-
2
-
-
71749114896
-
Cloud Computing: A Statistics Aspect of Users
-
Springer Berlin, Heidelberg
-
Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. In: First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp 347-358
-
First International Conference On Cloud Computing (CloudCom), Beijing, China
, pp. 347-358
-
-
Zhao, G.1
Liu, J.2
Tang, Y.3
Sun, W.4
Zhang, F.5
Ye, X.6
Tang, N.7
-
3
-
-
77952181552
-
Cloud Computing Research and Development Trend
-
Washington, DC, USA
-
Zhang S, Zhang S, Chen X, Huo X (2010) Cloud Computing Research and Development Trend. In: Second International Conference on Future Networks (ICFN'10), Sanya, Hainan, China. IEEE Computer Society, Washington, DC, USA, pp 93-97
-
(2010)
Second International Conference On Future Networks (ICFN'10), Sanya, Hainan, China. IEEE Computer Society
, pp. 93-97
-
-
Zhang, S.1
Zhang, S.2
Chen, X.3
Huo, X.4
-
6
-
-
78249290665
-
-
Centre for the Protection of National Infrastructure, Available
-
Centre for the Protection of National Infrastructure (2010) Information Security Briefing 01/2010 Cloud Computing. Available: http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
-
(2010)
Information Security Briefing 01/2010 Cloud Computing
-
-
-
9
-
-
84881477485
-
Security analysis in the migration to cloud environments
-
Rosado DG, Gómez R, Mellado D, Fernández-Medina E (2012) Security analysis in the migration to cloud environments. Future Internet 4(2):469-487
-
(2012)
Future Internet
, vol.4
, Issue.2
, pp. 469-487
-
-
Rosado, D.G.1
Gómez, R.2
Mellado, D.3
Fernández-Medina, E.4
-
10
-
-
77949842100
-
-
O'Reilly Media, Inc., Sebastopol, CA
-
Mather T, Kumaraswamy S, Latif S (2009) Cloud Security and Privacy. O'Reilly Media, Inc., Sebastopol, CA
-
(2009)
Cloud Security and Privacy
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
11
-
-
71749098580
-
Trust model to enhance Security and interoperability of Cloud environment
-
Springer Berlin Heidelberg, Beijing, China
-
Li W, Ping L (2009) Trust model to enhance Security and interoperability of Cloud environment. In: Proceedings of the 1st International conference on Cloud Computing. Springer Berlin Heidelberg, Beijing, China, pp 69-79
-
(2009)
Proceedings of the 1st International Conference On Cloud Computing
, pp. 69-79
-
-
Li, W.1
Ping, L.2
-
13
-
-
27644567603
-
-
Department of Computer Scinece Keele University, United Kingdom and Empirical Software Engineering, National ICT Australia Ltd, Australia. TR/SE-0401
-
Kitchenham B (2004) Procedures for perfoming systematic review, software engineering group. Department of Computer Scinece Keele University, United Kingdom and Empirical Software Engineering, National ICT Australia Ltd, Australia. TR/SE-0401
-
(2004)
Procedures For Perfoming Systematic Review, Software Engineering Group
-
-
Kitchenham, B.1
-
14
-
-
44649122227
-
-
Version 2.3 University of keele (software engineering group, school of computer science and mathematics) and Durham. Department of Conputer Science, UK
-
Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Version 2.3 University of keele (software engineering group, school of computer science and mathematics) and Durham. Department of Conputer Science, UK
-
(2007)
Guidelines For Performing Systematic Literature Reviews In Software Engineering
-
-
Kitchenham, B.1
Charters, S.2
-
15
-
-
33847286844
-
Lessons from applying the systematic literature review process within the software engineering domain
-
Brereton P, Kitchenham BA, Budgen D, Turner M, Khalil M (2007) Lessons from applying the systematic literature review process within the software engineering domain. J Syst Softw 80(4):571-583
-
(2007)
J Syst Softw
, vol.80
, Issue.4
, pp. 571-583
-
-
Brereton, P.1
Kitchenham, B.A.2
Budgen, D.3
Turner, M.4
Khalil, M.5
-
16
-
-
79952065844
-
-
Cloud Security Alliance, Available
-
Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0. Available: https://cloudsecurityalliance.org/research/top-threats
-
(2010)
Top Threats to Cloud Computing V1.0
-
-
-
18
-
-
84859433005
-
A survey of risks, threats and vulnerabilities in Cloud Computing
