-
1
-
-
84945168954
-
-
(n.d.). Homepage. Retrieved from
-
Alliance for Telecommunications Industry Solutions. (n.d.). Homepage. Retrieved from http://www.atis.org
-
-
-
-
2
-
-
84945168955
-
-
Retrieved from
-
Amazon S3 Availability Event. (2008). Retrieved from http://status.aws.amazon.com/s3-20080720.html
-
(2008)
-
-
-
3
-
-
84945168956
-
-
Retrieved from
-
AOL Apologizes for Release of User Search Data. (2006). Retrieved from news.cnet.com/2010-1030_3-6102793.html
-
(2006)
-
-
-
4
-
-
84938917813
-
Above the clouds: A Berkeley view of cloud computing (Technical Report No. UCB/ EECS-2009-28)
-
Berkeley, CA: University of California at Berkeley. Retrieved from
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., &Konwinsky, A.,Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing (Technical Report No. UCB/ EECS-2009-28). Berkeley, CA: University of California at Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinsky A.Zaharia, M.6
-
5
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Association for Retail Technology Standards (ARTS). (n.d.). Homepage. Retrieved from http://www.nrf-arts.org
-
Homepage
-
-
-
6
-
-
79960751022
-
Draft cloud computing synopsis and recommendations (Special Publication 800-146)
-
US Department of Commerce. Retrieved from
-
Badger, L., Grance, T., Patt-Corner, R., &Voas, J. (2011). Draft cloud computing synopsis and recommendations (Special Publication 800-146). National Institute of Standards and Technology (NIST). US Department of Commerce. Retrieved from http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf
-
(2011)
National Institute of Standards and Technology (NIST)
-
-
Badger, L.1
Grance, T.2
Patt-Corner, R.3
Voas, J.4
-
7
-
-
74049122943
-
Privacy-preserving digital identity management for cloud computing
-
March
-
Bertion, E., Paci, F., &Ferrini, R. (2009, March). Privacy-preserving digital identity management for cloud computing. IEEE Computer Society Data Engineering Bulletin, 1-4.
-
(2009)
IEEE Computer Society Data Engineering Bulletin
, pp. 1-4
-
-
Bertion, E.1
Paci, F.2
Ferrini, R.3
-
9
-
-
61449159887
-
Dynamic trust management
-
Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Smith, J. M., Keromytis, A. D., &Lee, W. (2009). Dynamic trust management. IEEE Computer, 42(2), 44-52. doi:10.1109/MC.2009.51.
-
(2009)
IEEE Computer
, vol.42
, Issue.2
, pp. 44-52
-
-
Blaze, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Smith, J.M.5
Keromytis, A.D.6
Lee, W.7
-
10
-
-
79955145101
-
Cloud computing: Privacy, security challenges
-
Washington, DC: Bureau of National Affairs
-
Bruening, P. J., &Treacy, B. C. (2009). Cloud computing: Privacy, security challenges. Washington, DC: Bureau of National Affairs.
-
(2009)
-
-
Bruening, P.J.1
Treacy, B.C.2
-
11
-
-
78249290665
-
Information security briefing on cloud computing
-
01/2010. Retrieved from
-
Center for the Protection of Natural Infrastructure (CPNI). (2010). Information security briefing on cloud computing, 01/2010. Retrieved from http://www.cpni.gov.uk/Documents/Publications/2010/2010007-ISB_cloud_computing.pdf
-
(2010)
-
-
-
12
-
-
77954327465
-
What's new about cloud computing security
-
(Technical Report UCB/EECS-2010-5). Berkeley, CA: EECS Department, University of California, Berkeley. Retrieved from
-
Chen, Y., Paxson, V., &Katz, R. H. (2010). What's new about cloud computing security? (Technical Report UCB/EECS-2010-5). Berkeley, CA: EECS Department, University of California, Berkeley. Retrieved from http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html
-
(2010)
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
13
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., &Sudan, M. (1998). Private information retrieval. Journal of the ACM, 45(9), 965-981. doi:10.1145/293347.293350.
