-
1
-
-
84897073739
-
-
57un Blog: A BIG Password Cracking Wordlist, Accessed May 2013
-
57un Blog: A BIG Password Cracking Wordlist. https://57un. wordpress. com/2013/03/09/a-big-password-cracking-wordlist/. Accessed May 2013 (2013).
-
(2013)
-
-
-
2
-
-
84897070785
-
-
Berlin: Springer
-
Aguiar, E., Zhang, Y., Blanton, M.: An Overview of Issues and Recent Developments in Cloud Computing and Storage Security, pp. 1-31. Springer, Berlin (2013).
-
(2013)
An Overview of Issues and Recent Developments in Cloud Computing and Storage Security
, pp. 1-31
-
-
Aguiar, E.1
Zhang, Y.2
Blanton, M.3
-
3
-
-
84880085599
-
A survey of the state of cloud security
-
doi:10.5539/nct.v1n2p66
-
Ahuja, S. P., Komathukattil, D.: A survey of the state of cloud security. Netw. Commun. Technol. 1(2), 66-75 (2012). doi: 10. 5539/nct. v1n2p66.
-
(2012)
Netw. Commun. Technol.
, vol.1
, Issue.2
, pp. 66-75
-
-
Ahuja, S.P.1
Komathukattil, D.2
-
4
-
-
84867270431
-
Latencies of service invocation and processing of the REST and SOAP web service interfaces
-
Honolulu, HI, USA (2012). doi: 10. 1109/SERVICES. 2012. 55
-
Aihkisalo, T., Paaso, T.: Latencies of service invocation and processing of the REST and SOAP web service interfaces. In: IEEE 8th World Congress on Services (SERVICES), pp. 100-107. Honolulu, HI, USA (2012). doi: 10. 1109/SERVICES. 2012. 55.
-
IEEE 8th World Congress on Services (SERVICES)
, pp. 100-107
-
-
Aihkisalo, T.1
Paaso, T.2
-
5
-
-
84861498357
-
Investigation of IT security and compliance challenges in security-as-a-service for cloud computing
-
Shenzhen, Guangdong, China, doi: 10. 1109/ISORCW. 2012. 31
-
Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y.: Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. In: 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), pp. 124-129. Shenzhen, Guangdong, China (2012). doi: 10. 1109/ISORCW. 2012. 31.
-
(2012)
15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW)
, pp. 124-129
-
-
Al-Aqrabi, H.1
Liu, L.2
Xu, J.3
Hill, R.4
Antonopoulos, N.5
Zhan, Y.6
-
6
-
-
84897101048
-
-
Alert Logic: State of Cloud Security Report: Targeted Attacks and Opportunistic Hacks, Accessed Apr. 2013
-
Alert Logic: State of Cloud Security Report: Targeted Attacks and Opportunistic Hacks. http://www. alertlogic. com/resources/security-intelligence-newsletter/download-cloud-security-report-spring2013/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
7
-
-
84888097037
-
-
Accessed Apr. 2013
-
AlFardan, N., Bernstein, D., Paterson, K., Poettering, B., Schuldt, J.: On the Security of RC4 in TLS. http://www. isg. rhul. ac. uk/tls/index. html (2013). Accessed Apr. 2013.
-
(2013)
On the Security of RC4 in TLS
-
-
AlFardan, N.1
Bernstein, D.2
Paterson, K.3
Poettering, B.4
Schuldt, J.5
-
8
-
-
84897032433
-
-
AlienVault: OSSIM Website, Accessed May 2013
-
AlienVault: OSSIM Website. https://aws. amazon. com/marketplace/pp/B00BIUQRGC/ (2013). Accessed May 2013.
-
(2013)
-
-
-
9
-
-
84897037560
-
-
Amazon: Amazon Web Services: Overview of Security Processes, White Paper. Accessed Sept. 2012
-
Amazon: Amazon Web Services: Overview of Security Processes. http://s3. amazonaws. com/aws_blog/AWS_Security_Whitepaper_2008_09. pdf (2011). White Paper. Accessed Sept. 2012.
-
(2011)
-
-
-
10
-
-
84897085551
-
-
Amazon: Amazon Elastic Compute Cloud (Amazon EC2), Accessed Apr. 2013
-
Amazon: Amazon Elastic Compute Cloud (Amazon EC2). https://aws. amazon. com/ec2/ (2012). Accessed Apr. 2013.
-
(2012)
-
-
-
11
-
-
84897079711
-
-
Amazon: Amazon Virtual Private Cloud (Amazon VPC), Accessed Sept. 2012
-
Amazon: Amazon Virtual Private Cloud (Amazon VPC). http://aws. amazon. com/vpc/ (2012). Accessed Sept. 2012.
-
(2012)
-
-
-
12
-
-
84897039190
-
-
Amazon Web Services Discussion Forums: Low Entropy on EC2 Instances- Problem for Anything Related to Security,. Accessed Apr. 2013
-
Amazon Web Services Discussion Forums: Low Entropy on EC2 Instances- Problem for Anything Related to Security. https://forums. aws. amazon. com/thread. jspa?messageID=249079 (2011). Accessed Apr. 2013.
-
(2011)
-
-
-
13
-
-
84873358477
-
From the enterprise perimeter to a mobility-enabled secure cloud
-
doi:10.1109/MSP.2013.8
-
Amoroso, E.: From the enterprise perimeter to a mobility-enabled secure cloud. IEEE Secur. Priv. 11(1), 23-31 (2013). doi: 10. 1109/MSP. 2013. 8.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 23-31
-
-
Amoroso, E.1
-
14
-
-
84897075466
-
-
Accessed Apr. 2013
-
Anstee, D.: Q1 Key Findings from ATLAS. http://www. arbornetworks. com/corporate/blog/4855-q1-key-findings-from-atlas (2013). Accessed Apr. 2013.
-
(2013)
Q1 Key Findings from ATLAS
-
-
Anstee, D.1
-
15
-
-
84897030126
-
-
Apache: CloudStack Website, Accessed May 2013
-
Apache: CloudStack Website. https://cloudstack. apache. org/ (2013). Accessed May 2013.
-
(2013)
-
-
-
16
-
-
84897064785
-
-
Apprenda: Apprenda Website, Accessed Apr. 2013
-
Apprenda: Apprenda Website. http://apprenda. com (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
17
-
-
77950347409
-
A view of cloud computing
-
doi:10.1145/1721654.1721672
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50-58 (2010). doi: 10. 1145/1721654. 1721672.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
18
-
-
68249129760
-
Above the Clouds: A Berkeley View of Cloud Computing
-
Electrical Engineering and Computer Sciences University of California
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28. Electrical Engineering and Computer Sciences University of California (2009).
-
(2009)
Technical Report UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Zaharia, M.10
-
19
-
-
70249129465
-
Scalable and efficient provable data possession
-
10. ACM, New York, NY, USA
-
Ateniese, G., Di Pietro, R., Mancini, L. V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 9: 1-9: 10. ACM, New York, NY, USA (2008).
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks
, vol.9
, pp. 1-9
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
20
-
-
78650158728
-
Determinating timing channels in compute clouds
-
Security, doi: 10. 1145/1866835. 1866854
-
Aviram, A., Hu, S., Ford, B., Gummadi, R.: Determinating timing channels in compute clouds. In: Proceedings of the ACM Workshop on Cloud computing, Security, pp. 103-108 (2010). doi: 10. 1145/1866835. 1866854.
-
(2010)
Proceedings of the ACM Workshop on Cloud computing
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
21
-
-
84866674580
-
Virtual machine monitor-based lightweight intrusion detection
-
doi:10.1145/2007183.2007189
-
Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., Kaeli, D.: Virtual machine monitor-based lightweight intrusion detection. SIGOPS Oper. Syst. Rev. 45(2), 38-53 (2011). doi: 10. 1145/2007183. 2007189.
-
(2011)
SIGOPS Oper. Syst. Rev.
, vol.45
, Issue.2
, pp. 38-53
-
-
Azmandian, F.1
Moffie, M.2
Alshawabkeh, M.3
Dy, J.4
Aslam, J.5
Kaeli, D.6
-
22
-
-
33745413400
-
The KaffeOS Java runtime system
-
doi:10.1145/1075382.1075383
-
Back, G., Hsieh, W. C.: The KaffeOS Java runtime system. ACM Trans. Program. Lang. Syst. 27(4), 583-630 (2005). doi: 10. 1145/1075382. 1075383.
-
(2005)
ACM Trans. Program. Lang. Syst.
, vol.27
, Issue.4
, pp. 583-630
-
-
Back, G.1
Hsieh, W.C.2
-
23
-
-
35348848696
-
Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography
-
ACM, New York, NY, USA, doi: 10. 1145/1242572. 1242598
-
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181-190. ACM, New York, NY, USA (2007). doi: 10. 1145/1242572. 1242598.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
24
-
-
78650574143
-
DKSM: subverting virtual machine introspection for fun and profit
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SRDS. 2010. 39
-
Bahram, S., Jiang, X., Wang, Z., Grace, M., Li, J., Srinivasan, D., Rhee, J., Xu, D.: DKSM: subverting virtual machine introspection for fun and profit. In: 29th IEEE Symposium on Reliable Distributed Systems, pp. 82-91. IEEE Computer Society, Washington, DC, USA (2010). doi: 10. 1109/SRDS. 2010. 39.
-
(2010)
29th IEEE Symposium on Reliable Distributed Systems
, pp. 82-91
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
25
-
-
79952934870
-
Everything as a service: powering the new information economy
-
doi:10.1109/MC.2011.67
-
Banerjee, P., Friedrich, R., Bash, C., Goldsack, P., Huberman, B., Manley, J., Patel, C., Ranganathan, P., Veitch, A.: Everything as a service: powering the new information economy. Computer 44(3), 36-43 (2011). doi: 10. 1109/MC. 2011. 67.
-
(2011)
Computer
, vol.44
, Issue.3
, pp. 36-43
-
-
Banerjee, P.1
Friedrich, R.2
Bash, C.3
Goldsack, P.4
Huberman, B.5
Manley, J.6
Patel, C.7
Ranganathan, P.8
Veitch, A.9
-
26
-
-
78650746425
-
Virtualizing networking and security in the cloud
-
doi:10.1145/1899928.1899939
-
Basak, D., Toshniwal, R., Maskalik, S., Sequeira, A.: Virtualizing networking and security in the cloud. SIGOPS Oper. Syst. Rev. 44(4), 86-94 (2010). doi: 10. 1145/1899928. 1899939.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.44
, Issue.4
, pp. 86-94
-
-
Basak, D.1
Toshniwal, R.2
Maskalik, S.3
Sequeira, A.4
-
28
-
-
84857170570
-
Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation
-
IEEE, doi: 10. 1109/WICT. 2011. 6141247
-
Behl, A.: Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: World Congress on Information and Communication Technologies, pp. 217-222. IEEE (2011). doi: 10. 1109/WICT. 2011. 6141247.
-
(2011)
World Congress on Information and Communication Technologies
, pp. 217-222
-
-
Behl, A.1
-
29
-
-
84867370517
-
Security paradigms for cloud computing
-
Communication Systems and Networks, IEEE, doi: 10. 1109/CICSyN. 2012. 45
-
Behl, A., Behl, K.: Security paradigms for cloud computing. In: 4th International Conference on Computational Intelligence, Communication Systems and Networks, pp. 200-205. IEEE (2012). doi: 10. 1109/CICSyN. 2012. 45.
-
(2012)
4th International Conference on Computational Intelligence
, pp. 200-205
-
-
Behl, A.1
Behl, K.2
-
30
-
-
84864910559
-
SOAP-based vs. RESTful web services: a case study for multimedia
-
doi:10.1109/MIC.2012.62
-
Belqasmi, F., Singh, J., Glitho, R.: SOAP-based vs. RESTful web services: a case study for multimedia. IEEE Internet Comput. 16(4), 54-63 (2012). doi: 10. 1109/MIC. 2012. 62.
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.4
, pp. 54-63
-
-
Belqasmi, F.1
Singh, J.2
Glitho, R.3
-
31
-
-
84866366082
-
Privacy-preserving business process outsourcing
-
IEEE, doi: 10. 1109/ICWS. 2012. 34
-
Bentounsi, M., Benbernou, S., Atallah, M.: Privacy-preserving business process outsourcing. In: IEEE 19th International Conference on Web Services, pp. 662-663. IEEE (2012). doi: 10. 1109/ICWS. 2012. 34.
-
(2012)
IEEE 19th International Conference on Web Services
, pp. 662-663
-
-
Bentounsi, M.1
Benbernou, S.2
Atallah, M.3
-
32
-
-
79952419950
-
Intercloud security considerations
-
IEEE Computer Society, Washington, DC, USA
-
Bernstein, D., Vij, D.: Intercloud security considerations. In: IEEE 2nd International Conference on Cloud Computing Technology and Science, pp. 537-544. IEEE Computer Society, Washington, DC, USA (2010).
-
(2010)
IEEE 2nd International Conference on Cloud Computing Technology and Science
, pp. 537-544
-
-
Bernstein, D.1
Vij, D.2
-
33
-
-
84866673135
-
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks
-
Kuala Lumpur, Malaysia, doi: 10. 1109/CyberSec. 2012. 6246086
-
Bin Mat Nor, F., Jalil, K., Manan, J. L.: An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 271-276. Kuala Lumpur, Malaysia (2012). doi: 10. 1109/CyberSec. 2012. 6246086.
-
(2012)
International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
, pp. 271-276
-
-
Bin Mat Nor, F.1
Jalil, K.2
Manan, J.L.3
-
34
-
-
84876500046
-
Different facets of security in the cloud
-
7, Society for Computer Simulation International, San Diego, CA, USA
-
Boampong, P. A., Wahsheh, L. A.: Different facets of security in the cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium, pp. 5: 1-5: 7. Society for Computer Simulation International, San Diego, CA, USA (2012).