-
Amman, Jordan
-
Dahbur K, Mohammad B, Tarakji AB (2011) A survey of risks, threats and vulnerabilities in Cloud Computing. In: Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. Amman, Jordan, pp 1-6
-
(2011)
Proceedings of the 2011 International Conference On Intelligent Semantic Web-services and Applications
, pp. 1-6
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
19
-
-
84897472436
-
Security challenges in Cloud Computing
-
CSREA Press, Las Vegas, US
-
Ertaul L, Singhal S, Gökay S (2010) Security challenges in Cloud Computing. In: Proceedings of the 2010 International conference on Security and Management SAM'10. CSREA Press, Las Vegas, US, pp 36-42
-
(2010)
Proceedings of the 2010 International Conference On Security and Management SAM'10
, pp. 36-42
-
-
Ertaul, L.1
Singhal, S.2
Gökay, S.3
-
21
-
-
78649322624
-
A survey on Security issues in service delivery models of Cloud Computing
-
Subashini S, Kavitha V (2011) A survey on Security issues in service delivery models of Cloud Computing. J Netw Comput Appl 34(1):1-11
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
22
-
-
74349113474
-
On technical Security issues in Cloud Computing
-
Jensen M, Schwenk J, Gruschka N, Iacono LL (2009) On technical Security issues in Cloud Computing. In: IEEE International conference on Cloud Computing (CLOUD'09). 116, 116, pp 109-116
-
(2009)
IEEE International Conference On Cloud Computing (CLOUD'09)
, vol.116
, Issue.116
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
23
-
-
84870184014
-
Security issues to Cloud Computing
-
In: Antonopoulos N, Gillam L (ed), 2010, Springer-Verlag
-
Onwubiko C (2010) Security issues to Cloud Computing. In: Antonopoulos N, Gillam L (ed) Cloud Computing: principles, systems & applications. 2010, Springer-Verlag
-
(2010)
Cloud Computing: Principles, Systems & Applications
-
-
Onwubiko, C.1
-
24
-
-
84937420058
-
An analysis of the Cloud Computing Security problem
-
Cloud Workshop. APSEC, Sydney, Australia
-
Morsy MA, Grundy J, Müller I (2010) An analysis of the Cloud Computing Security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia
-
(2010)
Proceedings of APSEC
, pp. 2010
-
-
Morsy, M.A.1
Grundy, J.2
Müller, I.3
-
25
-
-
79952952264
-
Cloud Hooks: Security and Privacy Issues in Cloud Computing
-
Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA
-
Jansen WA (2011) Cloud Hooks: Security and Privacy Issues in Cloud Computing. In: Proceedings of the 44th Hawaii International Conference on System Sciences, Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA, pp 1-10
-
(2011)
Proceedings of the 44th Hawaii International Conference On System Sciences
, pp. 1-10
-
-
Jansen, W.A.1
-
26
-
-
79959557055
-
Addressing Cloud Computing Security issues
-
Zissis D, Lekkas D (2012) Addressing Cloud Computing Security issues. Futur Gener Comput Syst 28(3):583-592
-
(2012)
Futur Gener Comput Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
30
-
-
77958499656
-
Research on Key Technology in SaaS
-
Washington, DC, USA
-
Ju J, Wang Y, Fu J, Wu J, Lin Z (2010) Research on Key Technology in SaaS. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China. IEEE Computer Society, Washington, DC, USA, pp 384-387
-
(2010)
International Conference On Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China. IEEE Computer Society
, pp. 384-387
-
-
Ju, J.1
Wang, Y.2
Fu, J.3
Wu, J.4
Lin, Z.5
-
31
-
-
77953221164
-
Securing elasticity in the Cloud
-
Owens D (2010) Securing elasticity in the Cloud. Commun ACM 53(6):46-51
-
(2010)
Commun ACM
, vol.53
, Issue.6
, pp. 46-51
-
-
Owens, D.1
-
33
-
-
77949587716
-
Towards high level SaaS maturity model: Methods and case study
-
APSCC, IEEE Asia-Pacific
-
Zhang Y, Liu S, Meng X (2009) Towards high level SaaS maturity model: methods and case study. In: Services Computing conference. APSCC, IEEE Asia-Pacific, pp 273-278
-
(2009)
Services Computing Conference
, pp. 273-278
-
-
Zhang, Y.1
Liu, S.2
Meng, X.3
-
35
-
-
78649986128
-
Multi-tenant SaaS applications: Maintenance dream or nightmare?
