-
1
-
-
84904352832
-
A review on the state-of-the-art privacy preserving approaches in e-health clouds
-
A. Abbas, and S.U. Khan A review on the state-of-the-art privacy preserving approaches in e-health clouds IEEE J. Biomed. Health Inform. 2014 10.1109/JBHI.2014.2300846
-
(2014)
IEEE J. Biomed. Health Inform.
-
-
Abbas, A.1
Khan, S.U.2
-
2
-
-
84911413802
-
A cloud based health insurance plan recommendation system: A user centered approach
-
A. Abbas, K. Bilal, L. Zhang, and S.U. Khan A cloud based health insurance plan recommendation system: a user centered approach Future Gener. Comput. Syst. 2014 10.1016/j.future.2014.08.010
-
(2014)
Future Gener. Comput. Syst.
-
-
Abbas, A.1
Bilal, K.2
Zhang, L.3
Khan, S.U.4
-
4
-
-
84917680927
-
-
arxiv:1312.6170 arXiv preprint
-
K. Alhamazani, R. Ranjan, K. Mitra, F. Rabhi, S.U. Khan, A. Guabtni, V. Bhatnagar, An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art, arXiv preprint arXiv:1312.6170, 2013.
-
(2013)
An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-Art
-
-
Alhamazani, K.1
Ranjan, R.2
Mitra, K.3
Rabhi, F.4
Khan, S.U.5
Guabtni, A.6
Bhatnagar, V.7
-
5
-
-
85027442653
-
SeDaSC: Secure data sharing in clouds
-
M. Ali, R. Dhamotharan, E. Khan, S.U. Khan, A.V. Vasilakos, K. Li, and A.Y. Zomaya SeDaSC: secure data sharing in clouds IEEE Syst. J. 2015 10.1109/JSYST.2014.2379646
-
(2015)
IEEE Syst. J.
-
-
Ali, M.1
Dhamotharan, R.2
Khan, E.3
Khan, S.U.4
Vasilakos, A.V.5
Li, K.6
Zomaya, A.Y.7
-
6
-
-
84896679282
-
Elliptic curve cryptography for securing cloud computing applications
-
O.D. Alowolodu, B.K. Alese, A.O. Adetunmbi, O.S. Adewale, and O.S. Ogundele Elliptic curve cryptography for securing cloud computing applications Int. J. Comput. Appl. 66 2013
-
(2013)
Int. J. Comput. Appl.
, vol.66
-
-
Alowolodu, O.D.1
Alese, B.K.2
Adetunmbi, A.O.3
Adewale, O.S.4
Ogundele, O.S.5
-
7
-
-
84891957576
-
A framework for secure live migration of virtual machines
-
M.R. Anala, J. Shetty, G. Shobha, A framework for secure live migration of virtual machines, in: IEEE International Conference on Advances in Computing, Communications and Informatics, 2013, pp. 243-248.
-
(2013)
IEEE International Conference on Advances in Computing, Communications and Informatics
, pp. 243-248
-
-
Anala, M.R.1
Shetty, J.2
Shobha, G.3
-
8
-
-
13844285637
-
-
accessed 26.05.14
-
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, M. Xu, Web services agreement specification (WS-agreement), < http://www.ogf.org/documents/GFD.107.pdf > (accessed 26.05.14).
-
Web Services Agreement Specification (WS-agreement)
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Nakata, T.6
Pruyne, J.7
Rofrano, J.8
Tuecke, S.9
Xu, M.10
-
9
-
-
84868116561
-
Security and trust preserving VM migrations in public clouds
-
M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 869-876.
-
(2012)
IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 869-876
-
-
Aslam, M.1
Gehrmann, C.2
Bjorkman, M.3
-
10
-
-
84863590115
-
A security analysis of amazon's elastic compute cloud service
-
M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda, S. Loureiro, A security analysis of amazon's elastic compute cloud service, in: Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012, pp. 1427-1434.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing
, pp. 1427-1434
-
-
Balduzzi, M.1
Zaddach, J.2
Balzarotti, D.3
Kirda, E.4
Loureiro, S.5
-
11
-
-
84979701004
-
-
arxiv:1308.0824 arXiv preprint
-
R. Bhadauria, R. Borgohain, A. Biswas, S. Sanyal, Secure Authentication of Cloud Data Mining API, arXiv preprint arXiv:1308.0824, 2013.
-
(2013)
Secure Authentication of Cloud Data Mining API
-
-
Bhadauria, R.1
Borgohain, R.2
Biswas, A.3
Sanyal, S.4
-
12
-
-
84941201000
-
Trends and challenges in cloud data centers
-
K. Bilal, S.U.R. Malik, S.U. Khan, and A.Y. Zomaya Trends and challenges in cloud data centers IEEE Cloud Comput. Mag. 1 1 2014 10 20
-
(2014)
IEEE Cloud Comput. Mag.
