-
1
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared, " Grid Computing Environments Workshop, 2008. GCE'08, 2009, pp. 1-10.
-
(2009)
Grid Computing Environments Workshop 2008. GCE'08
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
2
-
-
78349232676
-
-
Virtual-ization August 2008. Electronic Mag., article
-
J. Geelan. "Twenty one experts define cloud computing, " Virtual-ization, August 2008. Electronic Mag., article available at http://virtualization.sys-con.com/node/612375.
-
Twenty One Experts Define Cloud Computing
-
-
Geelan, J.1
-
3
-
-
77951712094
-
Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities
-
R. Buyya, C. S. Yeo, and S. Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities, " CoRR, (abs/0808.3558), 2008.
-
(2008)
CoRR, (abs/0808.3558)
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal., S.3
-
4
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
DOI:10.1007/s00607-010-0140-x
-
Luis M. Vaquero, Luis Rodero-Merino and Daniel Morán, "Locking the sky: a survey on IaaS cloud security, " Computing, 2010, DOI:10.1007/s00607-010-0140-x.
-
(2010)
Computing
-
-
Luis, M.1
Luis Rodero-Merino, V.2
Morán, D.3
-
7
-
-
79952065844
-
-
Cloud Security Alliance (CSA) released March 2010
-
Cloud Security Alliance (CSA). "Top Threats to Cloud Computing V 1.0, " released March 2010.
-
Top Threats to Cloud Computing v 1.0
-
-
-
9
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
S.D. Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "A data outsourcing architecture combining cryptography and access control, " Proc. 2007 ACM workshop on Computer security architecture, 2007, pp. 63-69.
-
(2007)
Proc. 2007 ACM Workshop on Computer Security Architecture
, pp. 63-69
-
-
Di Vimercati, S.D.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores, " In ACM CCS, pages 598-609, 2007.
-
(2007)
ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
12
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels and B. S. Kaliski, "PORs: Proofs of retrievability for large files, " In ACM CCS, pages 584-597, 2007.
-
(2007)
ACM CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
13
-
-
78650345904
-
Proofs of retrievability via hardness amplication
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplication, " In TCC, 2009.
-
(2009)
TCC
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession, " SecureComm, 2008.
-
(2008)
SecureComm
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
15
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession, " Proc. 16th ACM conference on Computer and communications security, 2009, pp. 213-222.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
16
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K.D. Bowers, A. Juels, and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage, " Proc. 16th ACM conference on Computer and communications security, 2009, pp. 187-198.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, " Proc. 16th ACM conference on Computer and communications security, 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
27
-
-
29144510784
-
Nettimer: A tool for measuring bottleneck link, bandwidth
-
Berkeley, CA, USA USENIX Association
-
K. Lai, and M. Baker, "Nettimer: a tool for measuring bottleneck link, bandwidth, " In USITS'01: Proc. 3rd conference on US ENIX Symposium on Internet Technologies and Systems (Berkeley, CA, USA, 2001), USENIX Association, pp. 11-11.
-
(2001)
USITS'01: Proc. 3rd Conference on US ENIX Symposium on Internet Technologies and Systems
, pp. 11-11
-
-
Lai, K.1
Baker, M.2
-
30
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
B. D. Payne, M. Carbone, and W. Lee, "Secure and Flexible Monitoring of Virtual Machines, " In Proc. ACSAC'07, 2007.
-
(2007)
Proc. ACSAC'07
-
-
Payne, B.D.1
Carbone, M.2
Lee, W.3
-
31
-
-
77957933159
-
Preventing information leakage from indexing in the cloud
-
A. Squicciarini, S. Sundareswaran, and D. Lin, "Preventing Information Leakage from Indexing in the Cloud, " 2010 IEEE 3rd International Conference on Cloud Computing, 2010, pp. 188-195.