-
ACM New York, NY, USA
-
Bezemer C-P, Zaidman A (2010) Multi-tenant SaaS applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), Antwerp, Belgium. ACM New York, NY, USA, pp 88-92
-
(2010)
Proceedings of the Joint ERCIM Workshop On Software Evolution (EVOL) and International Workshop On Principles of Software Evolution (IWPSE), Antwerp, Belgium
, pp. 88-92
-
-
Bezemer, C.-P.1
Zaidman, A.2
-
36
-
-
69349098776
-
Cloud Computing and the common Man
-
Viega J (2009) Cloud Computing and the common Man. Computer 42 (8):106-108
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 106-108
-
-
Viega, J.1
-
37
-
-
84897395854
-
-
Cloud Security Alliance, Available
-
Cloud Security Alliance (2012) Security guidance for critical areas of Mobile Computing. Available: https://downloads.cloudsecurityalliance.org/initiatives/mobile/Mobile_Guidance_v1.pdf
-
(2012)
Security Guidance For Critical Areas of Mobile Computing
-
-
-
38
-
-
84897456946
-
-
Online. Available, Accessed: 16-Jul-2011
-
Keene C (2009) The Keene View on Cloud Computing. Online. Available: http://www.keeneview.com/2009/03/what-is-platform-as-service-paas.html. Accessed: 16-Jul-2011
-
(2009)
The Keene View On Cloud Computing
-
-
Keene, C.1
-
39
-
-
73849090966
-
Mobile Mashup: Architecture, Challenges and Suggestions
-
Washington, DC, USA
-
Xu K, Zhang X, Song M, Song J (2009) Mobile Mashup: Architecture, Challenges and Suggestions. In: International Conference on Management and Service Science. MASS'09. IEEE Computer Society, Washington, DC, USA, pp 1-4
-
(2009)
International Conference On Management and Service Science. MASS'09. IEEE Computer Society
, pp. 1-4
-
-
Xu, K.1
Zhang, X.2
Song, M.3
Song, J.4
-
40
-
-
80054985773
-
State of Security readiness
-
Chandramouli R, Mell P (2010) State of Security readiness. Crossroads 16 (3):23-25
-
(2010)
Crossroads
, vol.16
, Issue.3
, pp. 23-25
-
-
Chandramouli, R.1
Mell, P.2
-
41
-
-
77249130262
-
Outlook: Cloudy with a chance of Security challenges and improvements
-
Jaeger T, Schiffman J (2010) Outlook: cloudy with a chance of Security challenges and improvements. IEEE Security Privacy 8(1):77-80
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
42
-
-
77953172125
-
Infrastructure as a service security: Challenges and solutions
-
Washington, DC, USA
-
Dawoud W, Takouna I, Meinel C (2010) Infrastructure as a service security: Challenges and solutions. In: the 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany. IEEE Computer Society, Washington, DC, USA, pp 1-8
-
The 7th International Conference On Informatics and Systems (INFOS), Potsdam, Germany. IEEE Computer Society
, pp. 1-8
-
-
Dawoud, W.1
Takouna, I.2
Meinel, C.3
-
43
-
-
78751697134
-
Security in multi-tenancy cloud
-
Washington, DC, USA
-
Jasti A, Shah P, Nagaraj R, Pendse R (2010) Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA. IEEE Computer Society, Washington, DC, USA, pp 35-41
-
(2010)
IEEE International Carnahan Conference On Security Technology (ICCST), KS, USA. IEEE Computer Society
, pp. 35-41
-
-
Jasti, A.1
Shah, P.2
Nagaraj, R.3
Pendse, R.4
-
44
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
USENIX Association Berkeley, CA, USA
-
Garfinkel T, Rosenblum M (2005) When virtual is harder than real: Security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM. volume 10. USENIX Association Berkeley, CA, USA, pp 227-229
-
(2005)
Proceedings of the 10th Conference On Hot Topics In Operating Systems, Santa Fe, NM
, vol.10
, pp. 227-229
-
-
Garfinkel, T.1
Rosenblum, M.2
-
45
-
-
78249258944
-
-
Seminar on Network Security, Technical report, Helsinki University of Technology, October 2007
-
Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security. http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007
-
(2007)
A Survey On Virtual Machine Security
-
-
Reuben, J.S.1
-
46
-
-
84894224926