, vol.1
, Issue.1
, pp. 10-20
-
-
Bilal, K.1
Malik, S.U.R.2
Khan, S.U.3
Zomaya, A.Y.4
-
13
-
-
70350357342
-
Attribute-sets: A practically motivated enhancement to attribute-based encryption
-
Springer Berlin, Heidelberg
-
R. Bobba, H. Khurana, and M. Prabhakaran Attribute-sets: a practically motivated enhancement to attribute-based encryption Computer Security ESORICS 2009 Springer Berlin, Heidelberg 587 604
-
(2009)
Computer Security ESORICS
, pp. 587-604
-
-
Bobba, R.1
Khurana, H.2
Prabhakaran, M.3
-
15
-
-
84924361877
-
Cryptographic key management issues and challenges in cloud services
-
Springer New York doi: 10.1007/978-1-4614-9278-8-1
-
R. Chandramouli, M. Iorga, and S. Chokhani Cryptographic key management issues and challenges in cloud services Secure Cloud Computing 2014 Springer New York 1 30 doi: 10.1007/978-1-4614-9278-8-1
-
(2014)
Secure Cloud Computing
, pp. 1-30
-
-
Chandramouli, R.1
Iorga, M.2
Chokhani, S.3
-
16
-
-
84861921092
-
Optimization of resource provisioning cost in cloud computing
-
S. Chaisiri, B. Lee, and D. Niyato Optimization of resource provisioning cost in cloud computing IEEE Trans. Services Comput. 5 2 2012 164 177
-
(2012)
IEEE Trans. Services Comput.
, vol.5
, Issue.2
, pp. 164-177
-
-
Chaisiri, S.1
Lee, B.2
Niyato, D.3
-
17
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
D. Chen, H. Zhao, Data security and privacy protection issues in cloud computing, in: International Conference on Computer Science and Electronics Engineering (ICCSEE, IEEE), vol. 1, 2012, pp. 647-651.
-
(2012)
International Conference on Computer Science and Electronics Engineering (ICCSEE, IEEE)
, vol.1
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
18
-
-
84863408597
-
Study on the security models and strategies of cloud computing
-
J. Che, Y. Duan, T. Zhang, and J. Fan Study on the security models and strategies of cloud computing Proc. Eng. 23 2011 586 593
-
(2011)
Proc. Eng.
, vol.23
, pp. 586-593
-
-
Che, J.1
Duan, Y.2
Zhang, T.3
Fan, J.4
-
19
-
-
84863469103
-
Spicesimple privacy-preserving identity-management for cloud environment
-
Springer Berlin, Heidelberg
-
S.M.S. Chow, Y. He, L.C.K. Hui, and S.M. Yiu Spicesimple privacy-preserving identity-management for cloud environment Applied Cryptography and Network Security 2012 Springer Berlin, Heidelberg 526 543
-
(2012)
Applied Cryptography and Network Security
, pp. 526-543
-
-
Chow, S.M.S.1
He, Y.2
Hui, L.C.K.3
Yiu, S.M.4
-
22
-
-
84855701474
-
Enabling secure VM-vTPM migration in private clouds
-
B. Danev, R.J. Masti, G.O. Karame, S. Capkun, Enabling secure VM-vTPM migration in private clouds, in: Proceedings of the ACM 27th Annual Computer Security Applications Conference, 2011, pp. 187-196.
-
(2011)
Proceedings of the ACM 27th Annual Computer Security Applications Conference
, pp. 187-196
-
-
Danev, B.1
Masti, R.J.2
Karame, G.O.3
Capkun, S.4
-
23
-
-
84881096342
-
Identity management framework for cloud networking infrastructure
-
R.D. Dhungana, A. Mohammad, A. Sharma, I. Schoen, Identity management framework for cloud networking infrastructure, in: IEEE International Conference on Innovations in Information Technology (IIT), 2013, pp. 13-17.
-
(2013)
IEEE International Conference on Innovations in Information Technology (IIT)
, pp. 13-17
-
-
Dhungana, R.D.1
Mohammad, A.2
Sharma, A.3
Schoen, I.4
-
24
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
H.T. Dinh, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications, and approaches Wireless Commun. Mobile Comput. 13 18 2013 1587 1611
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
25
-
-
84871003529
-
A survey on service-oriented network virtualization toward convergence of networking and cloud computing
-
Q. Duan, Y. Yan, and A.V. Vasilakos A survey on service-oriented network virtualization toward convergence of networking and cloud computing IEEE Trans. Netw. Service Manage. 9 4 2012 373 392
-
(2012)
IEEE Trans. Netw. Service Manage.
, vol.9
, Issue.4
, pp. 373-392
-
-
Duan, Q.1
Yan, Y.2
Vasilakos, A.V.3
-
26
-
-
84908572020
-
Preservation of security configurations in the cloud
-
A. Eghtesadi, Y. Jarraya, M. Debbabi, M. Pourzandi, Preservation of security configurations in the cloud, in: IEEE International Conference on Cloud Engineering (IC2E), 2014, pp. 17-26.
-
(2014)
IEEE International Conference on Cloud Engineering (IC2E)
, pp. 17-26
-
-
Eghtesadi, A.1
Jarraya, Y.2
Debbabi, M.3
Pourzandi, M.4
-
27
-
-
84891926901
-
OPS: Offine patching scheme for the images management in a secure cloud environment
-
K. Fan, D. Mao, Z. Lu, J. Wu, OPS: offine patching scheme for the images management in a secure cloud environment, in: IEEE International Conference on Services Computing (SCC), 2013, pp. 587-594.