-
(2010)
2010 IEEE 3rd International Conference on Cloud Computing
, pp. 188-195
-
-
Squicciarini, A.1
Sundareswaran, S.2
Lin, D.3
-
32
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
2010 IEEE 3rd International Conference on Cloud Computing
-
N. Gruschka, M. Jensen, "Attack Surfaces: A Taxonomy for Attacks on Cloud Services, " Cloud Computing, IEEE International Conference on, pp. 276-279, 2010 IEEE 3rd International Conference on Cloud Computing, 2010.
-
(2010)
Cloud Computing IEEE International Conference on
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
33
-
-
77957948993
-
QUIRC: A quantitative impact and risk assessment framework for cloud security
-
2010 IEEE 3rd International Conference on Cloud Computing
-
P. Saripalli, B. Walters, "QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security, " Cloud Computing, IEEE International Conference on, pp. 280-288, 2010 IEEE 3rd International Conference on Cloud Computing, 2010.
-
(2010)
Cloud Computing IEEE International Conference on
, pp. 280-288
-
-
Saripalli, P.1
Walters, B.2
-
34
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L.L. Iacono, "On technical security issues in cloud computing, " Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 2009, pp. 109-116.
-
(2009)
Cloud Computing 2009. CLOUD'09. IEEE International Conference on
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
36
-
-
85077723796
-
Cloudav: N-version antivirus in the network cloud
-
J. Oberheide, E. Cooke, and F. Jahanian, "Cloudav: N-version antivirus in the network cloud, " Proc. 17th conference on Security symposium, 2008, pp. 91-106.
-
(2008)
Proc. 17th Conference on Security Symposium
, pp. 91-106
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
38
-
-
70549097141
-
Brief announcement: Towards secure cloud computing
-
C. Henrich, M. Huber, C. Kempka, J. Müller-Quade, and M. Strefler, "Brief Announcement: Towards Secure Cloud Computing, " Stabilization, Safety, and Security of Distributed Systems, 2009, pp. 785-786.
-
(2009)
Stabilization, Safety, and Security of Distributed Systems
, pp. 785-786
-
-
Henrich, C.1
Huber, M.2
Kempka, C.3
Müller-Quade, J.4
Strefler, M.5
-
39
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Jan.
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing, " J. Network and Computer Applications, vol. 34, Jan. 2011, pp. 1-11.
-
(2011)
J. Network and Computer Applications
, vol.34
-
-
Subashini, S.1
Kavitha, V.2
-
40
-
-
70349669587
-
Retaining data control to the client in infrastructure clouds
-
M. Descher, P. Masser, T. Feilhauer, A. Tjoa, and D. Huemer, "Retaining Data Control to the Client in Infrastructure Clouds, " Availability, Reliability and Security, 2009. ARES '09. International Conference on, 2009, pp. 9-16.
-
(2009)
Availability, Reliability and Security 2009. ARES '09. International Conference on
-
-
Descher, M.1
Masser, P.2
Feilhauer, T.3
Tjoa, A.4
Huemer, D.5
-
41
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
R. Lu, X. Lin, X. Liang, and X.S. Shen, "Secure provenance: the essential of bread and butter of data forensics in cloud computing, " Proc. 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 282-292.
-
(2010)
Proc. 5th ACM Symposium on Information, Computer and Communications Security
, pp. 282-292
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.S.4
-
42
-
-
71749102261
-
A privacy manager for cloud computing
-
S. Pearson, Y. Shen, and M. Mowbray, "A privacy manager for cloud computing, " Cloud Computing, 2009, pp. 90-106.
-
(2009)
Cloud Computing
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
44
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures, " IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.
-
(2009)
IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
45
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego, CA, March
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing, " IEEE INFO-COM 2010, San Diego, CA, March 2010.
-
(2010)
IEEE INFO-COM 2010
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
46
-
-
70350389843
-
Enabling public ver-ifiability and data dynamics for storage security in cloud computing
-
Saint Malo, France, Sep.