-
Three misuse patterns for Cloud Computing
-
In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M, Pennsylvania, United States
-
Hashizume K, Yoshioka N, Fernandez EB (2013) Three misuse patterns for Cloud Computing. In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M (ed) Security engineering for Cloud Computing: approaches and Tools. IGI Global, Pennsylvania, United States, pp 36-53
-
(2013)
Security Engineering For Cloud Computing: Approaches and Tools. IGI Global
, pp. 36-53
-
-
Hashizume, K.1
Yoshioka, N.2
Fernandez, E.B.3
-
47
-
-
84944043395
-
-
Technical report, Dept. of Computer Science, University of California, Santa Barbara
-
Venkatesha S, Sadhu S, Kintali S (2009) Survey of virtual machine migration techniques., Technical report, Dept. of Computer Science, University of California, Santa Barbara. http://www.academia.edu/760613/Survey_of_Virtual_Machine_Migration_Techniques
-
(2009)
Survey of Virtual Machine Migration Techniques
-
-
Venkatesha, S.1
Sadhu, S.2
Kintali, S.3
-
49
-
-
74049145625
-
Managing Security of virtual machine images in a Cloud environment
-
ACM New York, NY, USA
-
Wei J, Zhang X, Ammons G, Bala V, Ning P (2009) Managing Security of virtual machine images in a Cloud environment. In: Proceedings of the 2009 ACM workshop on Cloud Computing Security. ACM New York, NY, USA, pp 91-96
-
(2009)
Proceedings of the 2009 ACM Workshop On Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
50
-
-
79960882999
-
Securing virtual compute infrastructure in the Cloud
-
Available
-
Owens K., Securing virtual compute infrastructure in the Cloud. SAVVIS. Available: http://www.savvis.com/en-us/info_center/documents/hos-whitepaper-securingvirutalcomputeinfrastructureinthecloud.pdf
-
SAVVIS
-
-
Owens, K.1
-
51
-
-
79952671882
-
Network Security for virtual machine in Cloud Computing
-
Washington, DC, USA
-
Wu H, Ding Y, Winer C, Yao L (2010) Network Security for virtual machine in Cloud Computing. In: 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18-21
-
(2010)
5th International Conference On Computer Sciences and Convergence Information Technology (ICCIT). IEEE Computer Society
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
52
-
-
79952770215
-
VNSS: A Network Security sandbox for virtual Computing environment
-
Washington DC, USA
-
Xiaopeng G, Sumei W, Xianqin C (2010) VNSS: a Network Security sandbox for virtual Computing environment. In: IEEE youth conference on information Computing and telecommunications (YC-ICT). IEEE Computer Society, Washington DC, USA, pp 395-398
-
(2010)
IEEE Youth Conference On Information Computing and Telecommunications (YC-ICT). IEEE Computer Society
, pp. 395-398
-
-
Xiaopeng, G.1
Sumei, W.2
Xianqin, C.3
-
56
-
-
79952498688
-
Managing a security program in a cloud computing environment
-
ACM New York, NY, USA
-
Townsend M (2009) Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, Kennesaw, Georgia. ACM New York, NY, USA, pp 128-133
-
(2009)
Information Security Curriculum Development Conference, Kennesaw, Georgia
, pp. 128-133
-
-
Townsend, M.1
-
58
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM New York, NY, USA
-
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA. ACM New York, NY, USA, pp 199-212
-
(2009)
Proceedings of the 16th ACM Conference On Computer and Communications Security, Chicago, Illinois, USA
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
59
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
New York, NY, USA. ACM New York, NY, USA
-
Zhang Y, Juels A, Reiter MK, Ristenpart T (2012) Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security, New York, NY, USA. ACM New York, NY, USA, pp 305-316
-
(2012)
Proceedings of the 2012 ACM Conference On Computer and Communications Security
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
60