-
(1998)
Journal of the ACM
, vol.45
, Issue.9
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
14
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chicago, IL: ACM Press. Cloud Security Alliance. (n.d.). Homepage. Retrieved from
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., &Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09), (pp. 85-90). Chicago, IL: ACM Press. Cloud Security Alliance. (n.d.). Homepage. Retrieved from https://cloudsecurityalliance.org
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security (CCSW'09)
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
15
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
Retrieved from
-
Cloud Security Alliance (CSA). (2009). Security guidance for critical areas of focus in cloud computing. CSA. Retrieved from https://cloudsecurityalliance.org/csaguide.pdf
-
(2009)
CSA
-
-
-
16
-
-
84945122154
-
FTC questions cloud computing security
-
Retrieved from
-
CNet. (2009). FTC questions cloud computing security. Retrieved from http://news.cnet.com/8301-13578_3-10198577-38.html?part=rss&subj=news&tag=2547-1_3-0-20
-
(2009)
-
-
-
17
-
-
84872196108
-
-
(n.d.). Retrieved from
-
Cryptographic Key Management Project. (n.d.). Website. Retrieved from http://csrc.nist.gov/ groups/ST/key_mgmt/
-
Website.
-
-
-
18
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Distributed Management Task Force. (n.d.). Homepage. Retrieved from http://www.dmtf.org
-
Homepage
-
-
-
19
-
-
84945168959
-
-
(n.d.). Retrieved from
-
Don't Cloud Your Vision. (n.d.). Retrieved from http://www.ft.com/cms/s/0/303680a6-bf51-11ddae63-0000779fd18c.html?nclick_check=1
-
-
-
-
20
-
-
77955959213
-
Cloud computing: Benefits, risks and recommendations for information security
-
Geneva, Switzerland: ENISA
-
European Network and Information Security Agency (ENISA). (2009). Cloud computing: Benefits, risks and recommendations for information security. Geneva, Switzerland: ENISA.
-
(2009)
-
-
-
21
-
-
84878557064
-
-
(n.d.) . Retrieved from
-
European Telecommunication Standards Institute. (n.d.). Homepage. Retrieved from http://www.etsi.org
-
Homepage
-
-
-
22
-
-
84945168960
-
-
Retrieved from
-
Flexiscale Suffers 18-Hour Outage. (2008). Retrieved from http://www.thewhir.com/webhosting-news/flexiscale-suffers-18-hour-outage
-
(2008)
-
-
-
23
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Forum, T. M. (n.d.). Homepage. Retrieved from http://www.tmforum.org
-
Homepage
-
-
Forum, T.M.1
-
24
-
-
70449469222
-
Analysis of signature wrapping attacks and countermeasures
-
Los Angeles, CA: IEEE
-
Gajek, S., Jensen, M., Liao, L., &Schwenk, J. (2009). Analysis of signature wrapping attacks and countermeasures. In Proceedings of the IEEE International Conference on Web Services, (pp. 575-582). Los Angeles, CA: IEEE.
-
(2009)
Proceedings of the IEEE International Conference on Web Services
, pp. 575-582
-
-
Gajek, S.1
Jensen, M.2
Liao, L.3
Schwenk, J.4
-
25
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
Garfinkel, S., &Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy, 1(1), 17-27. doi:10.1109/MSECP.2003.1176992.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
26
-
-
84945124925
-
Cloud computing and big data
-
Retrieved from
-
Gartner Hype-Cycle. (2012). Cloud computing and big data. Retrieved from http://www.gartner.com/technology/research/hype-cycles/
-
(2012)
-
-
-
29
-
-
84945168961
-
-
(n.d.). Retrieved from
-
IBM Blue Cloud Initiative Advances Enterprise Cloud Computing. (n.d.). Retrieved from http://www-03.ibm.com/press/us/en/pressrelease/26642.wss
-
-
-
-
30
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Institute of Electrical and Electronics Engineers (IEEE). (n.d.). Homepage. Retrieved from http://www.ieee.org
-
Homepage
-
-
-
31
-
-
84878557064
-
-
(n.d.). Retrieved form
-
International Telecommunication Union - Telecommunication Standardization Sector (ITU-T). (n.d.). Homepage. Retrieved form http://www.itu.int/ITU-T
-
Homepage
-
-
-
32
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Internet Engineering Task Force. (n.d.). Homepage. Retrieved from http://www.ietf.org
-
Homepage
-
-
-
33
-
-
11044223672
-
Access control language for multidomain environments
-
Joshi, J. B. D., Bhatti, R., Bertino, E., &Ghafoor, A. (2004). Access control language for multidomain environments. IEEE Internet Computing, 8(6), 40-50. doi:10.1109/MIC.2004.53.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
34
-
-
70449553983
-
Privacyenhanced user-centric identity management
-
Dresden, Germany: IEEE
-
Ko, M., Ahn, G.-J., &Shehab, M. (2009). Privacyenhanced user-centric identity management. In Proceedings of IEEE International Conference on Communications, (pp. 998-1002). Dresden, Germany: IEEE.