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public ver-ifiability and data dynamics for storage security in cloud computing, " in Proc. ESORICS'09, Saint Malo, France, Sep. 2009.
-
(2009)
Proc. ESORICS'09
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
49
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic authenticated index structures for outsourced databases, " Proc. 2006 ACM SIGMOD international conference on Management of data, June, 2006, pp. 27-29.
-
(2006)
Proc. 2006 ACM SIGMOD International Conference on Management of Data, June
, pp. 27-29
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
50
-
-
80053145661
-
Accountable virtual machines
-
A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel, "Accountable virtual machines, " 9th OSDI, 2010.
-
(2010)
9th OSDI
-
-
Haeberlen, A.1
Aditya, P.2
Rodrigues, R.3
Druschel, P.4
-
52
-
-
71749090060
-
Accountability as a way forward for privacy protection in the cloud
-
Beijing, China: Springer-Verlag
-
S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud, " Proc. 1st International Conference on Cloud Computing, Beijing, China: Springer-Verlag, 2009, pp. 131-144.
-
(2009)
Proc. 1st International Conference on Cloud Computing
, pp. 131-144
-
-
Pearson, S.1
Charlesworth, A.2
-
53
-
-
30344488259
-
Mapreduce: Simplified data processing on large clusters
-
USENIX Association, Berkeley, CA, USA
-
J. Dean and S. Ghemawat, "Mapreduce: simplified data processing on large clusters, " In OSDI'04: Proc. 6th conference on Symposium on Opearting Systems Design and Implementation. USENIX Association, Berkeley, CA, USA.
-
OSDI'04: Proc. 6th Conference on Symposium on Opearting Systems Design and Implementation
-
-
Dean, J.1
Ghemawat, S.2
-
54
-
-
77950842153
-
SecureMR: A service integrity assurance framework for mapreduce
-
W. Wei, J. Du, T. Yu, and X. Gu, "SecureMR: A Service Integrity Assurance Framework for MapReduce, " Proc. 2009 Annual Computer Security Applications Conference, 2009, pp. 73-82.
-
(2009)
Proc. 2009 Annual Computer Security Applications Conference
, pp. 73-82
-
-
Wei, W.1
Du, J.2
Yu, T.3
Gu, X.4
-
55
-
-
0001038609
-
Practical byzantine fault tolerance
-
M. Castro and B. Liskov, "Practical Byzantine fault tolerance, " Operating Systems Review, vol. 33, 1998, pp. 173-186.
-
(1998)
Operating Systems Review
, vol.33
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
57
-
-
70450247027
-
An algebra for finegrained integration of xacml policies
-
P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo, "An algebra for finegrained integration of xacml policies, " In Proc. ACM Symposium on Access Control Models and Technologies, pages 63-72, 2009.
-
(2009)
Proc. ACM Symposium on Access Control Models and Technologies
, pp. 63-72
-
-
Rao, P.1
Lin, D.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
58
-
-
77954749319
-
Token-based cloud computing
-
A.R. Sadeghi, T. Schneider, and M. Winandy, "Token-Based Cloud Computing, " Trust and Trustworthy Computing, 2010, pp. 417-429
-
Trust and Trustworthy Computing
, vol.2010
, pp. 417-429
-
-
Sadeghi, A.R.1
Schneider, T.2
Winandy, M.3
-
59
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control, " Proc. 2009 ACM workshop on Cloud computing security, 2009, pp. 85-90.
-
(2009)
Proc. 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
60
-
-
78650158728
-
Determinating timing channels in compute clouds
-
ACM, New York, NY, USA
-
A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating timing channels in compute clouds, " In Proc. 2010 ACM workshop on Cloud computing security workshop (CCSW '10). ACM, New York, NY, USA, 103-108.
-
Proc. 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW '10)
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
61
-
-
70349823934
-
What's inside the cloud? an architectural map of the cloud landscape
-
A. Lenk, M. Klems, J. Nimis, S. Tai, and T. Sandholm, "What's inside the Cloud? An architectural map of the Cloud landscape, " Software Engineering Challenges of Cloud Computing, 2009. CLOUD'09. ICSE Workshop on, 2009, pp. 23-31.
