-
2
-
-
84886729827
-
-
Aws management console. Amazon web services
-
Aws management console. Amazon web services. http://aws.amazon.com/ console/
-
-
-
-
7
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
Celesti A, Tusa F, Villari M, Puliafito A (2010) Security and cloud computing: intercloud identity management infrastructure. In: WETICE, pp 263-265
-
(2010)
WETICE
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
8
-
-
80054985773
-
State of security readiness
-
Chandramouli R, Mell P (2010) State of security readiness. Crossroads 16(3):23-25
-
(2010)
Crossroads
, vol.16
, Issue.3
, pp. 23-25
-
-
Chandramouli, R.1
Mell, P.2
-
9
-
-
84871166107
-
-
Web hosting unleashed
-
Cloud computing comparison guide. Web hosting unleashed. http://www.webhostingunleashed.com/whitepaper/cloud-computing-comparison/
-
Cloud Computing Comparison Guide
-
-
-
10
-
-
84886727566
-
-
Focus research
-
Comparison guide: Cloud computing. Focus research. http://www.focus.com/ research/comparison-guide-cloud-computing/
-
Comparison Guide: Cloud Computing
-
-
-
11
-
-
84886726217
-
-
Compliance home. Website
-
Compliance home. Website (2011) http://www.compliancehome.com/
-
(2011)
-
-
-
14
-
-
77951857765
-
Why cloud computing will never be free
-
10.1145/1735223.1735242
-
Durkee D (2010) Why cloud computing will never be free. Commun ACM 53(5):62-69
-
(2010)
Commun ACM
, vol.53
, Issue.5
, pp. 62-69
-
-
Durkee, D.1
-
15
-
-
78649863750
-
Permission management system: Permission as a service in cloud computing
-
Echeverría V, Liebrock LM, Shin D (2010) Permission management system: permission as a service in cloud computing. In: COMPSAC workshops, pp 371-375
-
(2010)
COMPSAC Workshops
, pp. 371-375
-
-
Echeverría, V.1
Liebrock, L.M.2
Shin, D.3
-
24
-
-
74349113474
-
On technical security issues in cloud computing
-
CLOUD-II 2009
-
Jensen M, Schwenk JO, Gruschka N, Iacono LL (2009) On technical security issues in cloud computing. In: IEEE international conference on cloud computing, CLOUD-II 2009, pp 109-116
-
(2009)
IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.O.2
Gruschka, N.3
Iacono, L.L.4
-
25
-
-
84856142134
-
Monitoring insiders activities in cloud computing using rule based learning
-
TRUSTCOM'11
-
Khorshed MT, Ali ABMS, Wasimi SA (2011) Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of the 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, TRUSTCOM'11, pp 757-764
-
(2011)
Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 757-764
-
-
Khorshed, M.T.1
Ali, A.2
Wasimi, S.A.3
-
28
-
-
33744460532
-
Integrating grid with intrusion detection
-
AINA'05 1
-
Leu FY, Lin JC, Li MC, Yang CT, Shih PC (2005) Integrating grid with intrusion detection. In: Proceedings of the 19th international conference on advanced information networking and applications, AINA'05, vol 1, pp 304-309
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications
, pp. 304-309
-
-
Leu, F.Y.1
Lin, J.C.2
Li, M.C.3
Yang, C.T.4
Shih, P.C.5
-
36
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
10.1016/j.jnca.2012.05.003
-
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2012) A survey of intrusion detection techniques in cloud. J Netw Comput Appl. doi: 10.1016/j.jnca.2012.05.003
-
(2012)
J Netw Comput Appl
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
37
-
-
70350510101
-
Transparent security for cloud system for search, access restriction, and agents in the clouds
-
10.1109/SAINT.2009.45
-
Morizumi T, Suzuki K, Kinoshita H (2009) Transparent security for cloud system for search, access restriction, and agents in the clouds. In: Proceedings of the 2009 ninth annual international symposium on applications and the Internet, pp 201-204
-
(2009)
Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
, pp. 201-204
-
-
Morizumi, T.1
Suzuki, K.2
Kinoshita, H.3
-
39
-
-
80053009214
-
Enhancing data privacy and integrity in the cloud
-
Naruchitparames J, Günes MH (2011) Enhancing data privacy and integrity in the cloud. In: HPCS, pp 427-434
-
(2011)
HPCS
, pp. 427-434
-
-
Naruchitparames, J.1
Günes, M.H.2
-
40
-
-
84886729432
-
-
National vulnerability database version 2.2. NIST
-
National vulnerability database version 2.2. NIST. http://web.nvd.nist. gov/view/vuln/search-results?query=virtual&search%-type=all&cves=on
-
-
-
-
42
-
-
84862666499
-
-
Ponemon
-
Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing- providers-final-april-2011.pdf
-
(2011)
Security of Cloud Computing Providers Study
-
-
-
43
-
-
78650536265
-
Protection of identity information in cloud computing without trusted third party
-