-
(2009)
Proceedings of IEEE International Conference on Communications
, pp. 998-1002
-
-
Ko, M.1
Ahn, G.-J.2
Shehab, M.3
-
35
-
-
84945168962
-
-
(n.d.). Retrieved from
-
Latest Cloud Storage Hiccups Prompts Data Security Questions. (n.d.). Retrieved from http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130682&source=NLT_PM
-
-
-
-
36
-
-
59849089966
-
Is cloud computing really ready for prime time?
-
Leavitt, N. (2009). Is cloud computing really ready for prime time? IEEE Computer, 42(1), 15-20. doi:10.1109/MC.2009.20.
-
(2009)
IEEE Computer
, vol.42
, Issue.1
, pp. 15-20
-
-
Leavitt, N.1
-
37
-
-
84945168963
-
Akamai and cloud computing: A perspective from the edge of the cloud (White Paper)
-
Retrieved from
-
Leighon, T. (2009). Akamai and cloud computing: A perspective from the edge of the cloud (White Paper). Akamai Technologies. Retrieved from http://www.essextec.com/assets/cloud/akamai/cloud-computing-perspective-wp.pdf
-
(2009)
Akamai Technologies
-
-
Leighon, T.1
-
38
-
-
84945168964
-
Lessons from Twitter's security breach
-
Retrieved from
-
Lowensohn, J., &McCarthy, C. (2009). Lessons from Twitter's security breach. Retrieved from http://news.cnet.com/8301-17939_109-10287558-2.html
-
(2009)
-
-
Lowensohn, J.1
McCarthy, C.2
-
39
-
-
84857150602
-
Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud
-
Retrieved from
-
Molnar, D., &Schechter, S. (2010). Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In Proceedings of the Workshop on the Economics of Information Security. Retrieved from http://weis2010.econinfosec.org/papers/session5/weis2010_schechter.pdf
-
(2010)
Proceedings of the Workshop on the Economics of Information Security
-
-
Molnar, D.1
Schechter, S.2
-
40
-
-
84945168965
-
-
(n.d.). Retrieved from
-
Netflix Prize. (n.d.). Retrieved from http://www.netflixprize.com/
-
-
-
-
41
-
-
77953615126
-
Loss of customer data spurs closure of online storage service the linkup
-
Retrieved from
-
Network World. (2008). Loss of customer data spurs closure of online storage service the linkup. Retrieved from http://www.networkworld.com/news/2008/081108-linkup-failure.html?page=1
-
(2008)
-
-
-
42
-
-
84945124056
-
Facebook users suffer viral surge
-
Retrieved from
-
News, B. B. C. (2009). Facebook users suffer viral surge. Retrieved from http://news.bbc.co.uk/2/hi/technology/7918839.stm
-
(2009)
-
-
News, B.B.C.1
-
43
-
-
84945168966
-
-
(n.d.). Homepage. Retrieved from
-
Object Management Group. (n.d.). Homepage. Retrieved from http://www.omg.org
-
-
-
-
44
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Open Cloud Computing Interface. (n.d.). Homepage. Retrieved from http://occi-wg.org
-
Homepage
-
-
-
45
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Open Cloud Consortium. (n.d.). Homepage. Retrieved from http://opencloudconsortium.org
-
Homepage
-
-
-
46
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Organization for the Advancement of Structured Information Standards. (n.d.). Homepage. Retrieved from http://www.oasis-open.org
-
Homepage
-
-
-
47
-
-
84945133055
-
Lithuania weathers cyber attack, braces for round 2
-
Retrieved from
-
Post, W. (2008). Lithuania weathers cyber attack, braces for round 2. Retrieved from http://blog.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html
-
(2008)
-
-
Post, W.1
-
48
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago: ACM Press
-
Ristenpart, T., Tromer, E., Shacham, H., &Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), (pp. 199-212). Chicago: ACM Press.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
49
-
-
84945126552
-
Vulnerability in virtual PC and virtual server could allow elevation of privilege (937986)
-
MS07-049, Retrieved from
-
Security Bulletin, M. MS07-049. (2007). Vulnerability in virtual PC and virtual server could allow elevation of privilege (937986). Retrieved from http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx
-
(2007)
-
-
Security Bulletin, M.1
-
50
-
-
84945168967
-
-
(n.d.). Retrieved from
-
Security Evaluation of Grid Environments. (n.d.). Retrieved from http://www.slideworld.com/slideshows.aspx/Security-Evaluation-of-Grid-Environments-ppt-217556
-
-
-
-
54
-
-
84886248505
-
A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network
-
Sen, J. (2010d). A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network. International Journal of Network Security and its Applications, 2(4), 92-104.