-
(2009)
Software Engineering Challenges of Cloud Computing 2009. CLOUD'09. ICSE Workshop on
, pp. 23-31
-
-
Lenk, A.1
Klems, M.2
Nimis, J.3
Tai, S.4
Sandholm, T.5
-
62
-
-
47849089563
-
Demon-strating data possession and uncheatable data transfer
-
Report 2006/150
-
D. L. G. Filho and P. S. L. M. Baretto, "Demon-strating data possession and uncheatable data transfer, " IACR ePrint archive, 2006, Report 2006/150, http://eprint.iacr.org/2006/150.
-
(2006)
IACR EPrint Archive
-
-
Filho, D.L.G.1
Baretto, P.S.L.M.2
-
63
-
-
84864718332
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
M. Van Dijk and A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing, " IACR ePrint 2010, vol. 305.
-
(2010)
IACR EPrint
, vol.305
-
-
Van Dijk, M.1
Juels, A.2
-
64
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " In STOC, pages 169-178, 2009.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
67
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
ACM, New York, NY, USA DOI=10.1145/1655008.1655022
-
M. Christodorescu, R. Sailer, D. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not (just) virtualization security: a short paper, " In Proc. 2009 ACM workshop on Cloud computing security (CCSW '09). ACM, New York, NY, USA, 97-102. DOI=10.1145/1655008.1655022 http://doi.acm.org/10. 1145/1655008.1655022.
-
Proc. 2009 ACM Workshop on Cloud Computing Security (CCSW '09)
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.3
Sgandurra, D.4
Zamboni, D.5
-
69
-
-
80051653834
-
Towards achieving accountability, auditability and trust in cloud computing
-
Springer
-
R.K.L. Ko, B.S. Lee, and S. Pearson, "Towards Achieving Accountability, Auditability and Trust in Cloud Computing, " Proc. International workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), Springer, 2011, pp.5.
-
(2011)
Proc. International Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011)
, pp. 5
-
-
Ko, R.K.L.1
Lee, B.S.2
Pearson, S.3
-
70
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities, " Security and Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011.
-
(2011)
Security and Privacy IEEE
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
71
-
-
80955157902
-
An exploration of l2 cache covert channels in virtualized environments
-
New York, NY, USA
-
Y. Xu, M. Bailey, F Jahanian, K. Joshi, M. Hiltunen, and R. Schlicht-ing, "An exploration of L2 cache covert channels in virtualized environments, " in Proc. 3rd ACM workshop on Cloud computing security workshop, New York, NY, USA, 2011, pp. 29-40.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlicht-Ing, R.6
-
72
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
K. Okamura and Y. Oyama, "Load-based covert channels between Xen virtual machines, " in Proc. 2010 ACM Symposium on Applied Computing, New York, NY, USA, 2010, pp. 173-180.
-
(2010)
Proc. 2010 ACM Symposium on Applied Computing, New York, NY, USA
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
73
-
-
80955143535
-
Eliminating fine grained timers in xen
-
B. C. Vattikonda, S. Das, and H. Shacham, "Eliminating fine grained timers in Xen, " in Proc. 3rd ACM workshop on Cloud computing security workshop, New York, NY, USA, 2011, pp. 41-46.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA
, pp. 41-46
-
-
Vattikonda, B.C.1
Das, S.2
Shacham, H.3
-
75
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
June
-
Z. Wang and R. B. Lee, "New cache designs for thwarting software cache-based side channel attacks, " In 34th International Symposium on Computer Architecture, pages 494-505, June 2007.
-
(2007)
34th International Symposium on Computer Architecture
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
-
77
-
-
51749105240
-
Non deterministic caches: A simple and effective defense against side channel attacks
-
G. Keramidas, A. Antonopoulos, D. N. Serpanos, and S. Kaxiras, "Non deterministic caches: A simple and effective defense against side channel attacks, " Design Automation for Embedded Systems, 12(3):221-230, 2008.