-
(2012)
Proceedings of the 15th Communications and Networking Simulation Symposium
, vol.5
, pp. 1-5
-
-
Boampong, P.A.1
Wahsheh, L.A.2
-
35
-
-
74049144464
-
HAIL: a high-availability and integrity layer for cloud storage
-
ACM, New York, NY, USA, doi: 10. 1145/1653662. 1653686
-
Bowers, K. D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187-198. ACM, New York, NY, USA (2009). doi: 10. 1145/1653662. 1653686.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
36
-
-
84897090994
-
-
Box: Box Website, Accessed Apr. 2013
-
Box: Box Website. https://www. box. com/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
37
-
-
85058721464
-
Shadows in the cloud: Chinese involvement in advanced persistent threats
-
doi:10.1016/S1353-4858(10)70058-1
-
Bradbury, D.: Shadows in the cloud: Chinese involvement in advanced persistent threats. Netw. Secur. 2010(5), 16-19 (2010). doi: 10. 1016/S1353-4858(10)70058-1.
-
(2010)
Netw. Secur.
, vol.2010
, Issue.5
, pp. 16-19
-
-
Bradbury, D.1
-
38
-
-
84897086714
-
Pentagon Creating "Rules of Engagement" for Responding to Advanced Attackers
-
Brito, H.: Pentagon Creating "Rules of Engagement" for Responding to Advanced Attackers. Mandiant M-Unition (2013).
-
(2013)
Mandiant M-Unition
-
-
Brito, H.1
-
39
-
-
80755168339
-
AmazonIA: when elasticity snaps back
-
ACM, New York, NY, USA, doi: 10. 1145/2046707. 2046753
-
Bugiel, S., Nürnberger, S., Pöppelmann, T., Sadeghi, A. R., Schneider, T.: AmazonIA: when elasticity snaps back. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 389-400. ACM, New York, NY, USA (2011). doi: 10. 1145/2046707. 2046753.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 389-400
-
-
Bugiel, S.1
Nürnberger, S.2
Pöppelmann, T.3
Sadeghi, A.R.4
Schneider, T.5
-
40
-
-
84897041890
-
-
Accessed May 2013
-
Carriço, P.: Low entropy on VMs. http://blog. pedrocarrico. net/post/17026199379/low-entropy-on-vms (2012). Accessed May 2013.
-
(2012)
Low entropy on VMs
-
-
Carriço, P.1
-
41
-
-
80052599662
-
Secure virtualization-benefits, risks and controls
-
In: Leymann, F., Ivanov, I., van Sinderen, M., Shishkov, B. (eds.), SciTePress
-
Carroll, M., Kotzé, P., van der Merwe, A. (2011). Secure virtualization-benefits, risks and controls. In: Leymann, F., Ivanov, I., van Sinderen, M., Shishkov, B. (eds.) CLOSER, pp. 15-23. SciTePress.
-
(2011)
CLOSER
, pp. 15-23
-
-
Carroll, M.1
Kotzé, P.2
van der Merwe, A.3
-
42
-
-
84897067732
-
The Dangers of Recycling in the Cloud
-
Casale, A.: The Dangers of Recycling in the Cloud. TheMakegood (2013).
-
(2013)
TheMakegood
-
-
Casale, A.1
-
43
-
-
79960873107
-
Routing-as-a-Service (RaaS): a framework for tenant-directed route control in data center
-
doi: 10. 1109/INFCOM. 2011. 5934924
-
Chen, C. C., Yuan, L., Greenberg, A., Chuah, C. N., Mohapatra, P.: Routing-as-a-Service (RaaS): a framework for tenant-directed route control in data center. In: Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 1386-1394 (2011) doi: 10. 1109/INFCOM. 2011. 5934924.
-
(2011)
Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 1386-1394
-
-
Chen, C.C.1
Yuan, L.2
Greenberg, A.3
Chuah, C.N.4
Mohapatra, P.5
-
44
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
IEEE, doi: 10. 1109/ICCSEE. 2012. 193
-
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647-651. IEEE (2012). doi: 10. 1109/ICCSEE. 2012. 193.
-
(2012)
International Conference on Computer Science and Electronics Engineering
, vol.1
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
45
-
-
80052555990
-
An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing
-
Crete, Greece, doi: 10. 1109/MUE. 2011. 69
-
Chen, T. H., lien Yeh, H., Shih, W. K.: An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 155-159. Crete, Greece (2011). doi: 10. 1109/MUE. 2011. 69.
-
(2011)
5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE)
, pp. 155-159
-
-
Chen, T.H.1
lien Yeh, H.2
Shih, W.K.3
-
46
-
-
53349116756
-
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
-
Anchorage, AK, USA, doi: 10. 1109/DSN. 2008. 4630086
-
Chen, X., Andersen, J., Mao, Z., Bailey, M., Nazario, J.: Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In: IEEE International Conference on Dependable Systems and Networks (DNS) With FCTS and DCC, pp. 177-186. Anchorage, AK, USA (2008). doi: 10. 1109/DSN. 2008. 4630086.
-
(2008)
IEEE International Conference on Dependable Systems and Networks (DNS) With FCTS and DCC
, pp. 177-186
-
-
Chen, X.1
Andersen, J.2
Mao, Z.3
Bailey, M.4
Nazario, J.5
-
47
-
-
77954327465
-
-
Technical Report UCB/EECS-2010-5. EECS Department, University of California, Berkeley
-
Chen, Y., Paxson, V., Katz, R. H.: What's New About Cloud Computing Security? Technical Report UCB/EECS-2010-5. EECS Department, University of California, Berkeley (2010). http://www. eecs. berkeley. edu/Pubs/TechRpts/2010/EECS-2010-5. html.
-
(2010)
What's New About Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
48
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
doi:10.1016/j.jnca.2010.06.004
-
Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appli. 34(4), 1097-1107 (2011). doi: 10. 1016/j. jnca. 2010. 06. 004.
-
(2011)
J. Netw. Comput. Appli.
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
49
-
-
39749159337
-
Software as a service: implications for investment in software development
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/HICSS. 2007. 493
-
Choudhary, V.: Software as a service: implications for investment in software development. In: 40th Annual Hawaii International Conference on System Sciences, p. 209a. IEEE Computer Society, Washington, DC, USA (2007). doi: 10. 1109/HICSS. 2007. 493.
-
(2007)
40th Annual Hawaii International Conference on System Sciences
, pp. 209
-
-
Choudhary, V.1
-
50
-
-
74049093526
-
Controlling data in the cloud: outsourcing computation without outsourcing control
-
ACM, New York, NY, USA, doi: 10. 1145/1655008. 1655020
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 85-90. ACM, New York, NY, USA (2009). doi: 10. 1145/1655008. 1655020.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
51
-
-
74049133176
-
Cloud security is not (just) virtualization security: a short paper
-
ACM, Chicago, IL, USA, doi: 10. 1145/1655008. 1655022
-
Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D., Zamboni, D.: Cloud security is not (just) virtualization security: a short paper. In: Proceedings of the ACM Workshop on Cloud Computing Security (CCSW), pp. 97-102. ACM, Chicago, IL, USA (2009). doi: 10. 1145/1655008. 1655022.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security (CCSW)
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
52
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
doi: 10. 1016/j. diin. 2012. 05. 015. Available online on 23 Jun. 2012
-
Chung, H., Park, J., Lee, S., Kang, C.: Digital forensic investigation of cloud storage services. Digit. Investig. (2012). doi: 10. 1016/j. diin. 2012. 05. 015. Available online on 23 Jun. 2012.
-
(2012)
Digit. Investig.
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
53
-
-
84897053383
-
-
Cisco: Cisco Data Center Infrastructure 2. 5 Design Guide, Accessed Oct. 2012
-
Cisco: Cisco Data Center Infrastructure 2. 5 Design Guide. http://www. cisco. com/univercd/cc/td/doc/solution/dcidg21. pdf (2007). Accessed Oct. 2012.
-
(2007)
-
-
-
54
-
-
84897052151
-
-
Ctxco: Data Center Power and Cooling, White Paper. Accessed Sept. 2012
-
Cisco: Data Center Power and Cooling. http://www. cisco. com/en/US/solutions/collateral/ns340/ns517/ns224/ns944/white_paper_c11-680202. pdf (2011). White Paper. Accessed Sept. 2012.
-
(2011)
-
-
-
55
-
-
84897100514
-
-
Cisco: Cisco Global Cloud Index: Forecast and Methodology, 2011-2016, White Paper. Accessed Apr. 2013
-
Cisco: Cisco Global Cloud Index: Forecast and Methodology, 2011-2016. http://www. cisco. com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns1175/Cloud_Index_White_Paper. pdf (2012). White Paper. Accessed Apr. 2013.
-
(2012)
-
-
-
56
-
-
84897106358
-
-
Cisco: 2013 Cisco Annual Security Report, Accessed Apr. 2013
-
Cisco: 2013 Cisco Annual Security Report. http://www. cisco. com/en/US/prod/vpndevc/annual_security_report. html (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
57
-
-
84897104890
-
-
Cisco: Cisco Cloud Services Router 1000V Series, Accessed Jul. 2013
-
Cisco: Cisco Cloud Services Router 1000V Series. http://www. cisco. com/en/US/products/ps12559/index. html (2013). Accessed Jul. 2013.
-
(2013)
-
-
-
58
-
-
84897073612
-
-
Citrix: Citrix Website, Accessed Jun. 2013
-
Citrix: Citrix Website. https://www. citrix. com/products. html?ntref=hp_nav_us (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
59
-
-
84897068876
-
-
CloudBees: CloudBees Website, Accessed Apr. 2013
-
CloudBees: CloudBees Website. http://www. cloudbees. com/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
60
-
-
85060818077
-
Introduction and overview of the Multics system
-
ACM, New York, NY, USA
-
Corbató, F. J., Vyssotsky, V. A.: Introduction and overview of the Multics system. In: Proceedings of the Fall Joint Computer Conference, pp. 185-196. ACM, New York, NY, USA (1965).
-
(1965)
Proceedings of the Fall Joint Computer Conference
, pp. 185-196
-
-
Corbató, F.J.1
Vyssotsky, V.A.2
-
61
-
-
84897095085
-
Blackhole Exploit Kit Leverages Margaret Thatcher's Death
-
Coronado, C.: Blackhole Exploit Kit Leverages Margaret Thatcher's Death. Trend Micro (2013).
-
(2013)
Trend Micro
-
-
Coronado, C.1
-
62
-
-
84897051223
-
-
CSA: Top Threats to Cloud Computing, Accessed Sept. 2012
-
CSA: Top Threats to Cloud Computing. https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf (2010). Accessed Sept. 2012.
-
(2010)
-
-
-
63
-
-
84897038280
-
-
CSA: Security Guidance for Critical Areas of Focus in Cloud Computing v3. 0, Accessed Sept. 2012
-
CSA: Security Guidance for Critical Areas of Focus in Cloud Computing v3. 0. https://cloudsecurityalliance. org/guidance/csaguide. v3. 0. pdf (2011). Accessed Sept. 2012.
-
(2011)
-
-
-
64
-
-
84897091325
-
-
CSA: The Notorious Nine Cloud Computing Top Threats in 2013, Accessed Jul. 2013
-
CSA: The Notorious Nine Cloud Computing Top Threats in 2013. https://downloads. cloudsecurityalliance. org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013. pdf (2013). Accessed Jul. 2013.
-
(2013)
-
-
-
65
-
-
84897068889
-
-
Cuckoo Website: Cuckoo, Accessed Apr. 2013
-
Cuckoo Website: Cuckoo. http://www. cuckoosandbox. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
66
-
-
84869023231
-
Man in the browser attacks
-
doi:10.4018/jaci.2012010103
-
Curran, K., Dougan, T.: Man in the browser attacks. Int. J. Ambient Comput. Intell. 4(1), 29-39 (2012). doi: 10. 4018/jaci. 2012010103.
-
(2012)
Int. J. Ambient Comput. Intell.
, vol.4
, Issue.1
, pp. 29-39
-
-
Curran, K.1
Dougan, T.2
-
67
-
-
84994288579
-
Multitasking without compromise: a virtual machine evolution
-
doi:10.1145/2442776.2442785
-
Czajkowski, G., Daynàs, L.: Multitasking without compromise: a virtual machine evolution. ACM SIGPLAN Not. 47(4a), 60-73 (2012). doi: 10. 1145/2442776. 2442785.
-
(2012)
ACM SIGPLAN Not.
, vol.47
, Issue.4 a
, pp. 60-73
-
-
Czajkowski, G.1
Daynàs, L.2
-
68
-
-
84864876206
-
One-time cookies: preventing session hijacking attacks with stateless authentication tokens
-
doi:10.1145/2220352.2220353
-
Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-time cookies: preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Technol. 12(1), 1: 1-1: 24 (2012). doi: 10. 1145/2220352. 2220353.
-
(2012)
ACM Trans. Internet Technol.
, vol.12
, Issue.1
, pp. 1-24
-
-
Dacosta, I.1
Chakradeo, S.2
Ahamad, M.3
Traynor, P.4
-
69
-
-
84859433005
-
A survey of risks, threats and vulnerabilities in cloud computing
-
6. ACM, New York, NY, USA
-
Dahbur, K., Mohammad, B., Tarakji, A. B.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the International Conference on Intelligent Semantic Web-Services and Applications, pp. 12: 1-12: 6. ACM, New York, NY, USA (2011).
-
(2011)
Proceedings of the International Conference on Intelligent Semantic Web-Services and Applications
, vol.12
, pp. 1-12
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
70
-
-
84897047834
-
What We'll See in 2013 in Cloud Computing
-
Darrow, B., Higginbothamm, S.: What We'll See in 2013 in Cloud Computing. GigaOM (2012).
-
(2012)
GigaOM
-
-
Darrow, B.1
Higginbothamm, S.2
-
71
-
-
84897087030
-
Nebula One Seeks To Reinvent Cloud Computing
-
de Borja, F.: Nebula One Seeks To Reinvent Cloud Computing. CloudTimes (2013).
