," Journal of Internet Law, July 2010.
-
(2010)
Journal of Internet Law
-
-
M, H.W.1
Buller, D.J.2
-
15
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
December
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," SIGCOMM Comput. Commun. Rev., vol. 39, pp. 50-55, December 2008. [Online]. Available: http://doi.acm.org/10.1145/1496091.1496100
-
(2008)
SIGCOMM Comput. Commun. Rev
, vol.39
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
18
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
Berkeley, CA, USA: USENIX Association
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vtpm: virtualizing the trusted platform module," in Proceedings of the 15th conference on USENIX Security Symposium-Volume 15. Berkeley, CA, USA: USENIX Association, 2006. [Online]. Available: http://portal.acm.org/citation.cfm?id=1267336.1267357
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
20
-
-
84875980858
-
Private virtual infrastructure for cloud computing
-
Berkeley, CA, USA: USENIX Association
-
F. J. Krautheim, "Private virtual infrastructure for cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 5-5. [Online]. Available: http://portal.acm.org/citation.cfm?id=1855533. 1855538
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, Ser. HotCloud
, vol.9
, pp. 5-5
-
-
Krautheim, F.J.1
-
22
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM
-
D. Chaum, C. Crépeau, and I. Damgard, "Multiparty unconditionally secure protocols," in Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, 1988, pp. 11-19.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
23
-
-
80052383468
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: a framework for fast privacy-preserving computations," Cryptology ePrint Archive, Report 2008/289, 2008, http://eprint.iacr.org/.
-
Cryptology EPrint Archive, Report 2008
, vol.289
, pp. 2008
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
25
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Springer
-
N. Smart and F. Vercauteren, "Fully homomorphic encryption with relatively small key and ciphertext sizes," in Proceedings of Public Key Cryptography-PKC 2010. Springer, 2010, pp. 420-443.
-
(2010)
Proceedings of Public Key Cryptography-PKC 2010
, pp. 420-443
-
-
Smart, N.1
Vercauteren, F.2
-
26
-
-
84864578620
-
Enhancing privacy in cloud computing via policy-based obfuscation
-
10.1007/s11227-010-0425-z
-
M. Mowbray, S. Pearson, and Y. Shen, "Enhancing privacy in cloud computing via policy-based obfuscation," The Journal of Supercomputing, pp. 1-25, 2010, 10.1007/s11227-010-0425-z. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0425-z
-
(2010)
The Journal of Supercomputing
, pp. 1-25
-
-
Mowbray, M.1
Pearson, S.2
Shen, Y.3
-
27
-
-
79960903995
-
A farewell to trust: An approach to confidentiality control in the cloud
-
M. G. Jaatun, A. A. Nyre, S. Alapnes, and G. Zhao, "A Farewell to Trust: An Approach to Confidentiality Control in the Cloud," in Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011), 2011.