-
(2008)
Design Automation for Embedded Systems
, vol.12
, Issue.3
, pp. 221-230
-
-
Keramidas, G.1
Antonopoulos, A.2
Serpanos, D.N.3
Kaxiras, S.4
-
78
-
-
70349236164
-
Deconstructing new cache designs for thwarting software cache-based side channel attacks
-
October
-
J. Kong, O. Aciicmez, J.-P. Seifert, and H. Zhou, "Deconstructing new cache designs for thwarting software cache-based side channel attacks, " In 2nd ACM Workshop on Computer Security Architectures, pages 25-34, October 2008.
-
(2008)
2nd ACM Workshop on Computer Security Architectures
, pp. 25-34
-
-
Kong, J.1
Aciicmez, O.2
Seifert, J.-P.3
Zhou, H.4
-
80
-
-
80052008862
-
HomeAlone: Co-residency detection in the cloud via side-channel analysis
-
Yinqian Zhang, A. Juels, A. Oprea, and M. K. Reiter, "HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, " in 2011 IEEE Symposium on Security and Privacy (SP), 2011, pp. 313-328.
-
(2011)
2011 IEEE Symposium on Security and Privacy (SP)
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
-
81
-
-
79957840719
-
Memory deduplication as a threat to the guest os
-
K. Suzaki, K. Iijima, T. Yagi, and C. Artho, "Memory deduplication as a threat to the guest OS, " in Proc. Fourth European Workshop on System Security, New York, NY, USA, 2011, p. 1:1-1:6.
-
(2011)
Proc. Fourth European Workshop on System Security, New York, NY, USA
, pp. 11-116
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
82
-
-
84906749335
-
Software side channel attack on memory deduplication
-
K. Suzaki, K. Iijima, T. Yagi, and C. Artho, "Software Side Channel Attack on Memory Deduplication, " in 23rd ACM Symposium on Operating Systems Principles, poster, 2011.
-
(2011)
23rd ACM Symposium on Operating Systems Principles, Poster
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
83
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
New York, NY, USA
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee, "NoHype: virtualized cloud infrastructure without the virtualization, " in Proc. 37th annual international symposium on Computer architecture, New York, NY, USA, 2010, pp. 350-361.
-
(2010)
Proc. 37th Annual International Symposium on Computer Architecture
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
84
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
J. Szefer, E. Keller, R. B. Lee, and J. Rexford, "Eliminating the hypervisor attack surface for a more secure cloud, " in Proc. 18th ACM conference on Computer and communications security, New York, NY, USA, 2011, pp. 401-412.
-
(2011)
Proc. 18th ACM Conference on Computer and Communications Security, New York, NY, USA
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
85
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
April 10-15
-
C. Wang, K. Ren, J. Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing, " In IEEE Trans. Cloud Computing April 10-15, 2011.
-
(2011)
IEEE Trans. Cloud Computing
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
87
-
-
85092637329
-
Toward practical and unconditional verification of remote computations
-
Napa, CA, USA
-
S. Setty, A. Blumberg, M. Walfish, "Toward practical and unconditional verification of remote computations, " in the 13th Workshop on Hot Topics in Operating Systems, Napa, CA, USA 2011.
-
(2011)
The 13th Workshop on Hot Topics in Operating Systems
-
-
Setty, S.1
Blumberg, A.2
Walfish, M.3
-
88
-
-
80955142131
-
Do you know where your cloud files are?
-
New York, NY, USA
-
K. Benson, R. Dowsley, and H. Shacham, "Do you know where your cloud files are?, " in Proc. 3rd ACM workshop on Cloud computing security workshop, New York, NY, USA, 2011, pp. 73-82.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 73-82
-
-
Benson, K.1
Dowsley, R.2
Shacham, H.3
-
90
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations, " In ASIACCS, 2010.