-
(2013)
CloudTimes
-
-
de Borja, F.1
-
72
-
-
79958729447
-
Intrusion detection system in cloud computing environment
-
ACM, New York, NY, USA, doi: 10. 1145/1980022. 1980076
-
Dhage, S. N., Meshram, B. B., Rawat, R., Padawe, S., Paingaokar, M., Misra, A.: Intrusion detection system in cloud computing environment. In: Proceedings of the International Conference & Workshop on Emerging Trends in Technology, pp. 235-239. ACM, New York, NY, USA (2011). doi: 10. 1145/1980022. 1980076.
-
(2011)
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
, pp. 235-239
-
-
Dhage, S.N.1
Meshram, B.B.2
Rawat, R.3
Padawe, S.4
Paingaokar, M.5
Misra, A.6
-
73
-
-
84860629853
-
Multi-level authentication technique for accessing cloud services
-
IEEE, doi: 10. 1109/ICCCA. 2012. 6179130
-
Dinesha, H., Agrawal, V.: Multi-level authentication technique for accessing cloud services. In: International Conference on Computing, Communication and Applications, pp. 1-4. IEEE (2012). doi: 10. 1109/ICCCA. 2012. 6179130.
-
(2012)
International Conference on Computing, Communication and Applications
, vol.1-4
-
-
Dinesha, H.1
Agrawal, V.2
-
74
-
-
84863119286
-
De-anonymizing dynamic social networks
-
IEEE, doi: 10. 1109/GLOCOM. 2011. 6133607
-
Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: IEEE Global Telecommunications Conference, pp. 1-6. IEEE (2011). doi: 10. 1109/GLOCOM. 2011. 6133607.
-
(2011)
IEEE Global Telecommunications Conference
, pp. 1-6
-
-
Ding, X.1
Zhang, L.2
Wan, Z.3
Gu, M.4
-
75
-
-
84897035137
-
Scary Logins: Worst Passwords of 2012 and How to Fix Them
-
Doel, K.: Scary Logins: Worst Passwords of 2012 and How to Fix Them. SplashData (2012).
-
(2012)
SplashData
-
-
Doel, K.1
-
76
-
-
84897051342
-
Android
-
Accessed Apr. 2013
-
Dong, T.: Android. Dropdialer. https://www. symantec. com/security_response/writeup. jsp?docid=2012-070909--0726-99 (2012). Accessed Apr. 2013.
-
(2012)
Dropdialer
-
-
Dong, T.1
-
77
-
-
79953871686
-
An investigation on integrating XML-based security into Web services
-
IEEE
-
Doroodchi, M., Iranmehr, A., Pouriyeh, S.: An investigation on integrating XML-based security into Web services. In: 5th IEEE GCC Conference Exhibition, pp. 1-5. IEEE (2009).
-
(2009)
5th IEEE GCC Conference Exhibition
, pp. 1-5
-
-
Doroodchi, M.1
Iranmehr, A.2
Pouriyeh, S.3
-
79
-
-
84868152765
-
Insider attacks in cloud computing
-
IEEE Computer Society, Washington, DC, USA,. doi: 10. 1109/TrustCom. 2012. 188
-
Duncan, A., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 857-862. IEEE Computer Society, Washington, DC, USA (2012). doi: 10. 1109/TrustCom. 2012. 188.
-
(2012)
IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 857-862
-
-
Duncan, A.1
Creese, S.2
Goldsmith, M.3
-
80
-
-
84864596423
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
-
doi: 10. 1016/j. diin. 2012. 05. 001
-
Dykstra, J., Sherman, A. T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit. Investig. 9, Supplement(0), S90-S98 (2012). doi: 10. 1016/j. diin. 2012. 05. 001.
-
(2012)
Digit. Investig.
, vol.9
, Issue.SUPPL.
-
-
Dykstra, J.1
Sherman, A.T.2
-
81
-
-
84897072370
-
-
Electronic Frontier Foundation: HTTPS Everywhere Website, Accessed Apr. 2013
-
Electronic Frontier Foundation: HTTPS Everywhere Website. https://www. eff. org/https-everywhere (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
82
-
-
84897074422
-
-
ENISA: Cloud Computing: Benefits, Risks and Recommendations for Infomarion Security, Accessed Sept. 2012
-
ENISA: Cloud Computing: Benefits, Risks and Recommendations for Infomarion Security. http://www. enisa. europa. eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment (2009). Accessed Sept. 2012.
-
(2009)
-
-
-
83
-
-
80054878180
-
A trust computing mechanism for cloud computing with multilevel thresholding
-
IEEE, doi: 10. 1109/ICIINFS. 2011. 6038113
-
Firdhous, M., Ghazali, O., Hassan, S.: A trust computing mechanism for cloud computing with multilevel thresholding. In: 6th IEEE International Conference on Industrial and Information Systems, pp. 457-461. IEEE (2011). doi: 10. 1109/ICIINFS. 2011. 6038113.
-
(2011)
6th IEEE International Conference on Industrial and Information Systems
, pp. 457-461
-
-
Firdhous, M.1
Ghazali, O.2
Hassan, S.3
-
84
-
-
84897102799
-
-
FireEye: FireEye Advanced Threat Report-2H 2012, Accessed Apr. 2013
-
FireEye: FireEye Advanced Threat Report-2H 2012. http://www2. fireeye. com/rs/fireye/images/fireeye-advanced-threat-report-2h2012. pdf (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
85
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
IEEE, doi: 10. 1109/GCE. 2008. 4738445
-
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1-10. IEEE (2008). doi: 10. 1109/GCE. 2008. 4738445.
-
(2008)
Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
86
-
-
84944386303
-
When virtual is harder than real: security challenges in virtual machine based computing environments
-
USENIX Association, Berkeley, CA, USA
-
Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, vol. 10, pp. 20-20. USENIX Association, Berkeley, CA, USA (2005).
-
(2005)
Proceedings of the 10th Conference on Hot Topics in Operating Systems
, vol.10
, pp. 20
-
-
Garfinkel, T.1
Rosenblum, M.2
-
87
-
-
84897061967
-
-
Gartner: Assessing the Security Risks of Cloud Computing, White Paper. Accessed Sept. 2012
-
Gartner: Assessing the Security Risks of Cloud Computing. http://cloud. ctrls. in/files/assessing-the-security-risks. pdf (2008). White Paper. Accessed Sept. 2012.
-
(2008)
-
-
-
90
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM, Bethesda, MD, USA, doi: 10. 1145/1536414. 1536440
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), STOC '09, pp. 169-178. ACM, Bethesda, MD, USA (2009). doi: 10. 1145/1536414. 1536440.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), STOC '09
, pp. 169-178
-
-
Gentry, C.1
-
91
-
-
70450078398
-
I-JVM: a Java virtual machine for component isolation in OSGi
-
Estoril, Lisbon, Portugal doi: 10. 1109/DSN. 2009. 5270296
-
Geoffray, N., Thomas, G., Muller, G., Parrend, P., Frenot, S., Folliot, B.: I-JVM: a Java virtual machine for component isolation in OSGi. In: IEEE/IFIP Int. Conf. on Dependable Systems Networks (DSN), pp. 544-553. Estoril, Lisbon, Portugal (2009). doi: 10. 1109/DSN. 2009. 5270296.
-
(2009)
IEEE/IFIP Int. Conf. on Dependable Systems Networks (DSN)
, pp. 544-553
-
-
Geoffray, N.1
Thomas, G.2
Muller, G.3
Parrend, P.4
Frenot, S.5
Folliot, B.6
-
92
-
-
79957872924
-
HORNS: a homomorphic encryption scheme for cloud computing using Residue number system
-
Baltimore, MD, USA, doi: 10. 1109/CISS. 2011. 5766176
-
Gomathisankaran, M., Tyagi, A., Namuduri, K.: HORNS: a homomorphic encryption scheme for cloud computing using Residue number system. In: 45th Annual Conference on Information Sciences and Systems (CISS), pp. 1-5. Baltimore, MD, USA (2011). doi: 10. 1109/CISS. 2011. 5766176.
-
(2011)
45th Annual Conference on Information Sciences and Systems (CISS)
, pp. 1-5
-
-
Gomathisankaran, M.1
Tyagi, A.2
Namuduri, K.3
-
93
-
-
78649899214
-
The characteristics of cloud computing
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/ICPPW. 2010. 45
-
Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel Processing Workshop, pp. 275-279. IEEE Computer Society, Washington, DC, USA (2010). doi: 10. 1109/ICPPW. 2010. 45.
-
(2010)
39th International Conference on Parallel Processing Workshop
, pp. 275-279
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
94
-
-
84857150325
-
A quantitative analysis of current security concerns and solutions for cloud computing
-
IEEE Computer Society, Washington, DC, USA
-
Gonzalez, N., Miers, C., Redigolo, F., Carvalho, T., Simplicio, M., Naslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. In: IEEE 3rd International Conference on Cloud Computing Technology and Science, pp. 231-238. IEEE Computer Society, Washington, DC, USA (2011).
-
(2011)
IEEE 3rd International Conference on Cloud Computing Technology and Science
, pp. 231-238
-
-
Gonzalez, N.1
Miers, C.2
Redigolo, F.3
Carvalho, T.4
Simplicio, M.5
Naslund, M.6
Pourzandi, M.7
-
95
-
-
84897032859
-
Why Passwords have Never been Weaker-and Crackers have Never been Stronger
-
Goodin, D.: Why Passwords have Never been Weaker-and Crackers have Never been Stronger. Ars Technica (2012).
-
(2012)
Ars Technica
-
-
Goodin, D.1
-
97
-
-
84897043128
-
-
Google: Google App Engine, Accessed Apr. 2013
-
Google: Google App Engine. https://developers. google. com/appengine/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
98
-
-
84873338342
-
The threat in the cloud
-
doi:10.1109/MSP.2013.20
-
Green, M.: The threat in the cloud. IEEE Secur. Priv. 11(1), 86-89 (2013). doi: 10. 1109/MSP. 2013. 20.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 86-89
-
-
Green, M.1
-
99
-
-
84875493689
-
Using smartphones as a proxy for forensic evidence contained in cloud storage services
-
Maui, HI, USA, doi: 10. 1109/HICSS. 2013. 592
-
Grispos, G., Glisson, W. B., Storer, T.: Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS), pp. 4910-4919. Maui, HI, USA (2013). doi: 10. 1109/HICSS. 2013. 592.
-
(2013)
46th Hawaii International Conference on System Sciences (HICSS)
, pp. 4910-4919
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
100
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
doi:10.1109/MSP.2010.115
-
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50-57 (2011). doi: 10. 1109/MSP. 2010. 115.
-
(2011)
IEEE Secur. Priv.
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
101
-
-
84873431220
-
Authentication at scale
-
doi:10.1109/MSP.2012.162
-
Grosse, E., Upadhyay, M.: Authentication at scale. IEEE Secur. Priv. 11(1), 15-22 (2013). doi: 10. 1109/MSP. 2012. 162.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 15-22
-
-
Grosse, E.1
Upadhyay, M.2
-
102
-
-
70449472667
-
Vulnerable cloud: SOAP message security validation revisited
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/ICWS. 2009. 70
-
Gruschka, N., Iacono, L.: Vulnerable cloud: SOAP message security validation revisited. In: IEEE International Conference on Web Services, pp. 625-631. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/ICWS. 2009. 70.
-
(2009)
IEEE International Conference on Web Services
, pp. 625-631
-
-
Gruschka, N.1
Iacono, L.2
-
103
-
-
80052136229
-
Cloud computing security auditing
-
IEEE
-
Gul, I., Rehman, A., Islam, M.: Cloud computing security auditing. In: The 2nd International Conference on Next Generation Information Technology, pp. 143-148. IEEE (2011).
-
(2011)
The 2nd International Conference on Next Generation Information Technology
, pp. 143-148
-
-
Gul, I.1
Rehman, A.2
Islam, M.3
-
104
-
-
84856187963
-
Towards a trust management system for cloud computing
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/TrustCom. 2011. 129
-
Habib, S., Ries, S., Muhlhauser, M.: Towards a trust management system for cloud computing. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933-939. IEEE Computer Society, Washington, DC, USA (2011). doi: 10. 1109/TrustCom. 2011. 129.
-
(2011)
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 933-939
-
-
Habib, S.1
Ries, S.2
Muhlhauser, M.3
-
105
-
-
84897068684
-
-
Accessed May 2013
-
Hale, C.: bcrypt. http://codahale. com/how-to-safely-store-a-password/ (2010). Accessed May 2013.
-
(2010)
bcrypt
-
-
Hale, C.1
-
106
-
-
84897048861
-
Japanese One-Click Fraud Campaign Comes to Google Play
-
Hamada, J.: Japanese One-Click Fraud Campaign Comes to Google Play. Symantec Blog (2013).
-
(2013)
Symantec Blog
-
-
Hamada, J.1
-
107
-
-
70949093558
-
Remote working: managing the balancing act between network access and data security
-
doi:10.1016/S1361-3723(09)70141-1
-
Hart, J.: Remote working: managing the balancing act between network access and data security. Comput. Fraud Secur. 2009(11), 14-17 (2009). doi: 10. 1016/S1361-3723(09)70141-1.
-
(2009)
Comput. Fraud Secur.
, vol.2009
, Issue.11
, pp. 14-17
-
-
Hart, J.1
-
108
-
-
85024260157
-
Cloud computing
-
doi:10.1145/1364782.1364786
-
Hayes, B.: Cloud computing. Commun. ACM 51(7), 9-11 (2008). doi: 10. 1145/1364782. 1364786.
-
(2008)
Commun. ACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
109
-
-
84872005774
-
Condos and clouds
-
doi:10.1145/2398356.2398374
-
Helland, P.: Condos and clouds. Commun. ACM 56(1), 50-59 (2013). doi: 10. 1145/2398356. 2398374.