-
(2010)
International Journal of Network Security and its Applications
, vol.2
, Issue.4
, pp. 92-104
-
-
Sen, J.1
-
57
-
-
85138406381
-
Reputation- and trust-based systems for wireless self-organizing networks
-
Boca Raton, FL: CRC Press
-
Sen, J. (2010g). Reputation- and trust-based systems for wireless self-organizing networks. In Security of Self-Organizing Networks: MANET, WSN, WMN, VANET (pp. 91-122). Boca Raton, FL: CRC Press. doi:10.1201/EBK1439819197-7.
-
(2010)
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
, pp. 91-122
-
-
Sen, J.1
-
58
-
-
84887904351
-
A robust mechanism for defending distributed denial of service attacks on web servers
-
Sen, J. (2011a). A robust mechanism for defending distributed denial of service attacks on web servers. International Journal of Network Security and its Applications, 3(2), 162-179.
-
(2011)
International Journal of Network Security and its Applications
, vol.3
, Issue.2
, pp. 162-179
-
-
Sen, J.1
-
61
-
-
46749135273
-
A distributed trust mechanism for mobile ad hoc networks
-
Surathkal, India: ISAHUC
-
Sen, J., Chowdhury, P. R., &Sengupta, I. (2006c). A distributed trust mechanism for mobile ad hoc networks. In Proceedings of the International Symposium on Ad Hoc and Ubiquitous Computing (ISAHUC'06), (pp. 62-67). Surathkal, India: ISAHUC.
-
(2006)
Proceedings of the International Symposium on Ad Hoc and Ubiquitous Computing (ISAHUC'06)
, pp. 62-67
-
-
Sen, J.1
Chowdhury, P.R.2
Sengupta, I.3
-
62
-
-
34547245538
-
A distributed trust establishment scheme for mobile ad hoc networks
-
Kolkata, India: ICCTA
-
Sen, J., Chowdhury, P. R., &Sengupta, I. (2007). A distributed trust establishment scheme for mobile ad hoc networks. In Proceedings of the International Conference on Computation: Theory and Applications (ICCTA'07), (pp. 51-57). Kolkata, India: ICCTA.
-
(2007)
Proceedings of the International Conference on Computation: Theory and Applications (ICCTA'07)
, pp. 51-57
-
-
Sen, J.1
Chowdhury, P.R.2
Sengupta, I.3
-
63
-
-
33744936850
-
Autonomous agentbased distributed fault-tolerant intrusion detection syste
-
Bhubaneswar, India: Springer
-
Sen, J., &Sengupta, I. (2005). Autonomous agentbased distributed fault-tolerant intrusion detection system. In Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT'05) (LNCS), (vol. 3186, pp. 125-131). Bhubaneswar, India: Springer.
-
(2005)
In Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT'05) (LNCS), (vol.
, vol.3186
, pp. 125-131
-
-
Sen, J.1
Sengupta, I.2
-
64
-
-
84885237757
-
A mechanism for detection and prevention of distributed denial of service attack
-
Berlin: Springer
-
Sen, J., Sengupta, I., &Chowdhury, P. R. (2006a). A mechanism for detection and prevention of distributed denial of service attacks. In Proceedings of the 8th International Conference on Distributed Computing and Networking (ICDCN'06) (LNCS), (vol. 4308, pp. 139-144). Berlin: Springer.
-
(2006)
In Proceedings of the 8th International Conference on Distributed Computing and Networking (ICDCN'06) (LNCS), (vol.
, vol.4308
, pp. 139-144
-
-
Sen, J.1
Sengupta, I.2
Chowdhury, P.R.3
-
65
-
-
71249124937
-
An architecture of a distributed intrusion detection system using cooperating agents
-
Kuala Lumpur, Malaysia: ICOCI
-
Sen, J., Sengupta, I., &Chowdhury, P. R. (2006b). An architecture of a distributed intrusion detection system using cooperating agents. In Proceedings of the International Conference on Computing and Informatics (ICOCI'06), (pp. 1-6). Kuala Lumpur, Malaysia: ICOCI.