-
(2010)
ASIACCS
-
-
Atallah, M.J.1
Frikken, K.B.2
-
92
-
-
84862973844
-
Secure and verifiable outsourcing of large-scale biometric computations
-
M. Blanton, Y. Zhang, and K. B. Frikken, "Secure and Verifiable Outsourcing of Large-Scale Biometric Computations, " in Privacy, Security, Risk and Trust (PASSAT), IEEE Third International Conference on Social Computing (SocialCom), 2011, pp. 1185-1191.
-
(2011)
Privacy, Security, Risk and Trust (PASSAT) IEEE Third International Conference on Social Computing (SocialCom)
, pp. 1185-1191
-
-
Blanton, M.1
Zhang, Y.2
Frikken, K.B.3
-
93
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems, " SIAM Journal on Comp., 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Comp.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
94
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
May
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy, "Proof verification and the hardness of approximation problems, " J. ACM, 45(3):501-555, May 1998.
-
(1998)
J. ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
95
-
-
85092637329
-
Toward practical and unconditional verification of remote computations
-
Napa, CA, USA
-
S. Setty, A. Blumberg, and M. Walfish, "Toward practical and unconditional verification of remote computations, " in the 13th Workshop on Hot Topics in Operating Systems, Napa, CA, USA 2011.
-
(2011)
The 13th Workshop on Hot Topics in Operating Systems
-
-
Setty, S.1
Blumberg, A.2
Walfish, M.3
-
96
-
-
80955142134
-
Detecting fraudulent use of cloud resources
-
New York, NY, USA
-
J. Idziorek, M. Tannian, and D. Jacobson, "Detecting fraudulent use of cloud resources, " in Proc. 3rd ACM workshop on Cloud computing security workshop, New York, NY, USA, 2011, pp. 61-72.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 61-72
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
98
-
-
80955157888
-
Can homomorphic encryption be practical?
-
M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?" in Proc. 3rd ACM workshop on Cloud computing security workshop, New York, NY, USA, 2011, pp. 113-124.
-
(2011)
Proc. 3rd ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
99
-
-
84857204654
-
Is that you? authentication in a network without identities
-
T. Choi, H.B. Acharya, and M. G. Gouda, "Is that you? Authentication in a network without identities, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 181-190.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 181-190
-
-
Choi, T.1
Acharya, H.B.2
Gouda, M.G.3
-
100
-
-
84857202234
-
On the (in) security of two joint encryption and error correction schemes
-
Q. Chai and G. Gong, "On the (in) security of two Joint Encryption and Error Correction schemes, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 191-200.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 191-200
-
-
Chai, Q.1
Gong, G.2
-
101
-
-
84863170280
-
An epidemic model with adaptive virus spread control for wireless sensor networks
-
S. Tang and W. Li, "An epidemic model with adaptive virus spread control for Wireless Sensor Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 201-210.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 201-210
-
-
Tang, S.1
Li, W.2
-
102
-
-
84857206460
-
KL-sense secure image steganogra-phy
-
G. Luo and K.P. Subbalakshmi, "KL-sense secure image steganogra-phy, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 211-225.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 211-225
-
-
Luo, G.1
Subbalakshmi, K.P.2
-
103
-
-
84863150088
-
Friendship-based location privacy in mobile social networks
-
W. Chang, J. Wu, and C. C. Tan, "Friendship-based location privacy in Mobile Social Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 226-236.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 226-236
-
-
Chang, W.1
Wu, J.2
Tan, C.C.3
-
104
-
-
84863152158
-
Authenticating strangers in online social networks
-
X. Zhao, L. Li, and G. Xue, "Authenticating strangers in Online Social Networks, " International J. Security and Networks, Vol. 6, No. 4, 2011, pp. 237-248.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.4
, pp. 237-248
-
-
Zhao, X.1
Li, L.2
Xue, G.3
-
105
-
-
84857163085
-
Partial iris recognition as a viable biometric scheme
-
D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 147-152
-
-
Walker, D.1
Latifi, S.2
-
106
-
-
84857177856
-
Edustega: An education-centric steganography methodology
-