-
(2013)
Commun. ACM
, vol.56
, Issue.1
, pp. 50-59
-
-
Helland, P.1
-
110
-
-
85076227028
-
Minding your Ps and Qs: detection of widespread weak keys in network devices
-
USENIX, Bellevue, WA, USA, doi: 10. 1109/ICCIAutom. 2011. 6183990
-
Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J. A.: Minding your Ps and Qs: detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Security Symposium, pp. 205-220. USENIX, Bellevue, WA, USA (2012). doi: 10. 1109/ICCIAutom. 2011. 6183990.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 205-220
-
-
Heninger, N.1
Durumeric, Z.2
Wustrow, E.3
Halderman, J.A.4
-
112
-
-
84866663678
-
How Apple and Amazon Security Flaws Led to My Epic Hacking
-
Honan, M.: How Apple and Amazon Security Flaws Led to My Epic Hacking. Wired (2012).
-
(2012)
Wired
-
-
Honan, M.1
-
113
-
-
84897070533
-
-
HP: HP 2012 Cyber Risk Report, Accessed Apr. 2013
-
HP: HP 2012 Cyber Risk Report. http://www. hpenterprisesecurity. com/collateral/whitepaper/HP2012CyberRiskReport_0213. pdf (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
114
-
-
84897069164
-
-
HP: HP ArcSight, Accessed Apr. 2013
-
HP: HP ArcSight. http://www8. hp. com/us/en/software-solutions/software. html?compURI=1340477 (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
115
-
-
84863588835
-
Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation
-
ACM, Trento, Italy, doi: 10. 1145/2231936. 2232011
-
Hua, J., Sakurai, K.: Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), pp. 1470-1477. ACM, Trento, Italy (2012). doi: 10. 1145/2231936. 2232011.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC)
, pp. 1470-1477
-
-
Hua, J.1
Sakurai, K.2
-
117
-
-
80053144966
-
Exploiting cloud utility models for profit and ruin
-
IEEE Computer Society, Washington, DC, USA
-
Idziorek, J., Tannian, M.: Exploiting cloud utility models for profit and ruin. In: IEEE International Conference on Cloud Computing, pp. 33-40. IEEE Computer Society, Washington, DC, USA (2011).
-
(2011)
IEEE International Conference on Cloud Computing
, pp. 33-40
-
-
Idziorek, J.1
Tannian, M.2
-
118
-
-
80955142134
-
Detecting fraudulent use of cloud resources
-
ACM, New York, NY, USA, doi: 10. 1145/2046660. 2046676
-
Idziorek, J., Tannian, M., Jacobson, D.: Detecting fraudulent use of cloud resources. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 61-72. ACM, New York, NY, USA (2011). doi: 10. 1145/2046660. 2046676.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security
, pp. 61-72
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
119
-
-
84897092150
-
-
Infosecurity: Recycled phones retain their previous owners' data
-
Infosecurity: Recycled phones retain their previous owners' data. Infosecurity Magazine (2013).
-
(2013)
Infosecurity Magazine
-
-
-
120
-
-
84897101595
-
-
Intel: Intel Digital Random Number Generator (DRNG): Software Implementation Guide, Accessed May 2013
-
Intel: Intel Digital Random Number Generator (DRNG): Software Implementation Guide. http://software. intel. com/sites/default/files/m/d/4/1/d/8/441_Intel_R_DRNG_Software_Implementation_Guide_final_Aug7. pdf (2012). Accessed May 2013.
-
(2012)
-
-
-
122
-
-
57349089194
-
ForceHTTPS: protecting high-security web sites from network attacks
-
ACM, Beijing, China, doi: 10. 1145/1367497. 1367569
-
Jackson, C., Barth, A.: ForceHTTPS: protecting high-security web sites from network attacks. In: Proceedings of the 17th International Conference on World Wide Web (WWW), pp. 525-534. ACM, Beijing, China (2008). doi: 10. 1145/1367497. 1367569.
-
(2008)
Proceedings of the 17th International Conference on World Wide Web (WWW)
, pp. 525-534
-
-
Jackson, C.1
Barth, A.2
-
123
-
-
78751697134
-
Security in multi-tenancy cloud
-
IEEE, doi: 10. 1109/CCST. 2010. 5678682
-
Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology, pp. 35-41. IEEE (2010). doi: 10. 1109/CCST. 2010. 5678682.
-
(2010)
IEEE International Carnahan Conference on Security Technology
, pp. 35-41
-
-
Jasti, A.1
Shah, P.2
Nagaraj, R.3
Pendse, R.4
-
124
-
-
84897031170
-
Spamhaus: DDoS Update-March 2013
-
Jenkins, Q.: Spamhaus: DDoS Update-March 2013. Spamhaus (2013).
-
(2013)
Spamhaus
-
-
Jenkins, Q.1
-
125
-
-
70350156792
-
A survey of attacks on web services
-
doi:10.1007/s00450-009-0092-6
-
Jensen, M., Gruschka, N., Herkenhöner, R.: A survey of attacks on web services. Comput. Sci. Res. Dev. 24, 185-197 (2009). doi: 10. 1007/s00450-009-0092-6.
-
(2009)
Comput. Sci. Res. Dev.
, vol.24
, pp. 185-197
-
-
Jensen, M.1
Gruschka, N.2
Herkenhöner, R.3
-
126
-
-
49049087362
-
The impact of flooding attacks on network-based services
-
IEEE Computer Society, Washington, DC, USA
-
Jensen, M., Gruschka, N., Luttenberger, N.: The impact of flooding attacks on network-based services. In: 3rd International Conference on Availability, Reliability and Security, pp. 509-513. IEEE Computer Society, Washington, DC, USA (2008).
-
(2008)
3rd International Conference on Availability, Reliability and Security
, pp. 509-513
-
-
Jensen, M.1
Gruschka, N.2
Luttenberger, N.3
-
127
-
-
80055005460
-
Expressiveness considerations of XML signatures
-
Workshop, IEEE Computer Society, Washington, DC, USA
-
Jensen, M., Meyer, C.: Expressiveness considerations of XML signatures. In: IEEE 35th Annual Computer Software and Applications Conf. Workshop, pp. 392-397. IEEE Computer Society, Washington, DC, USA (2011).
-
(2011)
IEEE 35th Annual Computer Software and Applications Conf
, pp. 392-397
-
-
Jensen, M.1
Meyer, C.2
-
128
-
-
77957961711
-
Towards an anonymous access control and accountability scheme for cloud computing
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CLOUD. 2010. 61
-
Jensen, M., Schäge, S., Schwenk, J.: Towards an anonymous access control and accountability scheme for cloud computing. In: IEEE 3rd International Conference on Cloud Computing, pp. 540-541. IEEE Computer Society, Washington, DC, USA (2010). doi: 10. 1109/CLOUD. 2010. 61.
-
(2010)
IEEE 3rd International Conference on Cloud Computing
, pp. 540-541
-
-
Jensen, M.1
Schäge, S.2
Schwenk, J.3
-
130
-
-
74349113474
-
On Technical security issues in cloud computing
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CLOUD. 2009. 60
-
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On Technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, pp. 109-116. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/CLOUD. 2009. 60.
-
(2009)
IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
131
-
-
84863142680
-
A trust model based on cloud model and Bayesian networks
-
doi:10.1016/j.proenv.2011.12.072
-
Jin, B., Wang, Y., Liu, Z., Xue, J.: A trust model based on cloud model and Bayesian networks. Procedia Environ. Sci. 11, Part A, 452-459 (2011). doi: 10. 1016/j. proenv. 2011. 12. 072.
-
(2011)
Procedia Environ. Sci.
, vol.11
, Issue.PART A
, pp. 452-459
-
-
Jin, B.1
Wang, Y.2
Liu, Z.3
Xue, J.4
-
132
-
-
74049112206
-
Cloud security issues
-
IEEE, doi: 10. 1109/SCC. 2009. 84
-
Kandukuri, B., Paturi, V., Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing, pp. 517-520. IEEE (2009). doi: 10. 1109/SCC. 2009. 84.
-
(2009)
IEEE International Conference on Services Computing
, pp. 517-520
-
-
Kandukuri, B.1
Paturi, V.2
Rakshit, A.3
-
133
-
-
70449469756
-
Data center evolution: a tutorial on state of the art, issues, and challenges
-
doi:10.1016/j.comnet.2009.10.004
-
Kant, K.: Data center evolution: a tutorial on state of the art, issues, and challenges. Comput. Netw. 53(17), 2939-2965 (2009). doi: 10. 1016/j. comnet. 2009. 10. 004.
-
(2009)
Comput. Netw.
, vol.53
, Issue.17
, pp. 2939-2965
-
-
Kant, K.1
-
134
-
-
84897044001
-
Crisis for Windows Sneaks onto Virtual Machines
-
Katsuki, T.: Crisis for Windows Sneaks onto Virtual Machines. Symantec Blog (2012).
-
(2012)
Symantec Blog
-
-
Katsuki, T.1
-
135
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman, L.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61-64 (2009).
-
(2009)
IEEE Secur. Priv.
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.1
-
136
-
-
84881191259
-
A study of entropy sources in cloud computers: random number generation on cloud hosts
-
Springer, St. Petersburg, Russia, doi: 10. 1007/978-3-642-33704-8_24
-
Kerrigan, B., Chen, Y.: A study of entropy sources in cloud computers: random number generation on cloud hosts. In: Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), pp. 286-298. Springer, St. Petersburg, Russia (2012). doi: 10. 1007/978-3-642-33704-8_24.
-
(2012)
Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS)
, pp. 286-298
-
-
Kerrigan, B.1
Chen, Y.2
-
137
-
-
77957700442
-
Establishing trust in cloud computing
-
doi:10.1109/MITP.2010.128
-
Khan, K., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20-27 (2010). doi: 10. 1109/MITP. 2010. 128.
-
(2010)
IT Prof.
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.1
Malluhi, Q.2
-
138
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
doi:10.1016/j.future.2012.01.006
-
Khorshed, M. T., Ali, A. S., Wasimi, S. A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833-851 (2012). doi: 10. 1016/j. future. 2012. 01. 006.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.6
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, A.S.2
Wasimi, S.A.3
-
139
-
-
84897070405
-
-
Accessed May 2013
-
King, C. I.: Intel Rdrand Instruction Revisited. http://smackerelofopinion. blogspot. co. uk/2012/10/intel-rdrand-instruction-revisited. html (2012). Accessed May 2013.
-
(2012)
Intel Rdrand Instruction Revisited
-
-
King, C.I.1
-
140
-
-
33751032041
-
SubVirt: implementing malware with virtual machines
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SP. 2006. 38
-
King, S., Chen, P.: SubVirt: implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy, pp. 14 pp.-327. IEEE Computer Society, Washington, DC, USA (2006). doi: 10. 1109/SP. 2006. 38.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 14-327
-
-
King, S.1
Chen, P.2
-
142
-
-
84873357994
-
Security event monitoring in a distributed systems environment
-
doi:10.1109/MSP.2012.61
-
Kufel, L.: Security event monitoring in a distributed systems environment. IEEE Secur. Priv. 11(1), 36-43 (2013). doi: 10. 1109/MSP. 2012. 61.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 36-43
-
-
Kufel, L.1
-
144
-
-
80053942235
-
-
Accessed May 2013
-
Leder, F., Werner, T.: Containing Conficker. http://net. cs. uni-bonn. de/wg/cs/applications/containing-conficker/ (2011). Accessed May 2013.
-
(2011)
Containing Conficker
-
-
Leder, F.1
Werner, T.2
-
145
-
-
79955677448
-
Multi-level intrusion detection system and log management in cloud computing
-
IEEE
-
Lee, J. H., Park, M. W., Eom, J. H., Chung, T. M.: Multi-level intrusion detection system and log management in cloud computing. In: 13th International Conference on Advanced Communication Technology, pp. 552-555. IEEE (2011).
-
(2011)
13th International Conference on Advanced Communication Technology
, pp. 552-555
-
-
Lee, J.H.1
Park, M.W.2
Eom, J.H.3
Chung, T.M.4
-
146
-
-
84869632972
-
Blue Security Folds Under Spammer's Wrath
-
Lemos, R.: Blue Security Folds Under Spammer's Wrath. SecurityFocus (2013).
-
(2013)
SecurityFocus
-
-
Lemos, R.1
-
147
-
-
70349823934
-
What's inside the cloud? An architectural map of the cloud landscape
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CLOUD. 2009. 5071529
-
Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What's inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 23-31. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/CLOUD. 2009. 5071529.
-
(2009)
Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing
, pp. 23-31
-
-
Lenk, A.1
Klems, M.2
Nimis, J.3
Tai, S.4
Sandholm, T.5
-
149
-
-
84855859636
-
Evidence of advanced persistent threat: a case study of malware for political espionage
-
Fajardo, PR, USA, doi: 10. 1109/MALWARE. 2011. 6112333
-
Li, F., Lai, A., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 102-109. Fajardo, PR, USA (2011). doi: 10. 1109/MALWARE. 2011. 6112333.
-
(2011)
6th International Conference on Malicious and Unwanted Software (MALWARE)
, pp. 102-109
-
-
Li, F.1
Lai, A.2
Ddl, D.3
-
150
-
-
79951783095
-
Analysis on cloud-based security vulnerability assessment
-
IEEE, doi: 10. 1109/ICEBE. 2010. 77
-
Li, H. C., Liang, P. H., Yang, J. M., Chen, S. J.: Analysis on cloud-based security vulnerability assessment. In: IEEE 7th International Conference on e-Business Engineering, pp. 490-494. IEEE (2010). doi: 10. 1109/ICEBE. 2010. 77.
