-
1
-
-
85012229582
-
Security in the cloud
-
Anthes G. Security in the cloud. Communication of the ACM 2010; 53(11):16-8.
-
(2010)
Communication of the ACM
, vol.53
, Issue.11
, pp. 16-18
-
-
Anthes, G.1
-
4
-
-
77954327465
-
-
Report EECS Department Berkeley: University of California. [Last accessed: 10.10.12]
-
Chen Y, Paxson V, Katz RH. What's new about cloud computing security?. Report EECS Department Berkeley: University of California. Available at:, http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html; 2010 [Last accessed: 10.10.12].
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
5
-
-
84885183419
-
-
Cloud Security Alliance-CSA. [Last accessed 10.10.12]
-
Cloud Security Alliance -CSA. Cloud controls matrix v.1.3. Available at: https://cloudsecurityalliance.org/; 2011 [Last accessed 10.10.12].
-
(2011)
Cloud Controls Matrix v.1.3
-
-
-
6
-
-
85030487465
-
-
Cloud Security Alliance eCSA. [Last accessed: 10.10.12]
-
Cloud Security Alliance eCSA. Consensus assessments initiative questionnaire 1.1. Available at: https://cloudsecurityalliance.org/; 2012 [Last accessed: 10.10.12].
-
(2012)
Consensus Assessments Initiative Questionnaire 1.1
-
-
-
7
-
-
77956387185
-
-
Cloud Security Alliance-CSA. [Last accessed: 10.10.12]
-
Cloud Security Alliance-CSA. Security guidance for critical areas of focus in cloud computing V2.1. Available at: http://www.cloudsecurityalliance. org/guidance/csaguide.v2.1.pdf; 2009 [Last accessed: 10.10.12].
-
(2009)
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1
-
-
-
8
-
-
79952275571
-
-
ENISA. [Last accessed: 21.12.12]
-
ENISA. Cloud computing information assurance framework. Available at: http://www.enisa.europa.eu/activities/riskmanagement/files/deliverables/ cloud-computing-informationassurance-framework; 2009 [Last accessed: 21.12.12].
-
(2009)
Cloud Computing Information Assurance Framework
-
-
-
10
-
-
84885185050
-
-
[Last accessed 21.12.12]
-
Garfinkel S. The criminal cloud-technology review. Available at: http://www.technologyreview.com/news/425770/thecriminal-cloud/; 2011 [Last accessed 21.12.12].
-
(2011)
The Criminal Cloud-technology Review
-
-
Garfinkel, S.1
-
12
-
-
84863337547
-
A review on cloud computing: Design challenges in architecture and security
-
Hu F, Qiu M, Li J, Grant T, Tylor D, McCaleb S, et al. A review on cloud computing: design challenges in architecture and security. Journal of Computing and Information Technology 2011;19(1):25-55.
-
(2011)
Journal of Computing and Information Technology
, vol.19
, Issue.1
, pp. 25-55
-
-
Hu, F.1
Qiu, M.2
Li, J.3
Grant, T.4
Tylor, D.5
McCaleb, S.6
-
16
-
-
84875980858
-
Private virtual infrastructure for cloud computing
-
In: ACM
-
Krautheim FJ. Private virtual infrastructure for cloud computing. In: Proceedings of the HotCloud 2009. ACM; 2009.
-
(2009)
Proceedings of the HotCloud 2009
-
-
Krautheim, F.J.1
-
17
-
-
84883300516
-
-
McAfee and Guardian Analytics. Report, [Last accessed: 10.11.12]
-
McAfee and Guardian Analytics. Dissecting operation high roller. Report, Available at: http://www.mcafee.com/us/resources/reports/rp-operation-high- roller.pdf; 2012 [Last accessed: 10.11.12].
-
(2012)
Dissecting Operation High Roller
-
-
-
19
-
-
79953033529
-
Secure software systems engineering: The secure Tropos approach
-
Mouratidis H. Secure software systems engineering: the secure Tropos approach. International Journal of Software 2011;6(3): 331-9.