-
(2013)
IEEE International Conference on Services Computing (SCC)
, pp. 587-594
-
-
Fan, K.1
Mao, D.2
Lu, Z.3
Wu, J.4
-
28
-
-
84897106892
-
Security issues in cloud environments: A survey
-
D. AB. Fernandes, L. FB. Soares, J.V. Gomes, M.M. Freire, and P. RM Inácio Security issues in cloud environments: a survey Int. J. Inform. Sec. 13 2 2014 113 170
-
(2014)
Int. J. Inform. Sec.
, vol.13
, Issue.2
, pp. 113-170
-
-
Fernandes, D.A.B.1
Soares, L.F.B.2
Gomes, J.V.3
Freire, M.M.4
-
30
-
-
84924706348
-
Stealthy denial of service strategy in cloud computing
-
M. Ficco, and M. Rak Stealthy denial of service strategy in cloud computing IEEE Trans. Cloud Comput. 2014 10.1109/TCC.2014.2325045
-
(2014)
IEEE Trans. Cloud Comput.
-
-
Ficco, M.1
Rak, M.2
-
31
-
-
84885395320
-
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery
-
Y. Fu, Z. Lin, Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery, in: Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2013, pp. 97-110.
-
(2013)
Proceedings of the 9th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 97-110
-
-
Fu, Y.1
Lin, Z.2
-
32
-
-
80955125668
-
Sparc: A security and privacy aware virtual machine check pointing mechanism
-
M.I. Gofman, R. Luo, P. Yang, K. Gopalan, Sparc: a security and privacy aware virtual machine check pointing mechanism, in: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011, pp. 115-124.
-
(2011)
Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 115-124
-
-
Gofman, M.I.1
Luo, R.2
Yang, P.3
Gopalan, K.4
-
33
-
-
84926426310
-
A quantitative analysis of current security concerns and solutions for cloud computing
-
N. Gonzalez, C. Miers, F. Redgolo, M. Simplcio, T. Carvalho, M. Nslund, and M. Pourzandi A quantitative analysis of current security concerns and solutions for cloud computing J. Cloud Comput. 1 1 2012 1 18
-
(2012)
J. Cloud Comput.
, vol.1
, Issue.1
, pp. 1-18
-
-
Gonzalez, N.1
Miers, C.2
Redgolo, F.3
Simplcio, M.4
Carvalho, T.5
Nslund, M.6
Pourzandi, M.7
-
34
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Springer Berlin, Heidelberg
-
J. Groth, and Amit Sahai Efficient non-interactive proof systems for bilinear groups Advances in Cryptology EUROCRYPT 2008 Springer Berlin, Heidelberg 415 432
-
(2008)
Advances in Cryptology EUROCRYPT
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
35
-
-
84908394684
-
CIVSched: A communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs
-
B. Guan, J. Wu, Y. Wang, and S.U. Khan CIVSched: a communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs IEEE Trans. Cloud Comput. 2 3 2014 320 332
-
(2014)
IEEE Trans. Cloud Comput.
, vol.2
, Issue.3
, pp. 320-332
-
-
Guan, B.1
Wu, J.2
Wang, Y.3
Khan, S.U.4
-
39
-
-
84887724123
-
An analysis of security issues for cloud computing
-
K. Hashizume, D.G. Rosado, E. Fernndez-Medina, and E.B. Fernandez An analysis of security issues for cloud computing J. Internet Services Appl. 4 1 2013 1 13
-
(2013)
J. Internet Services Appl.
, vol.4
, Issue.1
, pp. 1-13
-
-
Hashizume, K.1
Rosado, D.G.2
Fernndez-Medina, E.3
Fernandez, E.B.4
-
41
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
T.D. Hoang, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications, and approaches Wireless Commun. Mobile Comput. 13 18 2013 1587 1611
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Hoang, T.D.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
44
-
-
84897726582
-
An application-level approach for privacy-preserving virtual machine checkpointing
-
Y. Hu, T. Li, P. Yang, K. Gopalan, An application-level approach for privacy-preserving virtual machine checkpointing, in: IEEE Sixth International Conference on Cloud Computing, 2013, pp. 59-66.
-
(2013)
IEEE Sixth International Conference on Cloud Computing
, pp. 59-66
-
-
Hu, Y.1
Li, T.2
Yang, P.3
Gopalan, K.4
-
46
-
-
81055155507
-
Cloudsec: A security monitoring appliance for virtual machines in the iaas cloud model
-
A.S. Ibrahim, J. Hamlyn-Harris, J. Grundy, M. Almorsy, Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model, in: IEEE 5th International Conference on Network and System Security (NSS), 2011, pp. 113-120.
-
(2011)
IEEE 5th International Conference on Network and System Security (NSS)
, pp. 113-120
-
-
Ibrahim, A.S.1
Hamlyn-Harris, J.2
Grundy, J.3
Almorsy, M.4
-
48
-
-
84893316963
-
ImageElves: Rapid and reliable system updates in the cloud
-
D. Jeswani, A. Verma, P. Jayachandran, K. Bhattacharya, ImageElves: rapid and reliable system updates in the cloud, in: IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), 2013, pp. 390-399.
