-
1
-
-
43449138479
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H. (2008), "Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions" in J. Cryptol., Vol. 21, No. 3, pp. 350-91.
-
(2008)
J. Cryptol.
, vol.21
, Issue.3
, pp. 350-391
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
78149305944
-
-
available at:, (accessed May 1, 2012), Amazon
-
Amazon (2006), Amazon Elastic Compute Cloud (amazon ec2), available at: http://aws.amazon.com/ec2/ (accessed May 1, 2012).
-
(2006)
Amazon Elastic Compute Cloud (Amazon ec2)
-
-
-
4
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I. (2009), "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility" in Future Gener. Comput. Syst., Vol. 25, No. 6, pp. 599-616.
-
(2009)
Future Gener. Comput. Syst.
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
5
-
-
79751511212
-
-
Tech. Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, CA
-
Chen, Y., Paxson, V., Katz, R.H. (2010), "Whats new about cloud computing security?", EECS Department, University of California, Berkeley, CA, Tech. Report UCB/EECS-2010-5.
-
(2010)
Whats new about cloud computing security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
6
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM, New York, NY
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009), "Controlling data in the cloud: outsourcing computation without outsourcing control" in Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM, New York, NY, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
7
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P
-
Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P. (2010), "Combining fragmentation and encryption to protect privacy in data storage" in ACM Trans. Inf. Syst. Secur., Vol. 13, No. 3, pp. 22:1-22:33.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
, pp. 1-22
-
-
Ciriani, V.1
-
8
-
-
84866163270
-
Security issues in cloud computing
-
Curran, K., Carlin, S., Adams, M. (2011), "Security issues in cloud computing" in Elixir, Vol. 38, No. 1, pp. 4069-72.
-
(2011)
Elixir
, vol.38
, Issue.1
, pp. 4069-4072
-
-
Curran, K.1
Carlin, S.2
Adams, M.3
-
9
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
ACM, New York, NY
-
Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P. (2003), "Balancing confidentiality and efficiency in untrusted relational DBMSs" in Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03, ACM, New York, NY, pp. 93-102.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 93-102
-
-
Damiani, E.1
de Capitani Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
84878855647
-
-
available at:, (accessed March 8, 2012), Center Electronic Privacy Information
-
Electronic Privacy Information Center (1972), The Code of Fair Information Practices, available at: www.epic.org/privacy/consumer (accessed March 8, 2012).
-
(1972)
The Code of Fair Information Practices
-
-
-
11
-
-
77957936026
-
-
available at:, (accessed July 1, 2011), Google
-
Google (2008), "Google app engine", available at: http://code.google.com/appengine/ (accessed July 1, 2011).
-
(2008)
Google app engine
-
-
-
12
-
-
74949093980
-
The cost of a cloud: Research problems in data center networks
-
Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2008), "The cost of a cloud: research problems in data center networks" in SIGCOMM Comput. Commun. Rev., Vol. 39, No. 1, pp. 68-73.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 68-73
-
-
Greenberg, A.1
Hamilton, J.2
Maltz, D.A.3
Patel, P.4
-
13
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Grobauer, B., Walloschek, T., Stocker, E. (2011), "Understanding cloud computing vulnerabilities" in IEEE Security and Privacy, Vol. 9, No. 2, pp. 50-7.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
14
-
-
84878849861
-
-
available at:, (accessed November 8, 2011), IBM
-
IBM (2011), IBM Smart Cloud, available at: www.ibm.com/cloud-computing/us/en/ (accessed November 8, 2011).
-
(2011)
IBM Smart Cloud
-
-
-
15
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Islam, S., Mouratidis, H., Jürjens, J. (2011), "A framework to support alignment of secure software engineering with legal regulations" in Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), Vol. 10, No. 3, pp. 369-94.
-
(2011)
Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML)
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
16
-
-
84878887826
-
-
IGI Publication, Hershey, PA
-
Islam, S., Mouratidis, H., Weippl, E. (2012), A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System, Security Engineering for Cloud Computing: Approaches and Tools, IGI Publication, Hershey, PA.
-
(2012)
A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System, Security Engineering for Cloud Computing: Approaches and Tools
-
-
Islam, S.1
Mouratidis, H.2
Weippl, E.3
-
17
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman, L.M. (2009), "Data security in the world of cloud computing" in IEEE Security and Privacy, Vol. 7, No. 4, pp. 61-4.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
18
-
-
84878861010
-
-
available at:, (accessed May 8, 2012), Microsoft
-
Microsoft (2011), "Microsoft cloud", available at: www.microsoft.com/en us/cloud/default.aspx? fbid=K0xFa7eU XmQ (accessed May 8, 2012).
