-
2
-
-
82255163814
-
-
May, Available at
-
Amazon Web Services. Overview of security processes, May 2011. Available at http://aws.amazon.com/security.
-
(2011)
Overview of Security Processes
-
-
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. H. Lea Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the ACM Conference on Computer and Communications Security, 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Lea Kissner, J.H.4
Peterson, Z.5
Song, D.6
-
9
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to tell if your cloud files are vulnerable to drive crashes. In Proceedings of the ACM Conference on Computer and Communications Security, 2011.
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
18
-
-
85015375134
-
Dude, where's that IP? Circumventing measurement-based IP geolocation
-
P. Gill, Y. Ganjali, B. Wong, and D. Lie. Dude, where's that IP? Circumventing measurement-based IP geolocation. In Proceedings of the USENIX Security Symposium, 2010.
-
(2010)
Proceedings of the USENIX Security Symposium
-
-
Gill, P.1
Ganjali, Y.2
Wong, B.3
Lie, D.4
-
19
-
-
70449616661
-
-
Feb 15
-
N. Gohring. Amazon's S3 down for several hours. PC World, Feb 15 2008. http://www.pcworld.com/businesscenter/article/142549/amazons-s3-down-for- several-hours.html.
-
(2008)
Amazon's S3 Down for Several Hours
-
-
Gohring, N.1
-
20
-
-
33745897370
-
Constraint-based geolocation of Internet hosts
-
December
-
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida. Constraint-based geolocation of Internet hosts. Transactions on Networking, 14(6), December 2006.
-
(2006)
Transactions on Networking
, vol.14
, Issue.6
-
-
Gueye, B.1
Ziviani, A.2
Crovella, M.3
Fdida, S.4
-
22
-
-
84874907987
-
Amazon targets US government with GovCloud
-
August
-
D. Harris. Amazon targets US government with GovCloud. The New York Times, August 2011. http://nyti.ms/y6A0ZH.
-
(2011)
The New York Times
-
-
Harris, D.1
-
26
-
-
34547469869
-
Towards IP geolocation using delay and topology measurements
-
E. Katz-Bassett, J. P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe. Towards IP geolocation using delay and topology measurements. In Proceedings of the Conference on Internet Measurement, 2006.
-
(2006)
Proceedings of the Conference on Internet Measurement
-
-
Katz-Bassett, E.1
John, J.P.2
Krishnamurthy, A.3
Wetherall, D.4
Anderson, T.5
Chawathe, Y.6
-
27
-
-
80053414679
-
-
February, Available at
-
V. Kundra. Federal cloud computing strategy, February 2011. Available at http://www.cio.gov/documents/federal-cloud-computing-strategy.pdf.
-
(2011)
Federal Cloud Computing Strategy
-
-
Kundra, V.1
-
28
-
-
79960175942
-
Diusing the cloud: Cloud computing and implications for public policy
-
K. E. Kushida, J. Murray, and J. Zysman. Diusing the cloud: Cloud computing and implications for public policy. Journal of Industry, Competition and Trade, 11(3), 2011.
-
(2011)
Journal of Industry, Competition and Trade
, vol.11
, Issue.3
-
-
Kushida, K.E.1
Murray, J.2
Zysman, J.3
-
29
-
-
69649090340
-
A detailed path-latency model for router geolocation
-
S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay. A detailed path-latency model for router geolocation. In Proceedings of the International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009.
-
(2009)
Proceedings of the International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops
-
-
Laki, S.1
Matray, P.2
Haga, P.3
Csabai, I.4
Vattay, G.5
-
31
-
-
84874881573
-
Building confidence in the cloud: A proposal for industry and government action to advance cloud computing
-
Microsoft Corporation., January
-
Microsoft Corporation. Building confidence in the cloud: A proposal for industry and government action to advance cloud computing. Technical report, Microsoft Corporation, January 2010.
-
(2010)
Technical Report, Microsoft Corporation
-
-
-
32
-
-
60349120237
-
The complexity of online memory checking
-
M. Naor and G. N. Rothblum. The complexity of online memory checking. Journal of the ACM, 56(1), 2009.
-
(2009)
Journal of the ACM
, vol.56
, Issue.1
-
-
Naor, M.1
Rothblum, G.N.2
-
34
-
-
14944358767
-
Scale-free behavior of the internet global performance
-
R. Percacci and A. Vespignani. Scale-free behavior of the internet global performance. European Physical Journal B, 32(4), 2003.
-
(2003)
European Physical Journal B
, vol.32
, Issue.4
-
-
Percacci, R.1
Vespignani, A.2
-
36
-
-
84872712725
-
Ip geolocation databases: Unreliable?
-
I. Poese, S. Uhlig, M. A. Kâafar, B. Donnet, and B. Gueye. Ip geolocation databases: unreliable? Computer Communication Review, 41(2), 2011.
-
(2011)
Computer Communication Review
, vol.41
, Issue.2
-
-
Poese, I.1
Uhlig, S.2
Kâafar, M.A.3
Donnet, B.4
Gueye, B.5
-
40
-
-
84856404337
-
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts
-
S. Siwpersad, B. Gueye, and S. Uhlig. Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts. In Passive and Active Network Measurement, 2008.
-
(2008)
Passive and Active Network Measurement
-
-
Siwpersad, S.1
Gueye, B.2
Uhlig, S.3
-
41
-
-
77951106025
-
Multiobjective monitoring for SLA compliance
-
J. Sommers, P. Barford, N. Duffield, and A. Ron. Multiobjective monitoring for SLA compliance. Transaction on Networking, 18(2), 2010.
-
(2010)
Transaction on Networking
, vol.18
, Issue.2
-
-
Sommers, J.1
Barford, P.2
Duffield, N.3
Ron, A.4
-
43
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the European Symposium on Research in Computer Security, 2009.
-
(2009)
Proceedings of the European Symposium on Research in Computer Security
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|