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Washington, DC, USA
-
Wang Z, Jiang X (2010) HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE symposium on Security and privacy. IEEE Computer Society, Washington, DC, USA, pp 380-395
-
(2010)
Proceedings of the IEEE Symposium On Security and Privacy. IEEE Computer Society
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
61
-
-
70449569012
-
Ensuring data Storage Security in Cloud Computing
-
Washington, DC, USA
-
Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data Storage Security in Cloud Computing. In: The 17th International workshop on quality of service. IEEE Computer Society, Washington, DC, USA, pp 1-9
-
(2009)
The 17th International Workshop On Quality of Service. IEEE Computer Society
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
62
-
-
70349706065
-
Modeling Misuse Patterns
-
Washington, DC, USA
-
Fernandez EB, Yoshioka N, Washizaki H (2009) Modeling Misuse Patterns. In: Proceedings of the 4th Int. Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in conjunction with the 4th Int.Conf. on Availability, Reliability, and Security (ARES 2009), Fukuoka, Japan. IEEE Computer Society, Washington, DC, USA, pp 566-571
-
(2009)
Proceedings of the 4th Int. Workshop On Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), In Conjunction With the 4th Int.Conf. On Availability, Reliability, and Security (ARES 2009), Fukuoka, Japan. IEEE Computer Society
, pp. 566-571
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
63
-
-
84929445167
-
Towards Trusted Cloud Computing
-
USENIX Association Berkeley, CA, USA
-
Santos N, Gummadi KP, Rodrigues R (2009) Towards Trusted Cloud Computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing, San Diego, California. USENIX Association Berkeley, CA, USA
-
(2009)
Proceedings of the 2009 Conference On Hot Topics In Cloud Computing, San Diego, California
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
64
-
-
58049137106
-
PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection
-
Washington, DC, USA
-
Zhang F, Huang Y, Wang H, Chen H, Zang B (2008) PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection. In: Trusted Infrastructure Technologies Conference, 2008. APTC'08, Third Asia-Pacific. IEEE Computer Society, Washington, DC, USA, pp 9-18
-
(2008)
Trusted Infrastructure Technologies Conference, 2008. APTC'08, Third Asia-Pacific. IEEE Computer Society
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
66
-
-
77955209580
-
Mobility Can help: Protect user identity with dynamic credential
-
Washington, DC, USA
-
Xiao S, Gong W (2010) Mobility Can help: protect user identity with dynamic credential. In: Eleventh International conference on Mobile data Management (MDM). IEEE Computer Society, Washington, DC, USA, pp 378-380
-
(2010)
Eleventh International Conference On Mobile Data Management (MDM). IEEE Computer Society
, pp. 378-380
-
-
Xiao, S.1
Gong, W.2
-
67
-
-
0142066947
-
-
CMU-CS-01-120, Pittsburgh, PA
-
Wylie J, Bakkaloglu M, Pandurangan V, Bigrigg M, Oguz S, Tew K, Williams C, Ganger G, Khosla P (2001) Selecting the right data distribution scheme for a survivable Storage system. CMU-CS-01-120, Pittsburgh, PA
-
(2001)
Selecting the Right Data Distribution Scheme For a Survivable Storage System
-
-
Wylie, J.1
Bakkaloglu, M.2
Pandurangan, V.3
Bigrigg, M.4
Oguz, S.5
Tew, K.6
Williams, C.7
Ganger, G.8
Khosla, P.9
-
68
-
-
79551536239
-
Implementing digital signature with RSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing
-
DC, USA
-
Somani U, Lakhani K, Mundra M (2010) Implementing digital signature with RSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing. In: 1st International conference on parallel distributed and grid Computing (PDGC). IEEE Computer Society Washington, DC, USA, pp 211-216
-
(2010)
1st International Conference On Parallel Distributed and Grid Computing (PDGC). IEEE Computer Society Washington