-
(2011)
Proceedings of the 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless Vitae Chennai 2011)
-
-
Jaatun, M.G.1
Nyre, A.A.2
Alapnes, S.3
Zhao, G.4
-
28
-
-
84926426283
-
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
-
M. G. Jaatun, G. Zhao, A. Vasilakos, A. A. Nyre, S. Alapnes, and Y. Tang, "The design of a redundant array of independent net-storages for improved confidentiality in cloud computing," Journal of Cloud Computing: Advances, Systems and Applications, vol. 1, no. 1, p. 13, 2012. [Online]. Available: http://www.journalofcloudcomputing.com/content/1/1/13
-
(2012)
Journal of Cloud Computing: Advances, Systems and Applications
, vol.1
, Issue.1
, pp. 13
-
-
Jaatun, M.G.1
Zhao, G.2
Vasilakos, A.3
Nyre, A.A.4
Alapnes, S.5
Tang, Y.6
-
29
-
-
85084161366
-
Tor: The secondgeneration onion router
-
USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," in Proceedings of the 13th conference on USENIX Security Symposium-Volume 13. USENIX Association, 2004, pp. 21-21.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
30
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
10.1007/BF00206326
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, pp. 65-75, 1988, 10.1007/BF00206326. [Online]. Available: http://dx.doi.org/10.1007/ BF00206326
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
31
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-90, February 1981. [Online]. Available: http://doi.acm.org/10.1145/358549.358563
-
(1981)
Commun ACM
, vol.24
, pp. 84-90
-
-
Chaum, D.L.1
-
32
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
New York, NY, USA: ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "Hail: a high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM conference on Computer and communications security, ser. CCS '09. New York, NY, USA: ACM, 2009, pp. 187-198. [Online]. Available: http://doi.acm.org/10.1145/ 1653662.1653686
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, Ser. CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
33
-
-
77954899284
-
Racs: A case for cloud storage diversity
-
ACM symposium on Cloud computing, ser. SoCC '10. New York, NY, USA: ACM
-
H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, "Racs: a case for cloud storage diversity," in Proceedings of the 1st ACM symposium on Cloud computing, ser. SoCC '10. New York, NY, USA: ACM, 2010, pp. 229-240. [Online]. Available: http://doi.acm.org/10.1145/1807128.1807165
-
(2010)
Proceedings of the 1st
, pp. 229-240
-
-
Abu-Libdeh, H.1
Princehouse, L.2
Weatherspoon, H.3
-
34
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
New York, NY, USA ACM
-
R. R. Henning, "Security service level agreements: quantifiable security for the enterprise?" in Proceedings of the 1999 workshop on New security paradigms, ser. NSPW '99. New York, NY, USA: ACM, 2000, pp. 54-60.
-
(2000)
Proceedings of the 1999 Workshop on New Security Paradigms, Ser. NSPW
, vol.99
, pp. 54-60
-
-
Henning, R.R.1
-
35
-
-
84882690392
-
A SLA evaluation methodology in Service Oriented Architectures
-
D. Gollmann, F. Massacci, and A. Yautsiukhin, Eds Springer US
-
V. Casola, A. Mazzeo, N. Mazzocca, and M. Rak, "A SLA evaluation methodology in Service Oriented Architectures," in Quality of Protection, ser. Advances in Information Security, D. Gollmann, F. Massacci, and A. Yautsiukhin, Eds. Springer US, 2006, vol. 23, pp. 119-130.
-
(2006)
Quality of Protection, Ser. Advances in Information Security
, vol.23
, pp. 119-130
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Rak, M.4
-
37
-
-
77953032795
-
SLA Perspective in security management for cloud computing
-
IEEE, March
-
S. A. de Chaves, C. B. Westphall, and F. R. Lamin, "SLA Perspective in Security Management for Cloud Computing," in Proceeding of the 2010 Sixth International Conference on Networking and Services. IEEE, March 2010, pp. 212-217.
-
(2010)
Proceeding of the 2010 Sixth International Conference on Networking and Services
, pp. 212-217
-
-
De Chaves, S.A.1
Westphall, C.B.2
Lamin, F.R.3
-
40
-
-
0035149461
-
SLA management in federated environments
-
January
-
P. Bhoj, S. Singhal, and S. Chutani, "SLA management in federated environments," Comput. Netw., vol. 35, pp. 5-24, January 2001. [Online]. Available: http://portal.acm.org/citation.cfm?id=370802. 370805
-
(2001)
Comput. Netw
, vol.35
, pp. 5-24
-
-
Bhoj, P.1
Singhal, S.2
Chutani, S.3
-
42
-
-
0347728469
-
-
IBM, Tech. Rep
-
H. Ludwig, A. Keller, A. Dan, R. P. King, and R. Franck, "Web Service Level Agreement (WSLA) Language Specification," IBM, Tech. Rep., 2003.