-
(2013)
IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
, pp. 390-399
-
-
Jeswani, D.1
Verma, A.2
Jayachandran, P.3
Bhattacharya, K.4
-
49
-
-
84898466331
-
Potential attacks against k-anonymity on LBS and solutions for defending the attacks
-
Springer Berlin, Heidelberg
-
P. Juncheng, D. Huimin, S. Yinghui, and L. Dong Potential attacks against k-anonymity on LBS and solutions for defending the attacks Advanced in Computer Science and its Applications 2014 Springer Berlin, Heidelberg 877 883
-
(2014)
Advanced in Computer Science and Its Applications
, pp. 877-883
-
-
Juncheng, P.1
Huimin, D.2
Yinghui, S.3
Dong, L.4
-
50
-
-
84919829652
-
Control cloud data access privilege and anonymity with fully anonymous attribute based encryption
-
T. Jung, X. Li, Z. Wan, and M. Wan Control cloud data access privilege and anonymity with fully anonymous attribute based encryption IEEE Trans. Inform. Forensics Sec. 10 1 2014 190 199
-
(2014)
IEEE Trans. Inform. Forensics Sec.
, vol.10
, Issue.1
, pp. 190-199
-
-
Jung, T.1
Li, X.2
Wan, Z.3
Wan, M.4
-
51
-
-
84893216221
-
Securing the virtual machine images in cloud computing
-
M. Kazim, R. Masood, M.A. Shibli, Securing the virtual machine images in cloud computing, in: Proceedings of the ACM 6th International Conference on Security of Info and Networks, 2013, pp. 425-428.
-
(2013)
Proceedings of the ACM 6th International Conference on Security of Info and Networks
, pp. 425-428
-
-
Kazim, M.1
Masood, R.2
Shibli, M.A.3
-
52
-
-
84919877569
-
BSS: Block-based sharing scheme for secure data storage services in mobile cloud environment
-
A.N. Khan, M.L.M. Kiah, M. Ali, S.A. Madani, and S. Shamshirband BSS: block-based sharing scheme for secure data storage services in mobile cloud environment J. Supercomput. 70 2 2014 946 976
-
(2014)
J. Supercomput.
, vol.70
, Issue.2
, pp. 946-976
-
-
Khan, A.N.1
Kiah, M.L.M.2
Ali, M.3
Madani, S.A.4
Shamshirband, S.5
-
53
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
A.N. Khan, M.L.M. Kiah, S.A. Madani, M. Ali, and S. Shamshirband Incremental proxy re-encryption scheme for mobile cloud computing environment J. Supercomput. 68 2 2014 624 651
-
(2014)
J. Supercomput.
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.N.1
Kiah, M.L.M.2
Madani, S.A.3
Ali, M.4
Shamshirband, S.5
-
54
-
-
84888011760
-
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
-
A.N. Khan, M.L.M. Kiah, S.A. Madani, and M. Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing J. Supercomput. 66 3 2013 1687 1706
-
(2013)
J. Supercomput.
, vol.66
, Issue.3
, pp. 1687-1706
-
-
Khan, A.N.1
Kiah, M.L.M.2
Madani, S.A.3
Ali, M.4
-
55
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
A.N. Khan, M.L.M. Kiah, S.U. Khan, and S.A. Madani Towards secure mobile cloud computing: a survey Future Gener. Comput. Syst. 29 5 2013 1278 1299
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
-
56
-
-
84894666247
-
A survey of mobile cloud computing application models
-
A.R. Khan, M. Othman, S.A. Madani, and S.U. Khan A survey of mobile cloud computing application models IEEE Commun. Surv. Tutorials 16 1 2014 393 413
-
(2014)
IEEE Commun. Surv. Tutorials
, vol.16
, Issue.1
, pp. 393-413
-
-
Khan, A.R.1
Othman, M.2
Madani, S.A.3
Khan, S.U.4
-
57
-
-
84899798215
-
Cloud computing risk assessment: A systematic literature review
-
Springer Berlin, Heidelberg
-
R. Latif, H. Abbas, S. Assar, and Q. Ali Cloud computing risk assessment: a systematic literature review Future Information Technology 2014 Springer Berlin, Heidelberg 285 295
-
(2014)
Future Information Technology
, pp. 285-295
-
-
Latif, R.1
Abbas, H.2
Assar, S.3
Ali, Q.4
-
58
-
-
84870937861
-
A trusted virtual machine in an untrusted management environment
-
C. Li, A. Raghunathan, and N.K. Jha A trusted virtual machine in an untrusted management environment IEEE Trans. Serv. Comput. 5 4 2012 472 483
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.4
, pp. 472-483
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
59
-
-
80053654165
-
Cyber-guarder: A virtualization security assurance architecture for green cloud computing
-
J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K.P. Lam Cyber-guarder: a virtualization security assurance architecture for green cloud computing Future Gener. Comput. Syst. 28 2 2012 379 390
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, Issue.2
, pp. 379-390
-
-
Li, J.1
Li, B.2
Wo, T.3
Hu, C.4
Huai, J.5
Liu, L.6
Lam, K.P.7
-
60
-
-
84860512062
-
A secure erasure code-based cloud storage system with secure data forwarding
-
H.Y. Lin, and W.G. Tzeng A secure erasure code-based cloud storage system with secure data forwarding IEEE Trans. Parallel Distrib. Syst. 23 6 2012 995 1003
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 995-1003
-
-
Lin, H.Y.1
Tzeng, W.G.2
-
61
-
-
84913530833
-
Information fusion in a cloud computing era: A systems-level perspective
-
B. Liu, E. Blasch, Y. Chen, A.J. Aved, A. Hadiks, D. Shen, and G. Chen Information fusion in a cloud computing era: a systems-level perspective IEEE Aerospace Electron. Syst. Mag. 29 10 2014 16 24
-
(2014)
IEEE Aerospace Electron. Syst. Mag.
