-
2
-
-
84897737369
-
-
[Online]. Available (service)
-
[Online]. Available: http://en.wikipedia.org/wiki/Dropbox (service)
-
-
-
-
3
-
-
70350156792
-
A survey of attacks on web services
-
M. Jensen, N. Gruschka, and R. Herkenḧoner, "A survey of attacks on web services," Computer Science-Research and Development, vol. 24, pp. 185-197, 2009.
-
(2009)
Computer Science-Research and Development
, vol.24
, pp. 185-197
-
-
Jensen, M.1
Gruschka, N.2
Herkenḧoner, R.3
-
4
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
"A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
-
5
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All your clouds are belong to us: security analysis of cloud management interfaces," in ACM CCSW'11, 2011, pp. 3-14.
-
(2011)
ACM CCSW'11
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
6
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
L. Vaquero, L. Rodero-Merino, and D. Moŕan, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Moŕan, D.3
-
7
-
-
80053144966
-
Exploiting cloud utility models for profit and ruin
-
july
-
J. Idziorek and M. Tannian, "Exploiting cloud utility models for profit and ruin," in IEEE CLOUD'11, july 2011, pp. 33-40.
-
(2011)
IEEE CLOUD'11
, pp. 33-40
-
-
Idziorek, J.1
Tannian, M.2
-
8
-
-
84866747256
-
Attribution of fraudulent resource consumption in the cloud
-
J. Idziorek, M. Tannian, and D. Jacobson, "Attribution of fraudulent resource consumption in the cloud," in IEEE CLOUD'12, 2012, pp. 99-106.
-
(2012)
IEEE CLOUD'12
, pp. 99-106
-
-
Idziorek, J.1
Tannian, M.2
Jacobson, D.3
-
9
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E.Weippl., "Dark clouds on the horizon: Using cloud storage as attack vector and online slack space," in USENIX Security, 2011, pp. 5-8.
-
(2011)
USENIX Security
, pp. 5-8
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
10
-
-
80052904180
-
Emfs: Email-based personal cloud storage
-
J. Srinivasan, W. Wei, X. Ma, and T. Yu, "Emfs: Email-based personal cloud storage," in NAS'11, 2011, pp. 248-257.
-
(2011)
NAS'11
, pp. 248-257
-
-
Srinivasan, J.1
Wei, W.2
Ma, X.3
Yu, T.4
-
11
-
-
34547549880
-
Using free web storage for data backup
-
A. Traeger, N. Joukov, J. Sipek, and E. Zadok, "Using free web storage for data backup," in StorageSS'06, 2006, pp. 73-78.
-
(2006)
StorageSS'06
, pp. 73-78
-
-
Traeger, A.1
Joukov, N.2
Sipek, J.3
Zadok, E.4
-
12
-
-
56749181040
-
A seamless and reliable distributed network file system utilizing webspace
-
H.-C. Chao, T.-J. Liu, K.-H. Chen, and C.-R. Dow, "A seamless and reliable distributed network file system utilizing webspace," in WSE'08, 2008, pp. 65-68.
-
(2008)
WSE'08
, pp. 65-68
-
-
Chao, H.-C.1
Liu, T.-J.2
Chen, K.-H.3
Dow, C.-R.4
-
14
-
-
84947273682
-
The sybil attack
-
J. R. Douceur, "The sybil attack," in IPTPS'01, 2002, pp. 251-260.
-
(2002)
IPTPS'01
, pp. 251-260
-
-
Douceur, J.R.1
-
15
-
-
84866769568
-
FRIENDBOX: A hybrid F2F personal storage application
-
R. Gracia-Tinedo, M. Śanchez-Artigas, A. Moreno-Mart́?nez, and P. Garć?a-Ĺopez, "FRIENDBOX: A Hybrid F2F Personal Storage Application," in IEEE CLOUD'12, 2012, pp. 131-138.
-
(2012)
IEEE CLOUD'12
, pp. 131-138
-
-
Gracia-Tinedo, R.1
Śanchez-Artigas, M.2
Moreno-Mart́nez, A.3
Garća-Ĺopez, P.4
-
17
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
-
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, "Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web," in ACM STOC'97, 1997, pp. 654-663.
-
(1997)
ACM STOC'97
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
|