-
(2011)
International Journal of Software
, vol.6
, Issue.3
, pp. 331-339
-
-
Mouratidis, H.1
-
20
-
-
84872680749
-
Taxonomy of quality metrics for assessing assurance of security correctness
-
Springer
-
Ouedraogo M, Savola R, Mouratidis H, Preston D, Khadraoui D, Dubois E. Taxonomy of quality metrics for assessing assurance of security correctness. Software Quality Journal 2013;21(1):67-97 [Springer].
-
(2013)
Software Quality Journal
, vol.21
, Issue.1
, pp. 67-97
-
-
Ouedraogo, M.1
Savola, R.2
Mouratidis, H.3
Preston, D.4
Khadraoui, D.5
Dubois, E.6
-
21
-
-
80755140556
-
Appraisal and reporting of security assurance at operational systems level
-
Ouedraogo M, Khadraoui D, Mouratidis H, Dubois E. Appraisal and reporting of security assurance at operational systems level. Journal of Software and System and Software 2012;85(1): 193-208. http://dx.doi.org/10.1007/s11219-011- 9169-0.
-
(2012)
Journal of Software and System and Software
, vol.85
, Issue.1
, pp. 193-208
-
-
Ouedraogo, M.1
Khadraoui, D.2
Mouratidis, H.3
Dubois, E.4
-
22
-
-
79952483316
-
User experience and security in the cloud - An empirical study in the finnish cloud consortium
-
In: IEEE
-
Oza NV, Karppinen K, Savola R. User experience and security in the cloud - an empirical study in the finnish cloud consortium. In: Proceeding of CloudCom 2010. IEEE; 2010. p. 621-8.
-
(2010)
Proceeding of CloudCom 2010
, pp. 621-628
-
-
Oza, N.V.1
Karppinen, K.2
Savola, R.3
-
23
-
-
77956353411
-
Cloud computing security issues and challenges
-
IEEE
-
Popovič K, Hocenski Z. Cloud computing security issues and challenges. Computer Issue 2010;3:344-9 [IEEE].
-
(2010)
Computer Issue
, vol.3
, pp. 344-349
-
-
Popovič, K.1
Hocenski, Z.2
-
24
-
-
84856682192
-
A SLA-based interface for security management in cloud and GRID integrations
-
In: IEEE
-
Rak M, Liccardo L, Aversa R. A SLA-based interface for security management in cloud and GRID integrations. In: proceedings of IAS 2011. IEEE; 2011. p. 378-83.
-
(2011)
Proceedings of IAS 2011
, pp. 378-383
-
-
Rak, M.1
Liccardo, L.2
Aversa, R.3
-
26
-
-
84857359528
-
Internet cloud security: The illusion of inclusion
-
Elsevier
-
Teneyuca D. Internet cloud security: the illusion of inclusion. Information Security Technical Report 2011;16(3-4):102-7 [Elsevier].
-
(2011)
Information Security Technical Report
, vol.16
, Issue.3-4
, pp. 102-107
-
-
Teneyuca, D.1
-
27
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
Springer
-
Vaquero LM, Rodero-Merino L, Morán D. Locking the sky: a survey on IaaS cloud security. Computing 2011;91(1):93-118 [Springer].
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
-
28
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
Elsevier
-
Wang G, Liu Q, Wu J, Guo M. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 2011;30(5):320-31 [Elsevier].
-
(2011)
Computers & Security
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
31
-
-
79952934355
-
FBI defends disruptive raids on texas data centers
-
[Last accessed: 10.10.12]
-
Zetter K. FBI defends disruptive raids on texas data centers. Wired Magazine. Available at: http://www.wired.com/threatlevel/2009/04/data-centers- ra/; 2009 [Last accessed: 10.10.12].
-
(2009)
Wired Magazine
-
-
Zetter, K.1
-
32
-
-
84863498079
-
Efficient audit service outsourcing for data integrity in clouds
-
Elsevier
-
Zhu Y, Hu H, Ahn GJ, Yau SS. Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software 2012;85(5):1083-95 [Elsevier].
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.5
, pp. 1083-1095
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yau, S.S.4
|