-
(2010)
IEEE 7th International Conference on e-Business Engineering
, pp. 490-494
-
-
Li, H.C.1
Liang, P.H.2
Yang, J.M.3
Chen, S.J.4
-
151
-
-
84873374971
-
Mobile security: a look ahead
-
doi:10.1109/MSP.2013.15
-
Li, Q., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78-81 (2013). doi: 10. 1109/MSP. 2013. 15.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 78-81
-
-
Li, Q.1
Clark, G.2
-
152
-
-
81255167363
-
Mechanisms of polymorphic and metamorphic viruses
-
Berkeley/Oakland, CA, USA, doi: 10. 1109/EISIC. 2011. 77
-
Li, X., Loh, P., Tan, F.: Mechanisms of polymorphic and metamorphic viruses. In: European Intelligence and Security Informatics Conference (EISIC), pp. 149-154. Berkeley/Oakland, CA, USA (2011). doi: 10. 1109/EISIC. 2011. 77.
-
(2011)
European Intelligence and Security Informatics Conference (EISIC)
, pp. 149-154
-
-
Li, X.1
Loh, P.2
Tan, F.3
-
153
-
-
64549154025
-
The design and application of Xen-based host system firewall and its extension
-
Macau, China, doi: 10. 1109/ICECT. 2009. 83
-
Liu, F., Su, X., Liu, W., Shi, M.: The design and application of Xen-based host system firewall and its extension. In: International Conference on Electronic Computer Technology, pp. 392-395. Macau, China (2009). doi: 10. 1109/ICECT. 2009. 83.
-
(2009)
International Conference on Electronic Computer Technology
, pp. 392-395
-
-
Liu, F.1
Su, X.2
Liu, W.3
Shi, M.4
-
154
-
-
78650154288
-
A new form of DoS attack in a cloud and its avoidance mechanism
-
ACM, New York, NY, USA, doi: 10. 1145/1866835. 1866849
-
Liu, H.: A new form of DoS attack in a cloud and its avoidance mechanism. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 65-76. ACM, New York, NY, USA (2010). doi: 10. 1145/1866835. 1866849.
-
(2010)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 65-76
-
-
Liu, H.1
-
155
-
-
84897046191
-
-
LivingSocial: LivingSocial Security Notice, Accessed May 2013
-
LivingSocial: LivingSocial Security Notice. https://livingsocial. com/createpassword (2013). Accessed May 2013.
-
(2013)
-
-
-
156
-
-
84863174772
-
Virtualization security for cloud computing service
-
IEEE Computer Society, Washington, DC, USA
-
Luo, S., Lin, Z., Chen, X., Yang, Z., Chen, J.: Virtualization security for cloud computing service. In: International Conference on Cloud and Service Computing, pp. 174-179. IEEE Computer Society, Washington, DC, USA (2011).
-
(2011)
International Conference on Cloud and Service Computing
, pp. 174-179
-
-
Luo, S.1
Lin, Z.2
Chen, X.3
Yang, Z.4
Chen, J.5
-
157
-
-
84897070820
-
-
Mandiant: APT1: Exposing One of China's Cyber Espionage Units, Accessed Apr. 2013
-
Mandiant: APT1: Exposing One of China's Cyber Espionage Units. http://intelreport. mandiant. com/Mandiant_APT1_Report. pdf (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
158
-
-
57549096898
-
Danger in the clouds
-
doi:10.1016/S1353-4858(08)70140-5
-
Mansfield-Devine, S.: Danger in the clouds. Netw. Secur. 2008(12), 9-11 (2008). doi: 10. 1016/S1353-4858(08)70140-5.
-
(2008)
Netw. Secur.
, vol.2008
, Issue.12
, pp. 9-11
-
-
Mansfield-Devine, S.1
-
159
-
-
77955317816
-
-
Accessed Apr. 2013
-
Marlinspike, M.: New tricks for defeating SSL in practice. https://www. blackhat. com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL. pdf (2009). Accessed Apr. 2013.
-
(2009)
New tricks for defeating SSL in practice
-
-
Marlinspike, M.1
-
160
-
-
78650875543
-
-
Accessed Apr. 2013
-
Marlinspike, M.: sslstrip. http://www. thoughtcrime. org/software/sslstrip/ (2009). Accessed Apr. 2013.
-
(2009)
sslstrip
-
-
Marlinspike, M.1
-
161
-
-
84873358969
-
Implementing effective controls in a mobile, agile, cloud-enabled enterprise
-
doi:10.1109/MSP.2013.1
-
Martin, D.: Implementing effective controls in a mobile, agile, cloud-enabled enterprise. IEEE Secur. Priv. 11(1), 13-14 (2013). doi: 10. 1109/MSP. 2013. 1.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 13-14
-
-
Martin, D.1
-
163
-
-
84897036242
-
-
McAfee: McAfee Threats Report-Fourth Quarter 2012, Accessed Apr. 2013
-
McAfee: McAfee Threats Report-Fourth Quarter 2012. http://www. mcafee. com/us/resources/reports/rp-quarterly-threat-q4-2012. pdf (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
164
-
-
77955186544
-
TrustVisor: efficient TCB reduction and attestation
-
Oakland, CA, USA, doi: 10. 1109/SP. 2010. 17
-
McCune, J., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: efficient TCB reduction and attestation. In: IEEE Symposium on Security and Privacy (SP), pp. 143-158. Oakland, CA, USA (2010). doi: 10. 1109/SP. 2010. 17.
-
(2010)
IEEE Symposium on Security and Privacy (SP)
, pp. 143-158
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
165
-
-
2342469291
-
Software security
-
doi:10.1109/MSECP.2004.1281254
-
McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80-83 (2004). doi: 10. 1109/MSECP. 2004. 1281254.
-
(2004)
IEEE Secur. Priv.
, vol.2
, Issue.2
, pp. 80-83
-
-
McGraw, G.1
-
166
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
ACM, New York, NY, USA, doi: 10. 1145/1103022. 1103026
-
McIntosh, M., Austel, P.: XML signature element wrapping attacks and countermeasures. In: Proceedings of the Workshop on Secure Web Services, pp. 20-27. ACM, New York, NY, USA (2005). doi: 10. 1145/1103022. 1103026.
-
(2005)
Proceedings of the Workshop on Secure Web Services
, pp. 20-27
-
-
McIntosh, M.1
Austel, P.2
-
167
-
-
84897104792
-
7 Predictions for Cloud Computing in 2013 That Make Perfect Sense
-
McKendrick, J.: 7 Predictions for Cloud Computing in 2013 That Make Perfect Sense. Forbes (2012).
-
(2012)
Forbes
-
-
McKendrick, J.1
-
168
-
-
84897084568
-
-
MEGA: The MEGA API, Accessed Apr. 2013
-
MEGA: The MEGA API. https://mega. co. nz/#developers (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
169
-
-
84897074979
-
-
Microsoft: Microsoft Hyper-V Server 2012 Website, Accessed Jun. 2013
-
Microsoft: Microsoft Hyper-V Server 2012 Website. https://www. microsoft. com/en-us/server-cloud/hyper-v-server/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
170
-
-
84897044608
-
-
Microsoft: Microsoft Security Intelligence Report: Volume 14, Accessed Apr. 2013
-
Microsoft: Microsoft Security Intelligence Report: Volume 14. http://www. microsoft. com/security/sir/default. aspx (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
171
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
doi: 10. 1016/j. jnca. 2012. 05. 003. Available online 2 June 2012
-
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appli. (2012). doi: 10. 1016/j. jnca. 2012. 05. 003. Available online 2 June 2012.
-
(2012)
J. Netw. Comput. Appli.
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
172
-
-
84864838621
-
Enhanced data security model for cloud computing
-
IEEE
-
Mohamed, E., Abdelkader, H., El-Etriby, S.: Enhanced data security model for cloud computing. In: 8th International Conference on Informatics and Systems, pp. CC-12-CC-17. IEEE (2012).
-
(2012)
8th International Conference on Informatics and Systems
, pp. 12-17
-
-
Mohamed, E.1
Abdelkader, H.2
El-Etriby, S.3
-
173
-
-
85084161758
-
Frankenstein: stitching malware from benign binaries
-
USENIX Association, Bellevue, WA, USA
-
Mohan, V., Hamlen, K. W.: Frankenstein: stitching malware from benign binaries. In: Proceedings of the 6th USENIX Conference on Offensive Technologies, pp. 8-8. USENIX Association, Bellevue, WA, USA (2012).
-
(2012)
Proceedings of the 6th USENIX Conference on Offensive Technologies
, pp. 8
-
-
Mohan, V.1
Hamlen, K.W.2
-
174
-
-
84857187859
-
Monitoring intrusions and security breaches in highly distributed cloud environments
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/CloudCom. 2011. 119
-
Monfared, A., Jaatun, M.: Monitoring intrusions and security breaches in highly distributed cloud environments. In: IEEE 3rd International Conference on Cloud Computing Technology and Science, pp. 772-777. IEEE Computer Society, Washington, DC, USA (2011). doi: 10. 1109/CloudCom. 2011. 119.
-
(2011)
IEEE 3rd International Conference on Cloud Computing Technology and Science
, pp. 772-777
-
-
Monfared, A.1
Jaatun, M.2
-
175
-
-
84880889223
-
An analysis of the cloud computing security problem
-
IEEE Computer Society, Washington, DC, USA
-
Morsy, M. A., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of Asia Pacific Software Engineering Conference Cloud Workshop, pp. 1-6. IEEE Computer Society, Washington, DC, USA (2010).
-
(2010)
Proceedings of Asia Pacific Software Engineering Conference Cloud Workshop
, pp. 1-6
-
-
Morsy, M.A.1
Grundy, J.2
Müller, I.3
-
177
-
-
84897057238
-
-
MPICH: MPICH Website, Accessed Apr. 2013
-
MPICH: MPICH Website. http://www. mpich. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
178
-
-
84897072400
-
DDoS-as-a-Service? You Betcha! It's Cheap, It's Easy, and It's Available to Anyone
-
Musthaler, L.: DDoS-as-a-Service? You Betcha! It's Cheap, It's Easy, and It's Available to Anyone. Security Bistro (2012).
-
(2012)
Security Bistro
-
-
Musthaler, L.1
-
179
-
-
70449632682
-
De-anonymizing social networks
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SP. 2009. 22
-
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, pp. 173-187. IEEE Computer Society, Washington, DC, USA (2009). doi: 10. 1109/SP. 2009. 22.
-
(2009)
30th IEEE Symposium on Security and Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
180
-
-
84897036117
-
Cloud Wars-The Fall of Cloud Storage
-
Accessed Apr. 2013
-
Nathoo, N.: Cloud Wars-The Fall of Cloud Storage. CloudTimes (2013). Accessed Apr. 2013.
-
(2013)
CloudTimes
-
-
Nathoo, N.1
-
181
-
-
84897049540
-
-
Nebula: Introducing Nebula One, Accessed Apr. 2013
-
Nebula: Introducing Nebula One. https://www. nebula. com/nebula-one (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
182
-
-
84897090277
-
-
Network-Tools: Network-Tools Website, Accessed Apr. 2013
-
Network-Tools: Network-Tools Website. http://network-tools. com/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
183
-
-
27544498978
-
Polygraph: automatically generating signatures for polymorphic worms
-
Athens, Greece, doi: 10. 1109/SP. 2005. 15
-
Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: IEEE Symposium on Security and Privacy, pp. 226-241. Athens, Greece (2005). doi: 10. 1109/SP. 2005. 15.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
184
-
-
84897032720
-
-
NIST: NIST Cloud Computing Reference Architecture, Accessed Jul. 2013
-
NIST: NIST Cloud Computing Reference Architecture. http://www. nist. gov/customcf/get_pdf. cfm?pub_id=909505 (2011). Accessed Jul. 2013.
-
(2011)
-
-
-
185
-
-
84897039534
-
-
NIST: The NIST Definition of Cloud Computing, Accessed Sept. 2012
-
NIST: The NIST Definition of Cloud Computing. http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf (2011). Accessed Sept. 2012.
-
(2011)
-
-
-
186
-
-
84897078809
-
-
NIST: NIST Cloud Computing Program, Accessed Sept. 2012
-
NIST: NIST Cloud Computing Program. http://www. nist. gov/itl/cloud/ (2012). Accessed Sept. 2012.
-
(2012)
-
-
-
187
-
-
84897095180
-
-
NIST: NIST Cloud Computing Security Reference Architecture, Accessed Jul. 2013
-
NIST: NIST Cloud Computing Security Reference Architecture. http://collaborate. nist. gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013. 05. 15_v1. 0. pdf (2013). Accessed Jul. 2013.
-
(2013)
-
-
-
188
-
-
70849107663
-
Empirical exploitation of live virtual machine migration
-
doi: 10. 1109/ICCIAutom. 2011. 6183990
-
Oberheide, J., Cooke, E., Jahanian, F.: Empirical exploitation of live virtual machine migration. In: Proceedings of the Black Hat Convention (2008). doi: 10. 1109/ICCIAutom. 2011. 6183990.
-
(2008)
Proceedings of the Black Hat Convention
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
189
-
-
84897065636
-
-
OCCI: OCCI Website, Accessed Apr. 2013
-
OCCI: OCCI Website. http://occi-wg. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
190
-
-
77954737019
-
Load-based covert channels between Xen virtual machines
-
ACM, New York, NY, USA, doi: 10. 1145/1774088. 1774125
-
Okamura, K., Oyama, Y.: Load-based covert channels between Xen virtual machines. In: Proceedings of the ACM Symposium on Applied Computing, pp. 173-180. ACM, New York, NY, USA (2010). doi: 10. 1145/1774088. 1774125.
-
(2010)
Proceedings of the ACM Symposium on Applied Computing
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
191
-
-
80053509259
-
Obfuscation: the hidden malware
-
doi:10.1109/MSP.2011.98
-
O'Kane, P., Sezer, S., McLaughlin, K.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5), 41-47 (2011). doi: 10. 1109/MSP. 2011. 98.
-
(2011)
IEEE Secur. Priv.
