-
1
-
-
70349752533
-
-
[Online], Available
-
"Amazon Web Services." [Online]. Available: http://aws.amazon.com/.
-
Amazon Web Services
-
-
-
2
-
-
78649988138
-
-
[Online], Available
-
"Windows Azure Platform." [Online]. Available: https://www.windowsazure.com/en-us/.
-
Windows Azure Platform
-
-
-
3
-
-
84881273188
-
Google app engine
-
[Online], Available
-
"Google App Engine." Google, [Online]. Available: https://developers.google.com/appengine/.
-
Google
-
-
-
4
-
-
84881171803
-
-
[Online], Available
-
"Rackspace." [Online]. Available: http://www.rackspace.com/.
-
Rackspace
-
-
-
8
-
-
84865100547
-
NIST cloud computing reference architecture
-
[Online], Available
-
F. Liu, J. Tong, J. Mao, R. B. Bohn, J. V. Messina, M. L. Badger and D. M. Leaf, "NIST Cloud Computing Reference Architecture." Cloud Computing Program Information Technology Laboratory National Institute of Standards and Technology, 2011. [Online]. Available: http://www.nist.gov/ customcf/getpdf.cfm?pubid=909505.
-
(2011)
Cloud Computing Program Information Technology Laboratory National Institute of Standards and Technology
-
-
Liu, F.1
Tong, J.2
Mao, J.3
Bohn, R.B.4
Messina, J.V.5
Badger, M.L.6
Leaf, D.M.7
-
10
-
-
84881298078
-
Assessing network path vulnerabilities for secure cloud computing
-
Los Angeles
-
N. Luna, S. Shetty, T. Rogers and K. Xiong, "Assessing Network Path Vulnerabilities for Secure Cloud Computing, " in First GENI Research and Educational Experiment Workshop, Los Angeles, 2012.
-
(2012)
First GENI Research and Educational Experiment Workshop
-
-
Luna, N.1
Shetty, S.2
Rogers, T.3
Xiong, K.4
-
11
-
-
84947612643
-
Proximity breeds danger: Emerging threats in metro-area wireless networks
-
Berkeley
-
P. Akritidis, W. Chin, V. Lam, S. Sidiroglou and K. Anagnostakis, "Proximity breeds danger: emerging threats in metro-area wireless networks, " in SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Berkeley, 2007.
-
(2007)
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Akritidis, P.1
Chin, W.2
Lam, V.3
Sidiroglou, S.4
Anagnostakis, K.5
-
13
-
-
77951716672
-
Ranking attacks based on vulnerability analysis
-
Hawaii
-
J. A. Wang, H. Wang, M. Guo, Z. Linfeng and J. Camargo, "Ranking Attacks Based on Vulnerability Analysis, " in 43rd International Conference on System Sciences, Hawaii, 2010.
-
(2010)
43rd International Conference on System Sciences
-
-
Wang, J.A.1
Wang, H.2
Guo, M.3
Linfeng, Z.4
Camargo, J.5
-
14
-
-
84863049064
-
Automatic security analysis using security metrics
-
Baltimore, MD
-
K. Sun, S. Jajodia, J. Li, Y. Cheng, W. Tang and A. Singhal, "Automatic Security Analysis Using Security Metrics, " in MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011, Baltimore, MD, 2011.
-
(2011)
Military Communications Conference, 2011 - Milcom 2011
-
-
Sun, K.1
Jajodia, S.2
Li, J.3
Cheng, Y.4
Tang, W.5
Singhal, A.6
-
16
-
-
84881154530
-
Defining and assessing quantitative security risk measures using vulnerability lifecycle and cvss metrics
-
Las Vegas
-
H. Joh and Y. K. Malaiya, "Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics, " in SAM'11 The 2011 International Conference on Security and Management, Las Vegas, 2011.
-
(2011)
SAM'11 the 2011 International Conference on Security and Management
-
-
Joh, H.1
Malaiya, Y.K.2
-
17
-
-
84881280084
-
An empirical study on using the national vulnerability database to predict software vulnerabilities
-
Toulouse, France
-
S. Zhang, D. Caragea and X. Ou, "An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities, " in International conference on Database and expert systems applications (DEXA'11), Toulouse, France, 2011.
-
(2011)
International Conference on Database and Expert Systems Applications (DEXA'11)
-
-
Zhang, S.1
Caragea, D.2
Ou, X.3
-
25
-
-
80053155506
-
CloudCmp: Comparing public cloud providers
-
A. Li, et. al., "CloudCmp: Comparing Public Cloud Providers, " Internet Measurement Conference, 2010.
-
(2010)
Internet Measurement Conference
-
-
Li, A.1
-
26
-
-
77950681319
-
Ethics in security vulnerability research
-
A. M. Matwyshyn, A. Cui, A. D. Keromytis and S. Stolfo, "Ethics in Security Vulnerability Research, " IEEE Security & Privacy, vol. 8, no. 2, pp. 67 - 72, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.2
, pp. 67-72
-
-
Matwyshyn, A.M.1
Cui, A.2
Keromytis, A.D.3
Stolfo, S.4
|