, vol.29
, Issue.10
, pp. 16-24
-
-
Liu, B.1
Blasch, E.2
Chen, Y.3
Aved, A.J.4
Hadiks, A.5
Shen, D.6
Chen, G.7
-
63
-
-
84897585107
-
Gearing resource-poor mobile devices with powerful clouds: Architectures, challenges, and applications
-
F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, and B. Li Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications IEEE Wireless Commun. 20 3 2013
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.3
-
-
Liu, F.1
Shu, P.2
Jin, H.3
Ding, L.4
Yu, J.5
Niu, D.6
Li, B.7
-
64
-
-
84889079354
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
Q. Liu, G. Wang, and J. Wu Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Inform. Sci. 258 2014 355 370
-
(2014)
Inform. Sci.
, vol.258
, pp. 355-370
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
65
-
-
84919493206
-
Security-aware intermediate data placement strategy in scientific cloud workflows
-
W. Liu, S. Peng, W. Du, W. Wang, and G.S. Zeng Security-aware intermediate data placement strategy in scientific cloud workflows Knowl. Inform. Syst. 41 2 2014 423 447
-
(2014)
Knowl. Inform. Syst.
, vol.41
, Issue.2
, pp. 423-447
-
-
Liu, W.1
Peng, S.2
Du, W.3
Wang, W.4
Zeng, G.S.5
-
66
-
-
84873699606
-
Performance implications of multi-tier application deployments on Infrastructure-as-a-Service clouds: Towards performance modeling
-
W. Lloyd, S. Pallickara, O. David, J. Lyon, M. Arabi, and K. Rojas Performance implications of multi-tier application deployments on Infrastructure-as-a-Service clouds: towards performance modeling Future Gener. Comput. Syst. 29 5 2013 1254 1264
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.5
, pp. 1254-1264
-
-
Lloyd, W.1
Pallickara, S.2
David, O.3
Lyon, J.4
Arabi, M.5
Rojas, K.6
-
67
-
-
78650558794
-
Secure virtualization for cloud computing
-
F. Lombardi, and R.D. Pietro Secure virtualization for cloud computing J. Netw. Comput. Appl. 34 4 2011 1113 1122
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Pietro, R.D.2
-
68
-
-
79951515545
-
Cloud computing the business perspective
-
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi Cloud computing the business perspective Decis. Support Syst. 51 1 2011 176 189
-
(2011)
Decis. Support Syst.
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
69
-
-
84861307113
-
The NIST definition of cloud computing (draft)
-
P. Mell, and T. Grance The NIST definition of cloud computing (draft) NIST Special Publ. 800 145 2011 7
-
(2011)
NIST Special Publ.
, vol.800
, Issue.145
, pp. 7
-
-
Mell, P.1
Grance, T.2
-
70
-
-
84979819188
-
CloudGenius: A hybrid decision support method for automating the migration of web application clusters to public clouds
-
M. Menzel, R. Ranjan, L. Wang, S.U. Khan, and J. Chen CloudGenius: a hybrid decision support method for automating the migration of web application clusters to public clouds IEEE Trans. Comput. 2014 10.1109/TC.2014.2317188
-
(2014)
IEEE Trans. Comput.
-
-
Menzel, M.1
Ranjan, R.2
Wang, L.3
Khan, S.U.4
Chen, J.5
-
71
-
-
84886723209
-
A survey on security issues and solutions at different layers of Cloud computing
-
C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan A survey on security issues and solutions at different layers of Cloud computing J. Supercomput. 63 2 2013 561 592
-
(2013)
J. Supercomput.
, vol.63
, Issue.2
, pp. 561-592
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, A.4
Rajarajan, M.5
-
72
-
-
84924414335
-
DCPortalsNg: Efficient isolation of tenant networks in virtualized datacenters
-
H. Moraes, R. Nunes, D. Guedes, DCPortalsNg: efficient isolation of tenant networks in virtualized datacenters, in: Thirteenth International Conference on Networks, 2014, pp. 230-235.
-
(2014)
Thirteenth International Conference on Networks
, pp. 230-235
-
-
Moraes, H.1
Nunes, R.2
Guedes, D.3
-
73
-
-
84925357591
-
A broker-based cooperative security-SLA evaluation methodology for personal cloud computing
-
S.H. Na, and E.N. Huh A broker-based cooperative security-SLA evaluation methodology for personal cloud computing Sec. Commun. Netw. 2014 10.1002/sec.1086
-
(2014)
Sec. Commun. Netw.