-
(2006)
Proceedings of the International Conference on Computing and Informatics (ICOCI'06)
, pp. 1-6
-
-
Sen, J.1
Sengupta, I.2
Chowdhury, P.R.3
-
66
-
-
66649104864
-
A distributed intrusion detection system for wireless ad hoc networks
-
New Delhi, India: IEEE
-
Sen, J., Ukil, A., Bera, D., &Pal, A. (2008). A distributed intrusion detection system for wireless ad hoc networks. In Proceedings of the 16th IEEE International Conference on Networking (ICON'08), (pp. 1-5). New Delhi, India: IEEE.
-
(2008)
Proceedings of the 16th IEEE International Conference on Networking (ICON'08)
, pp. 1-5
-
-
Sen, J.1
Ukil, A.2
Bera, D.3
Pal, A.4
-
67
-
-
58349118819
-
Compact proofs of retrievabilit
-
Melbourne, Australia: Springer
-
Shacham, H., &Waters, B. (2008). Compact proofs of retrievability. In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: (ASIACRYPT'08) (LNCS), (vol. 5350, pp. 90-107). Melbourne, Australia: Springer.
-
(2008)
In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: (ASIACRYPT'08) (LNCS), (vol.
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
68
-
-
31544451249
-
Role-based privilege and trust management
-
Shin, D., &Ahn, G.-J. (2005). Role-based privilege and trust management. Computer Systems Science and Engineering Journal, 20(6), 401-410.
-
(2005)
Computer Systems Science and Engineering Journal
, vol.20
, Issue.6
, pp. 401-410
-
-
Shin, D.1
Ahn, G.-J.2
-
69
-
-
84875548700
-
Preventive directions for insider threat mitigation using access control
-
Stolfo, S., Bellovin, S. M., Hershkop, S., Keromytis, A. D., Sinclair, S., &Smith, W. (Eds.), London: Springer
-
Sinclair, S., &Smith, S. W. (2008). Preventive directions for insider threat mitigation using access control. In Stolfo, S., Bellovin, S. M., Hershkop, S., Keromytis, A. D., Sinclair, S., &Smith, W. (Eds.), Insider Attack and Cyber Security: Beyond the Hacker. London: Springer. doi:10.1007/978- 0-387-77322-3_10.
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
-
-
Sinclair, S.1
Smith, S.W.2
-
70
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Oakland, CA: IEEE
-
Song, D., Wagner, D., &Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of the IEEE Symposium on Research in Security and Privacy, (pp. 44-55). Oakland, CA: IEEE.
-
(2000)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
71
-
-
84878557064
-
-
(n.d.). Retrieved from
-
Storage Networking Industry Association. (n.d.). Homepage. Retrieved from http://www.snia.org
-
Homepage
-
-
-
72
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J. B. D., &Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 8(6), 24-31. doi:10.1109/MSP.2010.186.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
73
-
-
84945168969
-
VMWare shared folder bug lets local users on the guest OS gain elevated privileges on the host OS
-
(n.d.), Security Tracker ID: 1019493. Retrieved from
-
Tracker, S. (n.d.). VMWare shared folder bug lets local users on the guest OS gain elevated privileges on the host OS. Security Tracker ID: 1019493. Retrieved from http://securitytracker.com/id/1019493
-
-
-
Tracker, S.1
-
74
-
-
84864868892
-
Cloud computing and security- A natural match
-
Retrieved from
-
Trusted Computing Group (TCG). (2010). Cloud computing and security- A natural match. Retrieved from http://www.trustedcomputinggroup.org
-
(2010)
-
-
-
75
-
-
84945133016
-
Extended gmail outage hits apps admins
-
Retrieved from
-
World, C. (2008). Extended gmail outage hits apps admins. Retrieved from http://www.computerworld.com/s/article/9117322/Extended_Gmail_outage_hits_Apps_admins
-
(2008)
-
-
World, C.1
-
76
-
-
84945117955
-
Salesforce.com warns customers of phishing scam
-
Retrieved from
-
World, P. C. (2007). Salesforce.com warns customers of phishing scam. Retrieved from http://www.pcworld.com/businesscenter/article/139353/article.html
-
(2007)
-
-
World, P.C.1
-
77
-
-
84945168970
-
-
(n.d.). Retrieved from
-
Xen Vulnerability. (n.d.). Retrieved from http://secunia.com/advisories/26986/
-
-
-
-
78
-
-
84945168971
-
Google hackers targeted source code of more than 30 companies
-
Retrieved from
-
Zetter, K. (2010). Google hackers targeted source code of more than 30 companies. Wired Threat Level. Retrieved from http://www.wired.com/threatlevel/2010/01/google-hack-attack/
-
(2010)
Wired Threat Level
-
-
Zetter, K.1
-
79
-
-
78650039216
-
Access control and trust management for emerging multidomain environments
-
Upadhyay, S., &Rao, R. O. (Eds.), Dublin, Ireland: Emerald Group Publishing
-
Zhang, Y., &Joshi, J. (2009). Access control and trust management for emerging multidomain environments. In Upadhyay, S., &Rao, R. O. (Eds.), Annals of Emerging Research in Information Assurance, Security and Privacy Services (pp. 421-452). Dublin, Ireland: Emerald Group Publishing.