SRDS'10 10.1109/SRDS.2010.57
-
Ranchal R, Bhargava B, Othmane LB, Lilien L, Kim A, Kang M, Linderman M (2010) Protection of identity information in cloud computing without trusted third party. In: Proceedings of the 2010 29th IEEE symposium on reliable distributed systems, SRDS'10, pp 368-372
-
(2010)
Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.B.3
Lilien, L.4
Kim, A.5
Kang, M.6
Linderman, M.7
-
46
-
-
55549097262
-
Subverting vistatm kernel for fun and profit
-
Rutkowska J (2006) Subverting vistatm kernel for fun and profit. In: BlackHat conference
-
(2006)
BlackHat Conference
-
-
Rutkowska, J.1
-
49
-
-
84870354202
-
Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks
-
Sandar SV, Shenai S (2012) Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks. Int J Comput Appl 41(20):11-16
-
(2012)
Int J Comput Appl
, vol.41
, Issue.20
, pp. 11-16
-
-
Sandar, S.V.1
Shenai, S.2
-
52
-
-
84886725748
-
-
Security threats. Microsoft
-
Security threats. Microsoft. http://technet.microsoft.com/en-us/library/ cc723507.aspx
-
-
-
-
54
-
-
84886729524
-
-
Software as a service-Wikipedia. Wikipedia
-
Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/ Software-as-a-service
-
-
-
-
55
-
-
80955143542
-
All your clouds are belong to us - Security analysis of cloud management interfaces
-
Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Iacono LL (2011) All your clouds are belong to us - security analysis of cloud management interfaces. In: ACM workshop on Cloud computing security
-
(2011)
ACM Workshop on Cloud Computing Security
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.L.6
-
57
-
-
77955978162
-
Are clouds ready for large distributed applications
-
10.1145/1773912.1773918
-
Sripanidkulchai K, Sahu S, Ruan Y, Shaikh A, Dorai C (2010) Are clouds ready for large distributed applications. SIGOPS Oper Syst Rev 44(2):18-23
-
(2010)
SIGOPS Oper Syst Rev
, vol.44
, Issue.2
, pp. 18-23
-
-
Sripanidkulchai, K.1
Sahu, S.2
Ruan, Y.3
Shaikh, A.4
Dorai, C.5
-
59
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
10.1016/j.jnca.2010.07.006
-
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34:1-11
-
(2011)
J Netw Comput Appl
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
60
-
-
74349107924
-
Dsp reencryption: A flexible mechanism for access control enforcement management in daas
-
Tian X, Wang X, Zhou A (2009) Dsp reencryption: a flexible mechanism for access control enforcement management in daas. In: Proc CLOUD'09, SACMAT'10, pp 25-32
-
(2009)
Proc CLOUD'09, SACMAT'10
, pp. 25-32
-
-
Tian, X.1
Wang, X.2
Zhou, A.3
-
61
-
-
84886726557
-
-
Top 7 threats to cloud computing. HELP NET SECURITY
-
Top 7 threats to cloud computing. HELP NET SECURITY. http://www.net- security.org/secworld.php?id=8943
-
-
-
-
63
-
-
84886726705
-
-
Vulnerability in windows server 2008 hyper-v could allow denial of service (977894)
-
Vulnerability in windows server 2008 hyper-v could allow denial of service (977894). Microsoft security bulletin MS10-010 - Important (2010) http://www.microsoft.com/technet/security/bulletin/ms11-047.mspx
-
(2010)
Microsoft Security Bulletin MS10-010 - Important
-
-
-
65
-
-
70449569012
-
Low: Ensuring data storage security in cloud computing
-
Wang Q, Wang K, Ren W (2009) Low: ensuring data storage security in cloud computing. In: Proc of IWQoS 2009
-
(2009)
Proc of IWQoS 2009
-
-
Wang, Q.1
Wang, K.2
Ren, W.3
-
67
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
Wang B, Li B, Li H (2012) Oruta: Privacy-preserving public auditing for shared data in the cloud. In: IEEE CLOUD
-
(2012)
IEEE CLOUD
-
-
Wang, B.1
Li, B.2
Li, H.3
-
68
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
CCSW'09 10.1145/1655008.1655021
-
Wei J, Zhang X, Ammons G, Bala V, Ning P (2009) Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM workshop on cloud computing security, CCSW'09, pp 91-96
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
69
-
-
84877950132
-
-
InfoWorld
-
What cloud computing really means. InfoWorld. http://www.infoworld.com/d/ cloud-computing/what-cloud-computing-really-means-031?page=0,0
-
What Cloud Computing Really Means
-
-
-
70
-
-
84886721286
-
-
Xarp 2.2.2. filecluster
-
Xarp 2.2.2. filecluster. http://www.filecluster.com/Network-Tools/ Network-Monitoring/Download-XArp.html
-
-
-
-
71
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
CloudCom'09
-
Yan L, Rong C, Zhao G (2009) Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Proceedings of the 1st international conference on cloud computing, CloudCom'09, pp 167-177
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
|