-
-
Na, S.H.1
Huh, E.N.2
-
74
-
-
84875607457
-
Review of cloud computing security
-
Y. Neng-Hai, Z. Hao, J. Xu, W. Zhang, and C. Zhang Review of cloud computing security Acta Electron. Sinica 41 2 2013 371 381
-
(2013)
Acta Electron. Sinica
, vol.41
, Issue.2
, pp. 371-381
-
-
Neng-Hai, Y.1
Hao, Z.2
Xu, J.3
Zhang, W.4
Zhang, C.5
-
75
-
-
84924384302
-
-
Open Web Application Security Project Top 10-2013, The ten most critical Web application security risks, < > Top 10 for 2013 (accessed 08.04.14)
-
Open Web Application Security Project Top 10-2013, The ten most critical Web application security risks, < https://www.owasp.org/index.php/Top10]OWASP > Top 10 for 2013 (accessed 08.04.14).
-
-
-
-
76
-
-
84864368309
-
Improving virtualization security by splitting hypervisor into smaller components
-
Springer Berlin, Heidelberg
-
W. Pan, Y. Zhang, M. Yu, and J. Jing Improving virtualization security by splitting hypervisor into smaller components Data and Applications Security and Privacy XXVI 2012 Springer Berlin, Heidelberg 298 313
-
(2012)
Data and Applications Security and Privacy XXVI
, pp. 298-313
-
-
Pan, W.1
Zhang, Y.2
Yu, M.3
Jing, J.4
-
78
-
-
84890479671
-
A mechanism design approach to resource procurement in cloud computing
-
A. Prasad, and S. Rao A mechanism design approach to resource procurement in cloud computing IEEE Trans. Comput. 63 1 2014 17 30
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.1
, pp. 17-30
-
-
Prasad, A.1
Rao, S.2
-
79
-
-
84899752948
-
Security as a service using an SLA-based approach via SPECS
-
M. Rak, N. Suri, J. Luna, D. Petcu, V. Casola, U. Villano, Security as a service using an SLA-based approach via SPECS, in: IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 2, 2013, pp. 1-6.
-
(2013)
IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
, vol.2
, pp. 1-6
-
-
Rak, M.1
Suri, N.2
Luna, J.3
Petcu, D.4
Casola, V.5
Villano, U.6
-
80
-
-
84937828887
-
Heuristics based server consolidation with residual resource defragmentation in cloud data centers
-
K.S. Rao, and P.S. Thilagam Heuristics based server consolidation with residual resource defragmentation in cloud data centers Future Gener. Comput. Syst. 2014 10.1016/j.future.2014.09.009
-
(2014)
Future Gener. Comput. Syst.
-
-
Rao, K.S.1
Thilagam, P.S.2
-
81
-
-
84898825587
-
Mobile cloud computing: A survey, state of art and future directions
-
M.R. Rahimi, J. Ren, C.H. Liu, A.V. Vasilakos, and N. Venkatasubramanian Mobile cloud computing: a survey, state of art and future directions Mobile Netw. Appl. 19 2 2014 133 143
-
(2014)
Mobile Netw. Appl.
, vol.19
, Issue.2
, pp. 133-143
-
-
Rahimi, M.R.1
Ren, J.2
Liu, C.H.3
Vasilakos, A.V.4
Venkatasubramanian, N.5
-
82
-
-
84874278922
-
MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture
-
M.R. Rahimi, N. Venkatasubramanian, S. Mehrotra, A.V. Vasilakos, MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture, in: Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, 2012, pp. 83-90.
-
(2012)
Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
, pp. 83-90
-
-
Rahimi, M.R.1
Venkatasubramanian, N.2
Mehrotra, S.3
Vasilakos, A.V.4
-
83
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang, and Q. Wang Security challenges for the public cloud IEEE Internet Comput. 16 1 2012 69 73
-
(2012)
IEEE Internet Comput.
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
84
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
85
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput. Electr. Eng. 39 1 2013 47 54
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
86
-
-
84891761004
-
Decentralized access control with anonymous authentication of data stored in clouds
-
S. Ruj, M. Stojmenovic, and A. Nayak Decentralized access control with anonymous authentication of data stored in clouds IEEE Trans. Parallel Distrib. Syst. 25 2 2014 384 394
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 384-394
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
87
-
-
84881472688
-
Cloud computing security: The scientific challenge, and a survey of solutions
-
M.D. Ryan Cloud computing security: the scientific challenge, and a survey of solutions J. Syst. Softw. 86 09 2013 2263 2268
-
(2013)
J. Syst. Softw.
, vol.86
, Issue.9
, pp. 2263-2268
-
-
Ryan, M.D.1
-
88
-
-
84892583408
-
Cloud computing: Opportunities and challenges
-
M. Sadiku, S. Musa, and O. Momoh Cloud computing: opportunities and challenges IEEE Potentials 33 1 2014 34 36
-
(2014)
IEEE Potentials
, vol.33
, Issue.1
, pp. 34-36
-
-
Sadiku, M.1
Musa, S.2
Momoh, O.3
-
89
-
-
80053489634
-
Reconciliation of the cloud computing model with US federal electronic health record regulations
-
E. Schweitzer Reconciliation of the cloud computing model with US federal electronic health record regulations J. Am. Med. Inform. Assoc. 19 2 2012 161 165
-
(2012)