, vol.9
, Issue.5
, pp. 41-47
-
-
O'Kane, P.1
Sezer, S.2
McLaughlin, K.3
-
192
-
-
85003886714
-
Cloud APIs-the Next Battleground for Denial-of-Service Attacks
-
O'Neill, M.: Cloud APIs-the Next Battleground for Denial-of-Service Attacks. CSA Blog (2013).
-
(2013)
CSA Blog
-
-
O'Neill, M.1
-
193
-
-
84897033756
-
-
Open Cloud Initiative (OCI): OCI Website, Accessed May 2013
-
Open Cloud Initiative (OCI): OCI Website. http://www. opencloudinitiative. org/ (2013). Accessed May 2013.
-
(2013)
-
-
-
194
-
-
84897065020
-
-
OpenNebula: OpenNebula Website, Accessed Apr. 2013
-
OpenNebula: OpenNebula Website. http://opennebula. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
195
-
-
84897052165
-
-
OpenStack: OpenStack Website, Accessed Apr. 2013
-
OpenStack: OpenStack Website. http://www. openstack. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
196
-
-
84897060577
-
-
Oracle: Oracle Java SE Critical Patch Update Advisory-April 2013, Accessed Apr. 2013
-
Oracle: Oracle Java SE Critical Patch Update Advisory-April 2013. http://www. oracle. com/technetwork/topics/security/javacpuapr2013-1928497. html (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
197
-
-
84897099373
-
-
Oracle: VirtualBox Website, Accessed Jun. 2013
-
Oracle: VirtualBox Website. https://www. virtualbox. org/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
198
-
-
84897068690
-
Your Malware Shall Not Fool Us With Those Anti Analysis Tricks
-
Ortega, A.: Your Malware Shall Not Fool Us With Those Anti Analysis Tricks. AlienVault Labs (2012).
-
(2012)
AlienVault Labs
-
-
Ortega, A.1
-
199
-
-
84897095526
-
-
OSVDB: The Open Source Vulnerability Database Website, Accessed Apr. 2013
-
OSVDB: The Open Source Vulnerability Database Website. http://www. osvdb. org/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
200
-
-
84897074619
-
-
OWASP: The Then Most Critical Web Application Security Risks, Accessed Oct. 2012
-
OWASP: The Then Most Critical Web Application Security Risks. http://owasptop10. googlecode. com/files/OWASP (2010). Accessed Oct. 2012.
-
(2010)
-
-
-
201
-
-
84897096712
-
-
OWASP: The Then Most Critical Web Application Security Risks, Accessed Apr. 2013
-
OWASP: The Then Most Critical Web Application Security Risks. https://www. owasp. org/index. php/Top_10_2013 (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
202
-
-
84863577442
-
Detecting malware signatures in a thin hypervisor
-
ACM, Trento, Italy, doi: 10. 1145/2231936. 2232070
-
Oyama, Y., Giang, T. T. D., Chubachi, Y., Shinagawa, T., Kato, K.: Detecting malware signatures in a thin hypervisor. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), pp. 1807-1814. ACM, Trento, Italy (2012). doi: 10. 1145/2231936. 2232070.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC)
, pp. 1807-1814
-
-
Oyama, Y.1
Giang, T.T.D.2
Chubachi, Y.3
Shinagawa, T.4
Kato, K.5
-
203
-
-
85003884156
-
Challenges of security issues in cloud computing layers
-
Panah, A., Panah, A., Panah, O., Fallahpour, S.: Challenges of security issues in cloud computing layers. Rep. Opin. 4(10), 25-29 (2012).
-
(2012)
Rep. Opin.
, vol.4
, Issue.10
, pp. 25-29
-
-
Panah, A.1
Panah, A.2
Panah, O.3
Fallahpour, S.4
-
204
-
-
84897092707
-
-
Parallels: Oracle VM Server Website., Accessed Jun. 2013
-
Parallels: Oracle VM Server Website. http://www. oracle. com/us/technologies/virtualization/oraclevm/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
205
-
-
84897031931
-
-
Parallels: Parallels Website, Accessed Jun. 2013
-
Parallels: Parallels Website. http://www. parallels. com/eu/products/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
206
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: a systematic review
-
doi: 10. 1016/j. jnca. 2012. 08. 007. Available online 31 Aug. 2012
-
Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J. C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appli. (2012). doi: 10. 1016/j. jnca. 2012. 08. 007. Available online 31 Aug. 2012.
-
(2012)
J. Netw. Comput. Appli.
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Júnior, J.C.4
-
208
-
-
84860356345
-
A survey paper on cloud computing
-
IEEE, doi: 10. 1109/ACCT. 2012. 15
-
Patidar, S., Rane, D., Jain, P.: A survey paper on cloud computing. In: 2nd International Conference on Advanced Computing Communication Technologies, pp. 394-398. IEEE (2012). doi: 10. 1109/ACCT. 2012. 15.
-
(2012)
2nd International Conference on Advanced Computing Communication Technologies
, pp. 394-398
-
-
Patidar, S.1
Rane, D.2
Jain, P.3
-
209
-
-
84897083925
-
-
PCI Security Standards: PCI SSC Data Security Standards Overview, Accessed Oct. 2012
-
PCI Security Standards: PCI SSC Data Security Standards Overview. https://www. pcisecuritystandards. org/security_standards/index. php (2012). Accessed Oct. 2012.
-
(2012)
-
-
-
210
-
-
84875146484
-
Virtualization: issues, security threats, and solutions
-
doi:10.1145/2431211.2431216
-
Pearce, M., Zeadally, S., Hunt, R.: Virtualization: issues, security threats, and solutions. ACM Comput. Surv. 45(2), 1: 71-1: 739 (2013). doi: 10. 1145/2431211. 2431216.
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.2
, pp. 71-739
-
-
Pearce, M.1
Zeadally, S.2
Hunt, R.3
-
211
-
-
84863498411
-
Privacy, security and trust in cloud computing
-
In: Pearson, S., Yee, G. (eds.), Springer London, doi: 10. 1007/978-1-4471-4189-1_1
-
Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing, pp. 3-42. Springer London (2013). doi: 10. 1007/978-1-4471-4189-1_1.
-
(2013)
Privacy and Security for Cloud Computing
, pp. 3-42
-
-
Pearson, S.1
-
212
-
-
84878474065
-
Characterizing hypervisor vulnerabilities in cloud computing servers
-
ACM, New York, NY, USA, doi: 10. 1145/2484402. 2484406
-
Perez-Botero, D., Szefer, J., Lee, R. B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing (SCC), pp. 3-10. ACM, New York, NY, USA (2013). doi: 10. 1145/2484402. 2484406.
-
(2013)
Proceedings of the 2013 International Workshop on Security in Cloud Computing (SCC)
, pp. 3-10
-
-
Perez-Botero, D.1
Szefer, J.2
Lee, R.B.3
-
213
-
-
79952908072
-
Extending networking into the virtualization layer
-
ACM SIGCOMM
-
Pfaff, B., Pettit, J., Koponen, T., Amidon, K., Casado, M., Shenker, S.: Extending networking into the virtualization layer. In: Proceedings of the 8th ACM Workshop on Hot Topics in Networks. ACM SIGCOMM (2009).
-
(2009)
Proceedings of the 8th ACM Workshop on Hot Topics in Networks
-
-
Pfaff, B.1
Pettit, J.2
Koponen, T.3
Amidon, K.4
Casado, M.5
Shenker, S.6
-
214
-
-
78650070096
-
Splitting the HTTPS stream to attack secure web connections
-
doi:10.1109/MSP.2010.190
-
Prandini, M., Ramilli, M., Cerroni, W., Callegati, F.: Splitting the HTTPS stream to attack secure web connections. IEEE Secur. Priv. 8(6), 80-84 (2010). doi: 10. 1109/MSP. 2010. 190.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 80-84
-
-
Prandini, M.1
Ramilli, M.2
Cerroni, W.3
Callegati, F.4
-
215
-
-
84896479097
-
The DDoS That Almost Broke the Internet
-
Prince, M.: The DDoS That Almost Broke the Internet. CloudFlare (2013).
-
(2013)
CloudFlare
-
-
Prince, M.1
-
216
-
-
84896447042
-
The DDoS That Knocked Spamhaus Offline (And How We Mitigated It)
-
Prince, M.: The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). CloudFlare (2013).
-
(2013)
CloudFlare
-
-
Prince, M.1
-
217
-
-
84897077080
-
-
Prolexic: Prolexic Quarterly Global DDoS Attack Report Q1 2013, Accessed Apr. 2013
-
Prolexic: Prolexic Quarterly Global DDoS Attack Report Q1 2013. https://www. prolexic. com/knowledge-center-ddos-attack-report-2013-q1. html (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
218
-
-
77954319839
-
Towards secure SOAP message exchange in a SOA
-
ACM, New York, NY, USA, doi: 10. 1145/1180367. 1180382
-
Rahaman, M. A., Schaad, A., Rits, M.: Towards secure SOAP message exchange in a SOA. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, pp. 77-84. ACM, New York, NY, USA (2006). doi: 10. 1145/1180367. 1180382.
-
(2006)
Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 77-84
-
-
Rahaman, M.A.1
Schaad, A.2
Rits, M.3
-
219
-
-
78349299500
-
The management of security in cloud computing
-
IEEE, doi: 10. 1109/ISSA. 2010. 5588290
-
Ramgovind, S., Eloff, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, pp. 1-7. IEEE (2010). doi: 10. 1109/ISSA. 2010. 5588290.
-
(2010)
Information Security for South Africa
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.2
Smith, E.3
-
221
-
-
84869066354
-
Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures
-
ACM, Ruse, Bulgaria, doi: 10. 1145/2383276. 2383314
-
Rauti, S., Leppänen, V.: Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures. In: Proceedings of the 13th International Conference on Computer Systems and Technologies (CompSysTech), pp. 251-258. ACM, Ruse, Bulgaria (2012) doi: 10. 1145/2383276. 2383314.
-
(2012)
Proceedings of the 13th International Conference on Computer Systems and Technologies (CompSysTech)
, pp. 251-258
-
-
Rauti, S.1
Leppänen, V.2
-
222
-
-
84897046358
-
-
RedHat: KVM Website, Accessed Jun. 2013
-
RedHat: KVM Website. http://www. linux-kvm. org/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
223
-
-
84897050427
-
-
RepoCERT: Botnet Using Plesk Vulnerability and Takedown. Seclists Website
-
RepoCERT: Botnet Using Plesk Vulnerability and Takedown. Seclists Website (2013).
-
(2013)
-
-
-
224
-
-
79952440250
-
Architectural requirements for cloud computing systems: an enterprise cloud approach
-
doi:10.1007/s10723-010-9171-y
-
Rimal, B. P., Jukan, A., Katsaros, D., Goeleven, Y.: Architectural requirements for cloud computing systems: an enterprise cloud approach. J. Grid Comput. 9(1), 3-26 (2011). doi: 10. 1007/s10723-010-9171-y.
-
(2011)
J. Grid Comput.
, vol.9
, Issue.1
, pp. 3-26
-
-
Rimal, B.P.1
Jukan, A.2
Katsaros, D.3
Goeleven, Y.4
-
225
-
-
84897090276
-
-
Ripe, NCC: Database Query, Accessed Apr. 2013
-
Ripe, NCC: Database Query. http://apps. db. ripe. net/search/query. html (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
226
-
-
84867718176
-
Large-scale coordinated attacks: impact on the cloud security
-
IEEE, doi: 10. 1109/IMIS. 2012. 76
-
Riquet, D., Grimaud, G., Hauspie, M.: Large-scale coordinated attacks: impact on the cloud security. In: 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 558-563. IEEE (2012). doi: 10. 1109/IMIS. 2012. 76.
-
(2012)
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
, pp. 558-563
-
-
Riquet, D.1
Grimaud, G.2
Hauspie, M.3
-
227
-
-
74049152260
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
-
ACM, New York, NY, USA
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212. ACM, New York, NY, USA (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
228
-
-
85175129914
-
When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography
-
The Internet Society, San Diego, CA, USA
-
Ristenpart, T., Yilek, S.: When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: Proceedings of Network and Distributed Security Symposium (NDSS), pp. 1-18. The Internet Society, San Diego, CA, USA (2010).
-
(2010)
Proceedings of Network and Distributed Security Symposium (NDSS)
, pp. 1-18
-
-
Ristenpart, T.1
Yilek, S.2
-
229
-
-
81455143616
-
Who can you trust in the cloud?: a review of security issues within cloud computing
-
ACM, New York, NY, USA, doi: 10. 1145/2047456. 2047458
-
Roberts II, J. C., Al-Hamdani, W.: Who can you trust in the cloud?: a review of security issues within cloud computing. In: Proceedings of the Information Security Curriculum Development Conference, pp. 15-19. ACM, New York, NY, USA (2011). doi: 10. 1145/2047456. 2047458.
-
(2011)
Proceedings of the Information Security Curriculum Development Conference
, pp. 15-19
-
-
Roberts II, J.C.1
Al-Hamdani, W.2
-
230
-
-
80052864529
-
The final Frontier: confidentiality and privacy in the cloud
-
doi:10.1109/MC.2011.223
-
Rocha, F., Abreu, S., Correia, M.: The final Frontier: confidentiality and privacy in the cloud. Computer 44(9), 44-50 (2011). doi: 10. 1109/MC. 2011. 223.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 44-50
-
-
Rocha, F.1
Abreu, S.2
Correia, M.3
-
232
-
-
84855993467
-
Building safe PaaS clouds: a survey on security in multitenant software platforms
-
doi:10.1016/j.cose.2011.10.006
-
Rodero-Merino, L., Vaquero, L. M., Caron, E., Desprez, F., Muresan, A.: Building safe PaaS clouds: a survey on security in multitenant software platforms. Comput. Secur. 31(1), 96-108 (2012). doi: 10. 1016/j. cose. 2011. 10. 006.
-
(2012)
Comput. Secur.