-
(2009)
Annals of Emerging Research in Information Assurance, Security and Privacy Services
, pp. 421-452
-
-
Zhang, Y.1
Joshi, J.2
-
80
-
-
33847739288
-
Xen and the art of virtualization (Technical Report)
-
Cambridge, UK: University of Cambridge. Retrieved from
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., &Ho, A. Warfield, A. (2003). Xen and the art of virtualization (Technical Report). Cambridge, UK: University of Cambridge. Retrieved from www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf
-
(2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Warfield, A.7
-
81
-
-
34247369863
-
Using secure coprocessors for privacy preserving collaborative data mining and analysis
-
Chicago, IL: ACM Press
-
Bhattacherjee, B., Abe, N., Goldman, K., Zadrozny, B., Chillakuru, V. R., Del Caprio, M., &Apte, C. (2006). Using secure coprocessors for privacy preserving collaborative data mining and analysis. In Proceedings of the 2nd International Workshop on Data Management on New Hardware (DaMoN'06). Chicago, IL: ACM Press.
-
(2006)
Proceedings of the 2nd International Workshop on Data Management on New Hardware (DaMoN'06)
-
-
Bhattacherjee, B.1
Abe, N.2
Goldman, K.3
Zadrozny, B.4
Chillakuru, V.R.5
Del Caprio, M.6
Apte, C.7
-
82
-
-
57949088292
-
Conjunctive, subset, and range queries on encrypted data
-
TCC.
-
Boneh, D., &Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Proceedings of the 4th Conference on Theory of Cryptography (TCC'07), (pp. 530-534). TCC.
-
(2007)
Proceedings of the 4th Conference on Theory of Cryptography (TCC'07)
, pp. 530-534
-
-
Boneh, D.1
Waters, B.2
-
83
-
-
70349311408
-
VieSLAF framework: Enabling adaptive and versatile SLA-management
-
Delft, The Netherlands: GECON
-
Brandic, I., Music, D., Leitner, P., &Dustdar, S. (2009). VieSLAF framework: Enabling adaptive and versatile SLA-management. In Proceedings of the 6th International Workshop on Grid Economics and Business Models (GECON'09), (pp. 60-73). Delft, The Netherlands: GECON.
-
(2009)
Proceedings of the 6th International Workshop on Grid Economics and Business Models (GECON'09)
, pp. 60-73
-
-
Brandic, I.1
Music, D.2
Leitner, P.3
Dustdar, S.4
-
84
-
-
73549093886
-
Privacy in the clouds: A white paper on privacy and digital identity: Implications for the internet
-
Retrieved from
-
Cavoukian, A. (2008). Privacy in the clouds: A white paper on privacy and digital identity: Implications for the internet. Retrieved from http://www.ipc.on.ca/images/resources/privacyintheclouds.pdf
-
(2008)
-
-
Cavoukian, A.1
-
85
-
-
70449467093
-
Introducing the azure services platform
-
Retrieved from
-
Chappel, D. (2008). Introducing the azure services platform. Retrieved from http://download.microsoft.com
-
(2008)
-
-
Chappel, D.1
-
86
-
-
49949097790
-
Multitenant data architecture
-
Retrieved from
-
Chong, F., Carraro, G., &Wolter, R. (2006). Multitenant data architecture. Retrieved from http://msdn.microsoft.com/en-us/library/aa479086.aspx
-
(2006)
-
-
Chong, F.1
Carraro, G.2
Wolter, R.3
-
88
-
-
70450064414
-
Dynamo: Amazon's highly available key-value store
-
Stevenson, WA: SOSP
-
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., &Pilchin, A. Vogels, W. (2007). Dynamo: Amazon's highly available key-value store. In Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07), (pp. 205-220). Stevenson, WA: SOSP.