-
(2011)
Microsoft cloud
-
-
-
19
-
-
78650365319
-
Risk-based confidentiality requirements specification for outsourced it systems
-
IEEE Computer Society, Washington, DC
-
Morali, A., Wieringa, R. (2010), "Risk-based confidentiality requirements specification for outsourced it systems" in Proceedings of the 2010 18th IEEE International Requirements Engineering Conference, RE '10, IEEE Computer Society, Washington, DC, pp. 199-208.
-
(2010)
Proceedings of the 2010 18th IEEE International Requirements Engineering Conference, RE '10
, pp. 199-208
-
-
Morali, A.1
Wieringa, R.2
-
20
-
-
84866253432
-
Aligning security and privacy to support the development of secure information systems, special issue security in information systems
-
Mouratidis, H., Kalloniatis, C., Islam, S., Philippe Huget, M., Gritzalis, S. (2012), "Aligning security and privacy to support the development of secure information systems, special issue security in information systems" in Journal of Universal Computer Science (JUCS), Vol. 18, No. 12, pp. 1608-27.
-
(2012)
Journal of Universal Computer Science (JUCS)
, vol.18
, Issue.12
, pp. 1608-1627
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Philippe Huget, M.4
Gritzalis, S.5
-
21
-
-
79551559878
-
Cloud computing: New challenge to the entire computer industry
-
Nishchal, N., Mathur, P. (2010), "Cloud computing: new challenge to the entire computer industry" in Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference, pp. 223-8.
-
(2010)
Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference
, pp. 223-228
-
-
Nishchal, N.1
Mathur, P.2
-
22
-
-
84878871861
-
-
available at:, (accessed October 14, 2012), Oracle
-
Oracle (2010), Oracle Cloud Computing White Paper, available at: www.oracle.com/us/technologies/cloud/oracle-cloud-computing-wp-076373.pdf (accessed October 14, 2012).
-
(2010)
Oracle Cloud Computing White Paper
-
-
-
23
-
-
77954051808
-
The NIST definition of cloud computing (draft)
-
NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, MD
-
Peter, M., Grance, T. (2011), "The NIST definition of cloud computing (draft)", National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-145.
-
(2011)
-
-
Peter, M.1
Grance, T.2
-
25
-
-
50249180682
-
A note on storage fragmentation and program segmentation
-
Randell, B. (1969), "A note on storage fragmentation and program segmentation" in Communications of the ACM, Vol. 12, No. 4, pp. 365-9.
-
(1969)
Communications of the ACM
, vol.12
, Issue.4
, pp. 365-369
-
-
Randell, B.1
-
26
-
-
0027642008
-
Efficient storage techniques for digital continuous multimedia
-
Rangan, P.V., Vin, H.M. (1993), "Efficient storage techniques for digital continuous multimedia" in IEEE Trans. Knowl. Data Eng., Vol. 5, No. 4, pp. 564-73.
-
(1993)
IEEE Trans. Knowl. Data Eng.
, vol.5
, Issue.4
, pp. 564-573
-
-
Rangan, P.V.1
Vin, H.M.2
-
27
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J.B.D., Ahn, G.-J. (2010), "Security and privacy challenges in cloud computing environments" in IEEE Security and Privacy, Vol. 8, No. 6, pp. 24-31.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
28
-
-
46149083097
-
-
Course Technology Press, Boston, MA
-
Umanath, N.S., Scamell, R.W. (2007), Data Modeling and Database Design, Course Technology Press, Boston, MA.
-
(2007)
Data Modeling and Database Design
-
-
Umanath, N.S.1
Scamell, R.W.2
-
29
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M. (2008), "A break in the clouds: towards a cloud definition" in SIGCOMM Comput. Commun. Rev., Vol. 39, No. 1, pp. 50-5.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
30
-
-
84878821547
-
-
available at:, (accessed July 8, 2012)
-
Widman, J. (2011), "10 massive security breaches", available at: www.informationweek.com/news/galleries/security/attacks/229300675 (accessed July 8, 2012).
-
(2011)
10 massive security breaches
-
-
Widman, J.1
-
31
-
-
78649290366
-
The NIST definition of cloud computing
-
Mell, P., Grance, T. (2009), "The NIST definition of cloud computing" in National Institute of Standards and Technology, Vol. 53, No. 6, p. 50.
-
(2009)
National Institute of Standards and Technology
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
|