, vol.31
, Issue.1
, pp. 96-108
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Caron, E.3
Desprez, F.4
Muresan, A.5
-
233
-
-
84874108116
-
Beyond lightning: a survey on security challenges in cloud computing
-
doi: 10. 1016/j. compeleceng. 2012. 04. 015 Available online 19 May 2012
-
Rong, C., Nguyen, S. T., Jaatun, M. G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. (2012). doi: 10. 1016/j. compeleceng. 2012. 04. 015 Available online 19 May 2012.
-
(2012)
Comput. Electr. Eng.
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
234
-
-
85015649873
-
Airavat: security and privacy for MapReduce
-
USENIX Association, Berkeley, CA, USA
-
Roy, I., Setty, S. T. V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, pp. 20-20. USENIX Association, Berkeley, CA, USA (2010).
-
(2010)
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation
, pp. 20
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
235
-
-
84897038179
-
-
RSA: RSA SecurID Website, Accessed Jun. 2013
-
RSA: RSA SecurID Website. http://sweden. emc. com/security/rsa-securid. htm (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
236
-
-
84897035633
-
-
RSA FirstWatch: Tales from the Darkside: Another Mule Recruitment Site
-
RSA FirstWatch: Tales from the Darkside: Another Mule Recruitment Site. RSA Blog (2013).
-
(2013)
RSA Blog
-
-
-
237
-
-
84897071688
-
Subverting VistaTM Kernel for fun and profit
-
Rutkowska, J.: Subverting VistaTM Kernel for fun and profit. Black Hat Conv. (2008).
-
(2008)
Black Hat Conv
-
-
Rutkowska, J.1
-
239
-
-
80054028420
-
Cluster, grid and cloud computing: a detailed comparison
-
IEEE, doi: 10. 1109/ICCSE. 2011. 6028683
-
Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: 6th International Conference on Computer Science Education, pp. 477-482. IEEE (2011). doi: 10. 1109/ICCSE. 2011. 6028683.
-
(2011)
6th International Conference on Computer Science Education
, pp. 477-482
-
-
Sadashiv, N.1
Kumar, S.2
-
240
-
-
84873369523
-
Using cloud computing to implement a security overlay network
-
doi:10.1109/MSP.2012.88
-
Salah, K., Alcaraz, Calero J.: Using cloud computing to implement a security overlay network. IEEE Secur. Priv. 11(1), 44-53 (2013). doi: 10. 1109/MSP. 2012. 88.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 44-53
-
-
Salah, K.1
Alcaraz, C.J.2
-
241
-
-
84897054872
-
-
SAML v2. 0: OASIS Website, Accessed Apr. 2013
-
SAML v2. 0: OASIS Website. https://www. oasis-open. org/standards#samlv2. 0 (2005). Accessed Apr. 2013.
-
(2005)
-
-
-
242
-
-
84929445167
-
Towards trusted cloud computing
-
USENIX Association, Berkeley, CA, USA
-
Santos, N., Gummadi, K. P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the Conference on Hot Topics in Cloud Computing. USENIX Association, Berkeley, CA, USA (2009).
-
(2009)
Proceedings of the Conference on Hot Topics in Cloud Computing
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
243
-
-
84897090588
-
Vaccinating Systems Against VM-aware Malware
-
Schloesser, M., Guarnieri, C.: Vaccinating Systems Against VM-aware Malware. Rapid7 Labs (2013).
-
(2013)
Rapid7 Labs
-
-
Schloesser, M.1
Guarnieri, C.2
-
246
-
-
84897075780
-
-
SecurityFocus: Xen CVE-2013-1920 Local Memory Corruption Vulnerability
-
SecurityFocus: Xen CVE-2013-1920 Local Memory Corruption Vulnerability. SecurityFocus (2013).
-
(2013)
SecurityFocus
-
-
-
247
-
-
80955143538
-
Verifiable resource accounting for cloud computing services
-
ACM, New York, NY, USA. doi: 10. 1145/2046660. 2046666
-
Sekar, V., Maniatis, P.: Verifiable resource accounting for cloud computing services. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 21-26. ACM, New York, NY, USA (2011). doi: 10. 1145/2046660. 2046666.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security
, pp. 21-26
-
-
Sekar, V.1
Maniatis, P.2
-
248
-
-
80053414558
-
Cloud computing security-trends and research directions
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/SERVICES. 2011. 20
-
Sengupta, S., Kaulgud, V., Sharma, V.: Cloud computing security-trends and research directions. In: IEEE World Congress on Services, pp. 524-531. IEEE Computer Society, Washington, DC, USA (2011). doi: 10. 1109/SERVICES. 2011. 20.
-
(2011)
IEEE World Congress on Services
, pp. 524-531
-
-
Sengupta, S.1
Kaulgud, V.2
Sharma, V.3
-
249
-
-
84874562245
-
CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?)
-
Austin, TX, USA, doi: 10. 1109/ICNP. 2012. 6459946
-
Shin, S., Gu, G.: CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?). In: 20th IEEE International Conference on Network Protocols (ICNP), pp. 1-6. Austin, TX, USA (2012). doi: 10. 1109/ICNP. 2012. 6459946.
-
(2012)
20th IEEE International Conference on Network Protocols (ICNP)
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
250
-
-
84897040416
-
Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems
-
Shinotsuka, H.: Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems. Symantec Blog (2012).
-
(2012)
Symantec Blog
-
-
Shinotsuka, H.1
-
251
-
-
84897092598
-
Don't Click the Left Mouse Button: Introducing Trojan UpClicker
-
Singh, A.: Don't Click the Left Mouse Button: Introducing Trojan UpClicker. FireEye Blog (2012).
-
(2012)
FireEye Blog
-
-
Singh, A.1
-
252
-
-
68749093007
-
Security in a virtualised world
-
doi:10.1016/S1353-4858(09)70077-7
-
Sloan, K.: Security in a virtualised world. Netw. Secur. 2009(8), 15-18 (2009). doi: 10. 1016/S1353-4858(09)70077-7.
-
(2009)
Netw. Secur.
, vol.2009
, Issue.8
, pp. 15-18
-
-
Sloan, K.1
-
253
-
-
84897031157
-
-
SNIA: Cloud Data Management Interface (CDMI), Accessed Apr. 2013
-
SNIA: Cloud Data Management Interface (CDMI). http://www. snia. org/cdmi (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
254
-
-
84915774545
-
On breaking SAML: be whoever you want to be
-
USENIX Association, Bellevue, WA, USA
-
Somorovsky, J., Mayer, A., Schwenk, J., Kampmann, M., Jensen, M.: On breaking SAML: be whoever you want to be. In: Proceedings of the 21st USENIX Security Symposium, pp. 21-21. USENIX Association, Bellevue, WA, USA (2012).
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 21
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
255
-
-
80053421848
-
Cloud computing and its key techniques
-
IEEE, doi: 10. 1109/EMEIT. 2011. 6022935
-
Songjie, Yao, J., Wu, C.: Cloud computing and its key techniques. In: International Conference on Electronic and Mechanical Engineering and Information Technology, vol. 1, pp. 320-324. IEEE (2011). doi: 10. 1109/EMEIT. 2011. 6022935.
-
(2011)
International Conference on Electronic and Mechanical Engineering and Information Technology
, vol.1
, pp. 320-324
-
-
Songjie1
Yao, J.2
Wu, C.3
-
256
-
-
84873369793
-
Targeted cyberattacks: a superset of advanced persistent threats
-
doi:10.1109/MSP.2012.90
-
Sood, A., Enbody, R.: Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur. Priv. 11(1), 54-61 (2013). doi: 10. 1109/MSP. 2012. 90.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 54-61
-
-
Sood, A.1
Enbody, R.2
-
257
-
-
84867509247
-
A combined approach to ensure data security in cloud computing
-
doi:10.1016/j.jnca.2012.07.007
-
Sood, S. K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appli. 35(6), 1831-1838 (2012). doi: 10. 1016/j. jnca. 2012. 07. 007.
-
(2012)
J. Netw. Comput. Appli.
, vol.35
, Issue.6
, pp. 1831-1838
-
-
Sood, S.K.1
-
258
-
-
84897043485
-
-
Spoon Website: Browser Sandbox, Accessed Apr. 2013
-
Spoon Website: Browser Sandbox. http://spoon. net/browsers (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
260
-
-
85003807409
-
2013: Cloud Predictions: We'll Finally Get Real About Cloud
-
Staten, J.: 2013 Cloud Predictions: We'll Finally Get Real About Cloud. Forrester Blog (2012).
-
(2012)
Forrester Blog
-
-
Staten, J.1
-
261
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
doi:10.1016/j.jnca.2010.07.006
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appli. 34(1), 1-11 (2011). doi: 10. 1016/j. jnca. 2010. 07. 006.
-
(2011)
J. Netw. Comput. Appli.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
262
-
-
84055200868
-
Surveying and analyzing security, privacy and trust issues in cloud computing environments
-
doi:10.1016/j.proeng.2011.08.537
-
Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852-2856 (2011). doi: 10. 1016/j. proeng. 2011. 08. 537.
-
(2011)
Procedia Eng.
, vol.15
, pp. 2852-2856
-
-
Sun, D.1
Chang, G.2
Sun, L.3
Wang, X.4
-
263
-
-
34248378734
-
Sizing multi-space in heap for application isolation
-
ACM, Portland, OR, USA doi: 10. 1145/1176617. 1176654
-
Sun, K., Li, Y., Hogstrom, M., Chen, Y.: Sizing multi-space in heap for application isolation. In: Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), pp. 647-648. ACM, Portland, OR, USA (2006). doi: 10. 1145/1176617. 1176654.
-
(2006)
Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)
, pp. 647-648
-
-
Sun, K.1
Li, Y.2
Hogstrom, M.3
Chen, Y.4
-
264
-
-
84863066873
-
Malware virtualization-resistant behavior detection
-
Tainan, Taiwan, doi: 10. 1109/ICPADS. 2011. 78
-
Sun, M. K., Lin, M. J., Chang, M., Laih, C. S., Lin, H. T.: Malware virtualization-resistant behavior detection. In: IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), pp. 912-917. Tainan, Taiwan (2011). doi: 10. 1109/ICPADS. 2011. 78.
-
(2011)
IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS)
, pp. 912-917
-
-
Sun, M.K.1
Lin, M.J.2
Chang, M.3
Laih, C.S.4
Lin, H.T.5
-
265
-
-
79957840719
-
Memory deduplication as a threat to the guest OS
-
ACM, Salzburg, Austria, doi: 10. 1145/1972551. 1972552
-
Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: Proceedings of the 4th European Workshop on System Security, pp. 1: 1-1: 6. ACM, Salzburg, Austria (2011). doi: 10. 1145/1972551. 1972552.
-
(2011)
Proceedings of the 4th European Workshop on System Security
, pp. 1-6
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
266
-
-
84906749335
-
Software side channel attack on memory deduplication
-
ACM, Cascais, Portugal, Poster
-
Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Software side channel attack on memory deduplication. In: 23rd ACM Symposium on Operating Systems Principles. ACM, Cascais, Portugal (2011). Poster.
-
(2011)
23rd ACM Symposium on Operating Systems Principles
-
-
Suzaki, K.1
Iijima, K.2
Yagi, T.3
Artho, C.4
-
267
-
-
84897079375
-
-
Symantec: Internet Security Threat Report 2013 Accessed Apr. 2013
-
Symantec: Internet Security Threat Report 2013. https://www. symantec. com/security_response/publications/threatreport. jsp (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
268
-
-
84897105196
-
-
Symantec Security Response: Internet Explorer Zero-Day Used in Watering Hole Attack: Q &A
-
Symantec Security Response: Internet Explorer Zero-Day Used in Watering Hole Attack: Q &A. Symantec Blog (2012).
-
(2012)
Symantec Blog
-
-
-
269
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
ACM, Chicago, IL, USA, doi: 10. 1145/2046707. 2046754
-
Szefer, J., Keller, E., Lee, R. B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 401-412. ACM, Chicago, IL, USA (2011). doi: 10. 1145/2046707. 2046754.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
270
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24-31 (2010).
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
271
-
-
84868594088
-
Dynamic virtual switch protocol using Openflow
-
Kyoto, Japan, doi: 10. 1109/SNPD. 2012. 129
-
Tang, M., Lv, Q., Lu, Z., Zhao, Q., Song, Y.: Dynamic virtual switch protocol using Openflow. In: 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD), pp. 603-608. Kyoto, Japan (2012). doi: 10. 1109/SNPD. 2012. 129.
-
(2012)
13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD)
, pp. 603-608
-
-
Tang, M.1
Lv, Q.2
Lu, Z.3
Zhao, Q.4
Song, Y.5
-
273
-
-
80052190504
-
Digital randomness
-
doi:10.1109/MSPEC.2011.5995897
-
Taylor, G., Cox, G.: Digital randomness. IEEE Spectr. 48(9), 32-58 (2011). doi: 10. 1109/MSPEC. 2011. 5995897.
-
(2011)
IEEE Spectr.
, vol.48
, Issue.9
, pp. 32-58
-
-
Taylor, G.1
Cox, G.2
-
274
-
-
79954589576
-
Forensic investigation of cloud computing systems
-
doi:10.1016/S1353-4858(11)70024-1
-
Taylor, M., Haggerty, J., Gresty, D., Lamb, D.: Forensic investigation of cloud computing systems. Netw. Secur. 2011(3), 4-10 (2011). doi: 10. 1016/S1353-4858(11)70024-1.
-
(2011)
Netw. Secur.