-
(2007)
Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07)
, pp. 205-220
-
-
DeCandia, G.1
Hastorun, D.2
Jampani, M.3
Kakulapati, G.4
Lakshman, A.5
Pilchin, A.6
Vogels, W.7
-
89
-
-
77950329698
-
Tutorial for understanding the relationship between cloud computing and SaaS
-
Stamford, CT: Gartner
-
Desisto, R. P., Plummer, D. C., &Smith, D. M. (2008). Tutorial for understanding the relationship between cloud computing and SaaS. Stamford, CT: Gartner.
-
(2008)
-
-
Desisto, R.P.1
Plummer, D.C.2
Smith, D.M.3
-
90
-
-
37849019339
-
Identity as a service- Towards a serviceoriented identity management architecture
-
Twente, The Netherlands: EUNICE
-
Emig, C., Brandt, F., Kreuzer, S., &Abeck, S. (2007). Identity as a service- Towards a serviceoriented identity management architecture. In Proceedings of the 13th Open European Summer School and IFIP TC6.6 Conference on Dependable and Adaptable Network and Services (EUNICE' 07), (pp. 1-8). Twente, The Netherlands: EUNICE.
-
(2007)
Proceedings of the 13th Open European Summer School and IFIP TC6.6 Conference on Dependable and Adaptable Network and Services (EUNICE' 07)
, pp. 1-8
-
-
Emig, C.1
Brandt, F.2
Kreuzer, S.3
Abeck, S.4
-
91
-
-
67649425263
-
Cloud computing- A question of trust
-
Computer Fraud &Security
-
Everett, C. (2009). Cloud computing- A question of trust. Computer Fraud &Security, (6): 5-7. doi:10.1016/S1361-3723(09)70071-5.
-
(2009)
, Issue.6
, pp. 5-7
-
-
Everett, C.1
-
92
-
-
77950567715
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
Retrieved from
-
Gellman, R. (2009). Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum (WPF) Report. Retrieved from http://www.worldprivacyforum.org/cloudprivacy.html
-
(2009)
World Privacy Forum (WPF) Report
-
-
Gellman, R.1
-
93
-
-
84879877373
-
Capex vs. opex: Most people miss the point about cloud economics
-
Retrieved from
-
Golden, B. (2009). Capex vs. opex: Most people miss the point about cloud economics. Retrieved from http://www.cio.com/article/484429/Capex_vs._Opex_Most_People_Miss_the_point_About_Cloud_Economic
-
(2009)
-
-
Golden, B.1
-
94
-
-
84945168973
-
Hosted informatics: Bringing cloud computing down to earth with bottom-line benefits for pharma
-
Heritage, T. (2009). Hosted informatics: Bringing cloud computing down to earth with bottom-line benefits for pharma. Next Generation Pharmaceutical, (17).
-
(2009)
Next Generation Pharmaceutical
, Issue.17
-
-
Heritage, T.1
-
95
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
Chengdu, China: DASC
-
Itani, W., Kayssi, A., &Chehab, A. (2009). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In Proceedings of the 8th IEEE International Conference on Dependable, Automatic and Secure Computing (DASC'09), (pp. 711-716). Chengdu, China: DASC.
-
(2009)
Proceedings of the 8th IEEE International Conference on Dependable, Automatic and Secure Computing (DASC'09)
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
96
-
-
70349309706
-
Data security in the world of cloud computing
-
Kaufman, L. M. (2009). Data security in the world of cloud computing. IEEE Security &Privacy, 7(4), 61-64. doi:10.1109/MSP.2009.87.
-
(2009)
IEEE Security &Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
97
-
-
84945415321
-
Gartner on cloud security: Our nightmare scenario is here now
-
Messmer, E. (2009). Gartner on cloud security: Our nightmare scenario is here now. Network World Retrieved from http://www.networkworld.com/news/2009/102109-gartner-cloud-security.html
-
(2009)
Network World Retrieved from
-
-
Messmer, E.1
-
98
-
-
84945168975
-
-
(n.d.). Retrieved from
-
Open Cloud Manifesto. (n.d.). Retrieved from http://www.opencloudmanifesto.org/Open%20Cloud%20Manifesto.pdf
-
-
-
-
101
-
-
82955188460
-
Design and implementation of a xen-based execution environment
-
(Diploma Thesis). Technische Universitat Kaiserslautern, Kaiserslautern, Germany.