A. Desoky, "Edustega: An Education-Centric Steganography Methodology, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 153-173
-
-
Desoky, A.1
-
107
-
-
84857176805
-
An intrusion detection technique based on continuous binary communication channels
-
N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels, " International J. Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 174-180
-
-
Ampah, N.1
Akujuobi, C.2
Alam, S.3
Sadiku, M.4
-
108
-
-
84867441658
-
Editorial
-
H. Chen and B. Sun, "Editorial, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 65-66.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 65-66
-
-
Chen, H.1
Sun, B.2
-
109
-
-
84857178198
-
ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
-
M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
110
-
-
84857174454
-
A three dimensional sender anonymity metric
-
N. Jaggi, U. M. Reddy, and R. Bagai, "A Three Dimensional Sender Anonymity Metric, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 77-89.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 77-89
-
-
Jaggi, N.1
Reddy, U.M.2
Bagai, R.3
-
111
-
-
84857155268
-
Improved ip multimedia subsystem authentication mechanism for 3g-wlan networks
-
M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 90-100
-
-
Sharma, M.J.1
Leung, V.C.M.2
-
112
-
-
84857145254
-
Rendezvous based trust propagation to enhance distributed network security
-
N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 101-111
-
-
Cheng, N.1
Govindan, K.2
Mohapatra, P.3
-
113
-
-
84857173760
-
A source authentication scheme using network coding
-
A. Fathy, T. ElBatt, and M. Youssef, "A Source Authentication Scheme Using Network Coding, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 112-122.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 112-122
-
-
Fathy, A.1
Elbatt, T.2
Youssef, M.3
-
114
-
-
84863152521
-
Hidden information in microsoft word
-
L. Liu, Y. Xiao, J. Zhang, A. Faulkner, and K. Weber, "Hidden Information in Microsoft Word, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 123-135.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 123-135
-
-
Liu, L.1
Xiao, Y.2
Zhang, J.3
Faulkner, A.4
Weber, K.5
-
115
-
-
84857150179
-
Exclusion-intersection encryption
-
S. S.M. Chow and S. Yiu, " Exclusion-Intersection Encryption, " International J. Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 136-146.
-
(2011)
International J. Security and Networks
, vol.6
, Issue.2-3
, pp. 136-146
-
-
Chow, S.S.M.1
Yiu, S.2
-
116
-
-
79951651888
-
Editorial
-
M. Yang, J. C.L. Liu, and Y. Tseng, "Editorial, " International J. Security and Networks, Vol. 5, No.1 pp. 1-3, 2010
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 1-3
-
-
Yang, M.1
Liu, J.C.L.2
Tseng, Y.3
-
117
-
-
77949837905
-
A backpressure technique for filtering spoofed traffic at upstream routers
-
S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers, " International J. Security and Networks, Vol. 5, No.1 pp. 3-14, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Malliga, S.1
Tamilarasi, A.2
-
118
-
-
77949801623
-
Authentication and secret search mechanisms for rfid-aware wireless sensor networks
-
S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks, " International J. Security and Networks, Vol. 5, No.1 pp. 15-25, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
119
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure wireless sensor networks
-
Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks, " International J. Security and Networks, Vol. 5, No.1 pp. 26-34, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
120
-
-
77949835881
-
Bloom filter based secure and anonymous dsr protocol in wireless ad hoc networks
-
L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks, " International J. Security and Networks, Vol. 5, No.1 pp. 35-44, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
121
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks, " International J. Security and Networks, Vol. 5, No.1 pp. 45-52, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
122
-
-
77949864345
-
Lightweight authentication protocol for mobile rfid networks
-
M. Yang, "Lightweight authentication protocol for mobile RFID networks, " International J. Security and Networks, Vol. 5, No.1 pp. 53-62, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
123
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network, " International J. Security and Networks, Vol. 5, No.1 pp. 63-76, 2010.