J. Am. Med. Inform. Assoc.
, vol.19
, Issue.2
, pp. 161-165
-
-
Schweitzer, E.1
-
90
-
-
84926426263
-
Increasing virtual machine security in cloud environments
-
R. Schwarzkopf, M. Schmidt, C. Strack, S. Martin, and B. Freisleben Increasing virtual machine security in cloud environments J. Cloud Comput. 1 1 2012 1 12
-
(2012)
J. Cloud Comput.
, vol.1
, Issue.1
, pp. 1-12
-
-
Schwarzkopf, R.1
Schmidt, M.2
Strack, C.3
Martin, S.4
Freisleben, B.5
-
91
-
-
84899098655
-
A security management for cloud based applications and services with diameter-AAA
-
S.K. Sah, S. Shakya, H. Dhungana, A security management for cloud based applications and services with diameter-AAA, in: IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, pp. 6-11.
-
(2014)
IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
, pp. 6-11
-
-
Sah, S.K.1
Shakya, S.2
Dhungana, H.3
-
93
-
-
84873369523
-
Using cloud computing to implement a security overlay network
-
K. Salah, J.M.A. Calero, S. Zeadally, S. Al-Mulla, and M. Alzaabi Using cloud computing to implement a security overlay network IEEE Sec. Privacy 11 1 2013 44 53
-
(2013)
IEEE Sec. Privacy
, vol.11
, Issue.1
, pp. 44-53
-
-
Salah, K.1
Calero, J.M.A.2
Zeadally, S.3
Al-Mulla, S.4
Alzaabi, M.5
-
94
-
-
84924403473
-
On-demand security architecture for cloud computing
-
K. Sankar, S. Kannan, and P. Jennifer On-demand security architecture for cloud computing Middle-East J. Sci. Res. 20 2 2014 241 246
-
(2014)
Middle-East J. Sci. Res.
, vol.20
, Issue.2
, pp. 241-246
-
-
Sankar, K.1
Kannan, S.2
Jennifer, P.3
-
95
-
-
84894675432
-
Heterogeneity in mobile cloud computing: Taxonomy and open challenges
-
Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya Heterogeneity in mobile cloud computing: taxonomy and open challenges IEEE Commun. Surveys Tutorials 16 1 2014 369 392
-
(2014)
IEEE Commun. Surveys Tutorials
, vol.16
, Issue.1
, pp. 369-392
-
-
Sanaei, Z.1
Abolfazli, S.2
Gani, A.3
Buyya, R.4
-
96
-
-
84924428861
-
Cloud security: State of the art
-
Springer Berlin, Heidelberg
-
L. FB Soares, D. AB Fernandes, J.V. Gomes, M.M. Freire, and P. RM Inácio Cloud security: state of the art Security, Privacy and Trust in Cloud Systems 2014 Springer Berlin, Heidelberg 3 44
-
(2014)
Security, Privacy and Trust in Cloud Systems
, pp. 3-44
-
-
Soares, L.F.1
Ab Fernandes, D.2
Gomes, J.V.3
Freire, M.M.4
Rm Inácio, P.5
-
97
-
-
84905815184
-
Analysis of risks for virtualization technology
-
M.H. Song, Analysis of risks for virtualization technology, in: Applied Mechanics and Materials, vol. 539, 2014, pp. 374-377.
-
(2014)
Applied Mechanics and Materials
, vol.539
, pp. 374-377
-
-
Song, M.H.1
-
98
-
-
84867509247
-
A combined approach to ensure data security in cloud computing
-
S.K. Sood A combined approach to ensure data security in cloud computing J. Netw. Comput. Appl. 35 6 2012 1831 1838
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.6
, pp. 1831-1838
-
-
Sood, S.K.1
-
99
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M.K. Khan A review on remote data auditing in single cloud server: taxonomy and open issues J. Netw. Comput. Appl. 43 2014 121 141
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
100
-
-
84867842942
-
Trusted VM snapshots in untrusted cloud infrastructures
-
Springer Berlin, Heidelberg
-
A. Srivastava, H. Raj, J. Gi-n, and P. England Trusted VM snapshots in untrusted cloud infrastructures Research in Attacks, Intrusions, and Defenses 2012 Springer Berlin, Heidelberg 1 21
-
(2012)
Research in Attacks, Intrusions, and Defenses
, pp. 1-21
-
-
Srivastava, A.1
Raj, H.2
Gi-n, J.3
England, P.4
-
101
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
102
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
J. Szefer, E. Keller, R.B. Lee, J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, in: Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 401-412.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
103
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Y. Tang, P.P. Lee, J.C.S. Lui, and R. Perlman Secure overlay cloud storage with access control and assured deletion IEEE Trans. Dependable Secure Comput. 9 6 2012 903 916
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.2
Lui, J.C.S.3
Perlman, R.4
-
104
-
-
84961665186
-
Security and privacy in cloud computing
-
Z. Tari Security and privacy in cloud computing IEEE Cloud Comput. 1 1 2014 54 57
-
(2014)
IEEE Cloud Comput.