, pp. 211-216
-
-
Somani, U.1
Lakhani, K.2
Mundra, M.3
-
69
-
-
78650053109
-
Side channels in Cloud services: Deduplication in Cloud Storage
-
Harnik D, Pinkas B, Shulman-Peleg A (2010) Side channels in Cloud services: deduplication in Cloud Storage. IEEE Security Privacy 8(6):40-47
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
70
-
-
84866655094
-
Homomorphic encryption method applied to Cloud Computing
-
Washington, DC, USA
-
Tebaa M, El Hajji S, El Ghazi A (2012) Homomorphic encryption method applied to Cloud Computing. In: National Days of Network Security and Systems (JNS2). IEEE Computer Society, Washington, DC, USA, pp 86-89
-
(2012)
National Days of Network Security and Systems (JNS2). IEEE Computer Society
, pp. 86-89
-
-
Tebaa, M.1
El Hajji, S.2
El Ghazi, A.3
-
72
-
-
78651061305
-
-
The Register, 08-Jun-2009. [Online]. Available, Accessed: 02-Aug-2011
-
Goodin D (2009) Webhost hack wipes out data for 100,000 sites. The Register, 08-Jun-2009. [Online]. Available: http://www.theregister.co.uk/2009/06/08/webhost_attack/. Accessed: 02-Aug-2011
-
(2009)
Webhost Hack Wipes Out Data For 100,000 Sites
-
-
Goodin, D.1
-
73
-
-
54049153566
-
TVDc: Managing Security in the trusted virtual datacenter
-
Berger S, Cáceres R, Pendarakis D, Sailer R, Valdez E, Perez R, Schildhauer W, Srinivasan D (2008) TVDc: managing Security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev. 42(1):40-47
-
(2008)
SIGOPS Oper Syst. Rev
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
74
-
-
77954983075
-
Security for the Cloud infrastructure: Trusted virtual data center implementation
-
Berger S, Cáceres R, Goldman K, Pendarakis D, Perez R, Rao JR, Rom E, Sailer R, Schildhauer W, Srinivasan D, Tal S, Valdez E (2009) Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J Res Dev 53 (4):560-571
-
(2009)
IBM J Res Dev
, vol.53
, Issue.4
, pp. 560-571
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.3
Pendarakis, D.4
Perez, R.5
Rao, J.R.6
Rom, E.7
Sailer, R.8
Schildhauer, W.9
Srinivasan, D.10
Tal, S.11
Valdez, E.12
-
75
-
-
77955866244
-
An empirical study into the Security exposure to hosts of hostile virtualized environments
-
Vancouver
-
Ormandy T (2007) An empirical study into the Security exposure to hosts of hostile virtualized environments. In: CanSecWest applied Security conference., Vancouver. http://taviso.decsystem.org/virtsec.pdf
-
(2007)
CanSecWest Applied Security Conference
-
-
Ormandy, T.1
-
77
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM New York, NY, USA
-
Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud Computing Security workshop. ACM New York, NY, USA, pp 113-124
-
(2011)
Proceedings of the 3rd ACM Workshop On Cloud Computing Security Workshop
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
78
-
-
78649567184
-
An improved trusted cloud computing platform model based on DAA and privacy CA scheme
-
IEEE Computer, Society, Washington, DC, USA
-
Han-zhang W, Liu-sheng H (2010) An improved trusted cloud computing platform model based on DAA and privacy CA scheme. In: International Conference on Computer Application and System Modeling (ICCASM), vol. 13, V13-39. IEEE Computer, Society, Washington, DC, USA, pp V13-33
-
(2010)
International Conference On Computer Application and System Modeling (ICCASM)
, vol.13
, pp. 13-39
-
-
Han-Zhang, W.1
Liu-sheng, H.2
-
79
-
-
84897433476
-
A survey of patterns for Web services Security and reliability standards
-
Fernandez EB, Ajaj O, Buckley I, Delessy-Gassant N, Hashizume K, Larrondo-Petrie MM (2012) A survey of patterns for Web services Security and reliability standards. Future Internet 4(2):430-450
-
(2012)
Future Internet
, vol.4
, Issue.2
, pp. 430-450
-
-
Fernandez, E.B.1
Ajaj, O.2
Buckley, I.3
Delessy-Gassant, N.4
Hashizume, K.5
Larrondo-Petrie, M.M.6
|