-
(2010)
International J. Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
124
-
-
42649088128
-
Accountability for wireless lans, ad hoc networks, and wireless mesh networks
-
Apr
-
Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks, " IEEE Commun. Mag., special issue on Security in Mobile Ad Hoc and Sensor Networks, Vol. 46, No. 4, Apr. 2008, pp. 116-126.
-
(2008)
IEEE Commun. Mag., Special Issue on Security in Mobile Ad Hoc and Sensor Networks
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
125
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept/Oct
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks, " IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
126
-
-
84855641355
-
Temporal accountability and anonymity in medical sensor networks
-
Dec
-
J. Liu, and Y. Xiao, "Temporal Accountability and Anonymity in Medical Sensor Networks, " ACM/Springer Mobile Networks and Applications (MONET), Vol. 16, No. 6, pp. 695-712, Dec. 2011.
-
(2011)
ACM/Springer Mobile Networks and Applications (MONET)
, vol.16
, Issue.6
, pp. 695-712
-
-
Liu, J.1
Xiao, Y.2
-
127
-
-
84255195594
-
Accountability using flow-net: Design, implementation, and performance evaluation
-
Jan.
-
Y. Xiao, K. Meng, and D. Takahashi, "Accountability using Flow-net: Design, Implementation, and Performance Evaluation, " (Wiley Journal of) Security and Communication Networks, Vol.5, No. 1, pp. 29-49, Jan. 2012.
-
(2012)
(Wiley Journal Of) Security and Communication Networks
, vol.5
, Issue.1
, pp. 29-49
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
-
128
-
-
84911896278
-
GlobalView: Building global view with log files in a distributed/ networked system for accountability
-
DOI: 10.1002/sec.374
-
Y. Xiao, S. Yue, B. Fu, and S. Ozdemir, "GlobalView: Building Global View with Log Files in a Distributed/Networked System for Accountability, " (Wiley Journal of) Security and Communication Networks, DOI: 10.1002/sec.374.
-
(Wiley Journal Of) Security and Communication Networks
-
-
Xiao, Y.1
Yue, S.2
Fu, B.3
Ozdemir, S.4
-
130
-
-
84865251659
-
PeerReview re-evaluation for accountability in distributed systems or networks
-
in press
-
Z. Xiao and Y. Xiao, "PeerReview Re-evaluation for Accountability in Distributed Systems or Networks, " International J. Security and Networks (IJSN), 2010, Vo. 7. No. 1, in press.
-
(2010)
International J. Security and Networks (IJSN)
, Issue.1
, pp. 7
-
-
Xiao, Z.1
Xiao, Y.2
-
132
-
-
84893572193
-
Cyber security and privacy issues in smart grids
-
DOI: 10.1109/SURV.2011.122111.00145, in press
-
J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, "Cyber Security and Privacy Issues in Smart Grids, " IEEE Commun. Surveys Tuts., DOI: 10.1109/SURV.2011.122111.00145, in press.
-
IEEE Commun. Surveys Tuts
-
-
Liu, J.1
Xiao, Y.2
Li, S.3
Liang, W.4
Chen, C.L.P.5
-
133
-
-
33646943487
-
Security and privacy in rfid and applications in telemedicine
-
Apr
-
Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine, " IEEE Commun. Mag., Vol. 44. No. 4, Apr. 2006, pp. 64-72.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
134
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
Sept./Oct.
-
H. Chen, Y. Xiao, X. Hong, F. Hu, J. Xie, "A Survey of Anonymity in Wireless Communication Systems, " (Wiley Journal) Security and Communication Networks, Vol. 2 No. 5, Sept./Oct., 2009, pp. 427-444.
-
(2009)
(Wiley Journal) Security and Communication Networks
, vol.2
, Issue.5
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.5
|