, vol.2011
, Issue.3
, pp. 4-10
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Lamb, D.4
-
275
-
-
84897063806
-
-
The Linux Foundation: Xen Website, Accessed Jun. 2013
-
The Linux Foundation: Xen Website. http://http://www. xenproject. org/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
276
-
-
84873390405
-
The human element of information security
-
doi:10.1109/MSP.2012.161
-
Thompson, H.: The human element of information security. IEEE Secur. Priv. 11(1), 32-35 (2013). doi: 10. 1109/MSP. 2012. 161.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 32-35
-
-
Thompson, H.1
-
277
-
-
84897055770
-
-
Accessed May 2013
-
Thorsheim, P.: The Final Word on the LinkedIn Leak. http://securitynirvana. blogspot. pt/2012/06/final-word-on-linkedin-leak. html (2012). Accessed May 2013.
-
(2012)
The Final Word on the LinkedIn Leak
-
-
Thorsheim, P.1
-
278
-
-
84876129185
-
Analysis of Google logs retention policies
-
Toubiana, V., Nissenbaum, H.: Analysis of Google logs retention policies. J. Priv. Confid. 3(1), 3-26 (2011).
-
(2011)
J. Priv. Confid.
, vol.3
, Issue.1
, pp. 3-26
-
-
Toubiana, V.1
Nissenbaum, H.2
-
279
-
-
79952498688
-
Managing a security program in a cloud computing environment
-
ACM, New York, NY, USA, doi: 10. 1145/1940976. 1941001
-
Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, pp. 128-133. ACM, New York, NY, USA (2009). doi: 10. 1145/1940976. 1941001.
-
(2009)
Information Security Curriculum Development Conference
, pp. 128-133
-
-
Townsend, M.1
-
280
-
-
84897048420
-
GPU Monster Shreds Password Hashes
-
Trader, T.: GPU Monster Shreds Password Hashes. HPCwire (2012).
-
(2012)
HPCwire
-
-
Trader, T.1
-
281
-
-
81055138877
-
Cloud computing security considerations
-
IEEE, doi: 10. 1109/ICSPCC. 2011. 6061557
-
Tripathi, A., Mishra, A.: Cloud computing security considerations. In: IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5. IEEE (2011). doi: 10. 1109/ICSPCC. 2011. 6061557.
-
(2011)
IEEE International Conference on Signal Processing, Communications and Computing
, pp. 1-5
-
-
Tripathi, A.1
Mishra, A.2
-
282
-
-
84863022550
-
Threat as a service?: virtualization's impact on cloud security
-
doi:10.1109/MITP.2011.117
-
Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R.: Threat as a service?: virtualization's impact on cloud security. IT Prof. 14(1), 32-37 (2012). doi: 10. 1109/MITP. 2011. 117.
-
(2012)
IT Prof.
, vol.14
, Issue.1
, pp. 32-37
-
-
Tsai, H.Y.1
Siebenhaar, M.2
Miede, A.3
Huang, Y.4
Steinmetz, R.5
-
283
-
-
84863046102
-
Network virtualization with cloud virtual switch
-
Tainan, Taiwan, doi: 10. 1109/ICPADS. 2011. 159
-
Tseng, H. M., Lee, H. L., Hu, J. W., Liu, T. L., Chang, J. G., Huang, W. C.: Network virtualization with cloud virtual switch. In: IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), pp. 998-1003. Tainan, Taiwan (2011). doi: 10. 1109/ICPADS. 2011. 159.
-
(2011)
IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS)
, pp. 998-1003
-
-
Tseng, H.M.1
Lee, H.L.2
Hu, J.W.3
Liu, T.L.4
Chang, J.G.5
Huang, W.C.6
-
284
-
-
79751493181
-
Locking the sky: a survey on IaaS cloud security
-
doi:10.1007/s00607-010-0140-x
-
Vaquero, L. M., Rodero-Merino, L., Morán, D.: Locking the sky: a survey on IaaS cloud security. Computing 91(1), 93-118 (2011). doi: 10. 1007/s00607-010-0140-x.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
-
285
-
-
69349098776
-
Cloud computing and the common man
-
doi:10.1109/MC.2009.252
-
Viega, J.: Cloud computing and the common man. Computer 42(8), 106-108 (2009). doi: 10. 1109/MC. 2009. 252.
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 106-108
-
-
Viega, J.1
-
286
-
-
84897067982
-
-
VMware: VMware vSphere, Accessed Apr. 2013
-
VMware: VMware vSphere. https://www. vmware. com/support/product-support/vsphere/ (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
287
-
-
84897092357
-
-
VMware: VMware Website, Accessed Jun. 2013
-
VMware: VMware Website. https://www. vmware. com/products/ (2013). Accessed Jun. 2013.
-
(2013)
-
-
-
288
-
-
84897042908
-
-
Accessed Apr. 2013
-
VMware: What is OVF? https://www. vmware. com/technical-resources/virtualization-topics/virtual-appliances/ovf. html (2013). Accessed Apr. 2013.
-
(2013)
VMware: What is OVF?
-
-
-
289
-
-
84897034695
-
-
VMware Community Forums: Low/proc/sys/kernel/random/entr opy_avail causes exim to stop sending mail, Accessed May 2013
-
VMware Community Forums: Low/proc/sys/kernel/random/entr opy_avail causes exim to stop sending mail. http://communities. vmware. com/message/530909 (2006). Accessed May 2013.
-
(2006)
-
-
-
290
-
-
84860761329
-
DEMODS: a description model for data-as-a-service
-
Fukuoka, Japan doi: 10. 1109/AINA. 2012. 91
-
Vu, Q. H., Pham, T. V., Truong, H. L., Dustdar, S., Asal, R.: DEMODS: a description model for data-as-a-service. In: IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), pp. 605-612. Fukuoka, Japan (2012). doi: 10. 1109/AINA. 2012. 91.
-
(2012)
IEEE 26th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 605-612
-
-
Vu, Q.H.1
Pham, T.V.2
Truong, H.L.3
Dustdar, S.4
Asal, R.5
-
291
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
doi:10.1109/MNET.2010.5510914
-
Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19-24 (2010). doi: 10. 1109/MNET. 2010. 5510914.
-
(2010)
IEEE Netw.
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
292
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
IEEE, doi: 10. 1109/IWQoS. 2009. 5201385
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service, pp. 1-9. IEEE (2009). doi: 10. 1109/IWQoS. 2009. 5201385.
-
(2009)
17th International Workshop on Quality of Service
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
293
-
-
77953302052
-
The impact of virtualization on network performance of Amazon EC2 data center
-
Sand Diego, CA, USA, doi: 10. 1109/INFCOM. 2010. 5461931
-
Wang, G., Ng, T.: The impact of virtualization on network performance of Amazon EC2 data center. In: Proceedings of the IEEE INFOCOM, pp. 1-9. Sand Diego, CA, USA (2010). doi: 10. 1109/INFCOM. 2010. 5461931.
-
(2010)
Proceedings of the IEEE INFOCOM
, pp. 1-9
-
-
Wang, G.1
Ng, T.2
-
294
-
-
84897072385
-
Facebook Users Suffer Viral Surge
-
Ward, M.: Facebook Users Suffer Viral Surge. BBC News (2009).
-
(2009)
BBC News
-
-
Ward, M.1
-
295
-
-
84897077914
-
-
Websense: 2013 Threat Report, Accessed Apr. 2013
-
Websense: 2013 Threat Report. https://www. websense. com/content/websense-2013-threat-report. aspx (2013). Accessed Apr. 2013.
-
(2013)
-
-
-
296
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
ACM, New York, NY, USA, doi: 10. 1145/1655008. 1655021
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 91-96. ACM, New York, NY, USA (2009). doi: 10. 1145/1655008. 1655021.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
297
-
-
79952671882
-
Network security for virtual machine in cloud computing
-
Seoul, South Korea, doi: 10. 1109/ICCIT. 2010. 5711022
-
Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18-21. Seoul, South Korea (2010). doi: 10. 1109/ICCIT. 2010. 5711022.
-
(2010)
5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
298
-
-
79952671882
-
Network security for virtual machine in cloud computing
-
IEEE, doi: 10. 1109/ICCIT. 2010. 5711022
-
Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 18-21. IEEE (2010). doi: 10. 1109/ICCIT. 2010. 5711022.
-
(2010)
5th International Conference on Computer Sciences and Convergence Information Technology
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
299
-
-
84897048190
-
Mobile Scam: Winning Without Playing
-
Wueest, C.: Mobile Scam: Winning Without Playing. Symantec Blog (2013).
-
(2013)
Symantec Blog
-
-
Wueest, C.1
-
300
-
-
84877272118
-
Security and privacy in cloud computing
-
doi: 10. 1109/SURV. 2012. 060912. 00182
-
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tuts. 15(2), 843-859 (2013). doi: 10. 1109/SURV. 2012. 060912. 00182.
-
(2013)
IEEE Commun. Surv. Tuts.
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
301
-
-
80955157902
-
An exploration of L2 cache covert channels in virtualized environments
-
ACM, New York, NY, USA, doi: 10. 1145/2046660. 2046670
-
Xu, Y., Bailey, M., Jahanian, F., Joshi, K., Hiltunen, M., Schlichting, R.: An exploration of L2 cache covert channels in virtualized environments. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 29-40. ACM, New York, NY, USA (2011). doi: 10. 1145/2046660. 2046670.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security
, pp. 29-40
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
303
-
-
84873465426
-
Help! Is There a Trustworthy-Systems Doctor in the House?
-
doi:10.1109/MSP.2013.10
-
Yasinsac, A., Irvine, C.: Help! Is There a Trustworthy-Systems Doctor in the House? IEEE Secur. Priv. 11(1), 73-77 (2013). doi: 10. 1109/MSP. 2013. 10.
-
(2013)
IEEE Secur. Priv.
, vol.11
, Issue.1
, pp. 73-77
-
-
Yasinsac, A.1
Irvine, C.2
-
304
-
-
77952062919
-
Resettable public-key encryption: how to encrypt on a virtual machine
-
Springer-Verlag, San Francisco, CA, USA, doi: 10. 1007/978-3-642-11925-5_4
-
Yilek, S.: Resettable public-key encryption: how to encrypt on a virtual machine. In: Proceedings of the International Conference on Topics in Cryptology, CT-RSA'10, pp. 41-56. Springer-Verlag, San Francisco, CA, USA (2010). doi: 10. 1007/978-3-642-11925-5_4.
-
(2010)
Proceedings of the International Conference on Topics in Cryptology, CT-RSA'10
, pp. 41-56
-
-
Yilek, S.1
-
305
-
-
84874473315
-
A partial homomorphic encryption scheme for secure design automation on public clouds
-
Tempe, AZ, USA, doi: 10. 1109/EPEPS. 2012. 6457871
-
Yu, A., Sathanur, A., Jandhyala, V.: A partial homomorphic encryption scheme for secure design automation on public clouds. In: IEEE 21st Conference on Electrical Performance of Electronic Packaging and Systems (EPEPS), pp. 177-180. Tempe, AZ, USA (2012). doi: 10. 1109/EPEPS. 2012. 6457871.
-
(2012)
IEEE 21st Conference on Electrical Performance of Electronic Packaging and Systems (EPEPS)
, pp. 177-180
-
-
Yu, A.1
Sathanur, A.2
Jandhyala, V.3
-
306
-
-
84862675278
-
Cloud computing and security challenges
-
ACM, New York, NY, USA, doi: 10. 1145/2184512. 2184581
-
Yu, H., Powell, N., Stembridge, D., Yuan, X.: Cloud computing and security challenges. In: Proceedings of the 50th Annual Southeast Regional Conference, pp. 298-302. ACM, New York, NY, USA (2012). doi: 10. 1145/2184512. 2184581.
-
(2012)
Proceedings of the 50th Annual Southeast Regional Conference
, pp. 298-302
-
-
Yu, H.1
Powell, N.2
Stembridge, D.3
Yuan, X.4
-
307
-
-
84863098541
-
Malware analysis with multiple features
-
Cambridge, London, doi: 10. 1109/UKSim. 2012. 40
-
Zabidi, M., Maarof, M., Zainal, A.: Malware analysis with multiple features. In: UKSim 14th International Conference on Computer Modelling and Simulation, pp. 231-235. Cambridge, London (2012). doi: 10. 1109/UKSim. 2012. 40.
-
(2012)
UKSim 14th International Conference on Computer Modelling and Simulation
, pp. 231-235
-
-
Zabidi, M.1
Maarof, M.2
Zainal, A.3
-
308
-
-
58049137106
-
PALM: security preserving VM live migration for systems with VMM-enforced protection
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/APTC. 2008. 15
-
Zhang, F., Huang, Y., Wang, H., Chen, H., Zang, B.: PALM: security preserving VM live migration for systems with VMM-enforced protection. In: 3rd Asia-Pacific Trusted Infrastructure Technologies Conference, pp. 9-18. IEEE Computer Society, Washington, DC, USA (2008). doi: 10. 1109/APTC. 2008. 15.
-
(2008)
3rd Asia-Pacific Trusted Infrastructure Technologies Conference
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
309
-
-
84869859962
-
Cross-VM side channels and their use to extract private keys
-
ACM, Raleigh, NC, USA, doi: 10. 1145/2382196. 2382230
-
Zhang, Y., Juels, A., Reiter, M. K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), pp. 305-316. ACM, Raleigh, NC, USA (2012). doi: 10. 1145/2382196. 2382230.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS)
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
-
310
-
-
84880192224
-
Security and privacy in cloud computing: a survey
-
IEEE Computer Society, Washington, DC, USA
-
Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. In: 6th International Conference on Semantics Knowledge and Grid, pp. 105-112. IEEE Computer Society, Washington, DC, USA (2010).
-
(2010)
6th International Conference on Semantics Knowledge and Grid
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
311
-
-
84897094861
-
Separating fact from fiction in cloud computing
-
Zieg, M.: Separating fact from fiction in cloud computing. Data Center J. (2012).
-
(2012)
Data Center J.
-
-
Zieg, M.1
-
312
-
-
79959557055
-
Addressing cloud computing security issues
-
doi:10.1016/j.future.2010.12.006
-
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583-592 (2010). doi: 10. 1016/j. future. 2010. 12. 006.
-
(2010)
Future Gener. Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|