-
Petry, A. (2007). Design and implementation of a xen-based execution environment. (Diploma Thesis). Technische Universitat Kaiserslautern, Kaiserslautern, Germany.
-
(2007)
-
-
Petry, A.1
-
102
-
-
56649115709
-
The paradox of security in virtual environments
-
Price, M. (2008). The paradox of security in virtual environments. IEEE Computer, 41(11), 22-38. doi:10.1109/MC.2008.472.
-
(2008)
IEEE Computer
, vol.41
, Issue.11
, pp. 22-38
-
-
Price, M.1
-
103
-
-
84945168976
-
RightScale cloud management features
-
Retrieved from
-
RightScale Inc. (2009). RightScale cloud management features. Retrieved from http://www.rightscale.com/products/cloud-management.php
-
(2009)
-
-
-
104
-
-
70049105589
-
The reservoir model and architecture for open federated cloud computing
-
September
-
Rochwerger, R., Caceres, J., Montero, R. S., Breitgand, D., Elmroth, E., &Galls, A. et al. (2009, September). The reservoir model and architecture for open federated cloud computing. IBM Systems Journal.
-
(2009)
IBM Systems Journal.
-
-
Rochwerger, R.1
Caceres, J.2
Montero, R.S.3
Breitgand, D.4
Elmroth, E.5
Galls, A.6
-
105
-
-
84880184742
-
Above the clouds: From grids to service-oriented operating systems
-
Tselentis, G. et al. (Eds.), Amsterdam: IOS Press
-
Schubert, L., Kipp, A., &Wesner, S. (2009). Above the clouds: From grids to service-oriented operating systems. In Tselentis, G. et al. (Eds.), Towards the Future Internet- A European Research Perspective (pp. 238-249). Amsterdam: IOS Press.
-
(2009)
Towards the Future Internet- A European Research Perspective
, pp. 238-249
-
-
Schubert, L.1
Kipp, A.2
Wesner, S.3
-
106
-
-
84894636287
-
IBM blue cloud initiative advances enterprise cloud computing
-
Retrieved from
-
Sims, K. (2009). IBM blue cloud initiative advances enterprise cloud computing. Retrieved from http://www-03.ibm.com/press/us/en/pressrelease/26642.wss
-
(2009)
-
-
Sims, K.1
-
107
-
-
70349456218
-
Virtual infrastructure management in private and hybrid cloud
-
Sotomayor, B., Montero, R. S., Llorente, I. M., &Foster, I. (2009). Virtual infrastructure management in private and hybrid cloud. IEEE Internet Computing, 13(5), 14-22. doi:10.1109/ MIC.2009.119.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.5
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.S.2
Llorente, I.M.3
Foster, I.4
-
108
-
-
84945138070
-
Cloud computing security: Making virtual machines cloud ready
-
Retrieved from
-
Tech Republic. (2013). Cloud computing security: Making virtual machines cloud ready. Retrieved from http://www.techrepublic.com/whitepapers/cloud-computing-security-making-virtual-machines-cloud-ready/1728295
-
(2013)
-
-
-
109
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
Vaquero, L. M., Rodero-Merino, L., Caceres, J., &Linder, M. (2009). A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review, 39(1), 50-55. doi:10.1145/1496091.1496100.
-
(2009)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Linder, M.4
-
111
-
-
79955522563
-
Multi-cloud deployment of computing clusters for loosely-coupled MTC applications
-
Vozmediano, R. M., Montero, R. S., &Llorente, I. M. (2011). Multi-cloud deployment of computing clusters for loosely-coupled MTC applications. IEEE Transactions on Parallel and Distributed Systems, 22(6), 924-930. doi:10.1109/ TPDS.2010.186.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.6
, pp. 924-930
-
-
Vozmediano, R.M.1
Montero, R.S.2
Llorente, I.M.3
-
112
-
-
84944099971
-
Zimory distributed cloud - Whitepaper
-
Retrieved from
-
Zimory Gmb, H. (2009). Zimory distributed cloud - Whitepaper. Retrieved from http://www.zimory.de/index.php?eID=tx_nawsecuredl&u=0&file=fileadmin/user_upload/pdf/Distributed_Clouds_Whitepaper.pdf&t=1359027268&hash=93c5f42f8c91817a746f7b8cff55fbdc68ae7379
-
(2009)
-
-
Zimory Gmb, H.1
|