-
(2003)
Web Service Level Agreement (WSLA) Language Specification
-
-
Ludwig, H.1
Keller, A.2
Dan, A.3
King, R.P.4
Franck, R.5
-
44
-
-
78349233199
-
A framework for multi-level sla management
-
Springer-Verlag
-
M. Comuzzi, C. Kotsokalis, C. Rathfelder, W. Theilmann, U. Winkler, and G. Zacco, "A framework for multi-level sla management," in Proceedings of the 2009 international conference on Service-oriented computing, ser. ICSOC/ServiceWave'09. Springer-Verlag, 2009, pp. 187-196.
-
(2009)
Proceedings of the 2009 International Conference on Service-oriented Computing, Ser. ICSOC/ServiceWave'09
, pp. 187-196
-
-
Comuzzi, M.1
Kotsokalis, C.2
Rathfelder, C.3
Theilmann, W.4
Winkler, U.5
Zacco, G.6
-
45
-
-
78049370669
-
A reference architecture for multi-Level SLA management
-
W. Theilmann, J. Happe, C. Kotsokalis, A. Edmonds, K. Kearney, and J. Lambea, "A Reference Architecture for Multi-Level SLA Management," Journal of Internet Engineering, vol. 4, no. 1, pp. 289-298, 2010.
-
(2010)
Journal of Internet Engineering
, vol.4
, Issue.1
, pp. 289-298
-
-
Theilmann, W.1
Happe, J.2
Kotsokalis, C.3
Edmonds, A.4
Kearney, K.5
Lambea, J.6
-
50
-
-
84874280149
-
-
"VISION Cloud," http://www.visioncloud.eu/.
-
VISION Cloud
-
-
-
51
-
-
51949106089
-
An improved calculus for secure dynamic services composition
-
Washington, DC, USA: IEEE Computer Society
-
D.-H. Xu, Y. Qi, D. Hou, G.-Z. Wang, and Y. Chen, "An improved calculus for secure dynamic services composition," in Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference. Washington, DC, USA: IEEE Computer Society, 2008, pp. 686-691. [Online]. Available: http://portal.acm.org/citation.cfm?id=1444455.1446065
-
Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference
, vol.2008
, pp. 686-691
-
-
Xu, D.-H.1
Qi, Y.2
Hou, D.3
Wang, G.-Z.4
Chen, Y.5
-
52
-
-
34748902211
-
Web services security: Challenges and techniques
-
Washington, DC, USA: IEEE Computer Society
-
A. Singhal, "Web services security: Challenges and techniques," in Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks. Washington, DC, USA: IEEE Computer Society, 2007, pp. 282-. [Online]. Available: http://portal.acm.org/citation.cfm?id= 1263544.1263904
-
(2007)
Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 282
-
-
Singhal, A.1
-
53
-
-
78649302229
-
Cloud computing: State-ofthe-art and research challenges
-
Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-ofthe-art and research challenges," Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, 2010. [Online]. Available: http://www.springerlink.com/index/10.1007/s13174-010-0007-6
-
(2010)
Journal of Internet Services and Applications
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
54
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities
-
sept.
-
R. Buyya, C. S. Yeo, and S. Venugopal, "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities," in High Performance Computing and Communications, 2008. HPCC '08. 10th IEEE International Conference on, sept. 2008, pp. 5-13.
-
(2008)
High Performance Computing and Communications 2008. HPCC '08. 10th IEEE International Conference on
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
55
-
-
80455123236
-
The truth about microsoft azure-and where your data will be kept
-
August
-
J. Honeyball, "The truth about microsoft azure-and where your data will be kept," PC Pro, August 2009.
-
(2009)
PC Pro
-
-
Honeyball, J.1
-
56
-
-
84864886883
-
Expressing cloud security requirements in deontic contract languages
-
P. H. Meland, K. Bernsmed, M. G. Jaatun, H. Castejon, and A. Undheim, "Expressing Cloud Security Requirements in Deontic Contract Languages," in Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER 2012), 2012.
-
(2012)
Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER)
-
-
Meland, P.H.1
Bernsmed, K.2
Jaatun, M.G.3
Castejon, H.4
Undheim, A.5
|