, vol.1
, Issue.1
, pp. 54-57
-
-
Tari, Z.1
-
105
-
-
84865500482
-
A framework for security context migration in a firewall secured virtual machine environment
-
Springer Berlin, Heidelberg
-
Z. Tavakoli, S. Meier, and A. Vensmer A framework for security context migration in a firewall secured virtual machine environment Information and Communication Technologies 2012 Springer Berlin, Heidelberg 41 51
-
(2012)
Information and Communication Technologies
, pp. 41-51
-
-
Tavakoli, Z.1
Meier, S.2
Vensmer, A.3
-
106
-
-
84896399206
-
Counteracting security attacks in virtual machines in the cloud using property based attestation
-
V. Varadharajan, and U. Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation J. Network Comput. Appl. 40 2014 31 45
-
(2014)
J. Network Comput. Appl.
, vol.40
, pp. 31-45
-
-
Varadharajan, V.1
Tupakula, U.2
-
107
-
-
84895138157
-
Cloud adoption issues: Interoperability and security
-
V. Vladimir, Cloud adoption issues: interoperability and security, in: Cloud Computing and Big Data, 2013, pp. 53-65.
-
(2013)
Cloud Computing and Big Data
, pp. 53-65
-
-
Vladimir, V.1
-
108
-
-
84863392301
-
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, and R.H. Deng HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing IEEE Trans. Inform. Forensics Sec. 7 2 2012 743 754
-
(2012)
IEEE Trans. Inform. Forensics Sec.
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
109
-
-
84864186350
-
An improved vTPM migration protocol based trusted channel
-
X. Wan, X.F. Zhang, L. Chen, J.X. Zhu, An improved vTPM migration protocol based trusted channel, in: IEEE International Conference on Systems and Informatics, 2012, pp. 870-875.
-
(2012)
IEEE International Conference on Systems and Informatics
, pp. 870-875
-
-
Wan, X.1
Zhang, X.F.2
Chen, L.3
Zhu, J.X.4
-
110
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou Toward secure and dependable storage services in cloud computing IEEE Trans. Services Comput. 5 2 2012 220 232
-
(2012)
IEEE Trans. Services Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
111
-
-
84860595860
-
Isolating commodity hosted hypervisors with hyperlock
-
Z. Wang, C. Wu, M. Grace, X. Jiang, Isolating commodity hosted hypervisors with hyperlock, in: Proceedings of the 7th ACM European Conference on Computer Systems, 2012, pp. 127-140.
-
(2012)
Proceedings of the 7th ACM European Conference on Computer Systems
, pp. 127-140
-
-
Wang, Z.1
Wu, C.2
Grace, M.3
Jiang, X.4
-
112
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer Berlin, Heidelberg
-
B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology EUROCRYPT 2005 Springer Berlin, Heidelberg 114 127
-
(2005)
Advances in Cryptology EUROCRYPT
, pp. 114-127
-
-
Waters, B.1
-
113
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
J. Wei, X. Zhang, G. Ammons, V. Bala, P. Ning, Managing security of virtual machine images in a cloud environment, in: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, 2009, pp. 91-96
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
114
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 371 386
-
(2014)
Inform. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
115
-
-
84923619996
-
Taming hosted hypervisors with (mostly) deprivileged execution
-
San Diego, CA
-
C. Wu, Z. Wang, X. Jiang, Taming hosted hypervisors with (mostly) deprivileged execution, in: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2013.
-
(2013)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Wu, C.1
Wang, Z.2
Jiang, X.3
-
116
-
-
79952671882
-
Network security for virtual machine in cloud computing
-
H. Wu, Y. Ding, C. Winer, L. Yao, Network security for virtual machine in cloud computing, in: 5th International Conference on Computer Sciences and Convergence Information Technology, 2010, pp. 18-21.
-
(2010)
5th International Conference on Computer Sciences and Convergence Information Technology
, pp. 18-21
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
117
-
-
84883723042
-
Design and implementation of cloud API access control based on OAuth
-
M.Y. Wu, T.H. Lee, Design and implementation of cloud API access control based on OAuth, in: IEEE TENCON Spring Conference, 2013, pp. 485-489.
-
(2013)
IEEE TENCON Spring Conference
, pp. 485-489
-
-
Wu, M.Y.1
Lee, T.H.2
-
118
-
-
84880265063
-
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks
-
Y. Xia, Y. Liu, H. Chen, Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks, in: IEEE 19th International Symposium on High Performance Computer Architecture, 2013, pp. 246-257.
-
(2013)
IEEE 19th International Symposium on High Performance Computer Architecture
, pp. 246-257
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
-
119
-
-
84880879632
-
Defending against VM rollback attack
-
Y. Xia, Y. Liu, H. Chen, B. Zang, Defending against VM rollback attack, in: IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops, 2012, pp. 1-5.
-
(2012)
IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops
, pp. 1-5
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
120
-
-
84885205587
-
Snortflow: A openflow-based intrusion prevention system in cloud environment
-
T. Xing, D. Huang, L. Xu, C. Chung, P. Khatkar, Snortflow: a openflow-based intrusion prevention system in cloud environment, in: IEEE Research and Educational Experiment Workshop, 2013, pp. 89-92.
-
(2013)
IEEE Research and Educational Experiment Workshop
, pp. 89-92
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.4
Khatkar, P.5
-
121
-
-
84877272118
-
Security and privacy in cloud computing
-
Z. Xiao, and Y. Xiao Security and privacy in cloud computing IEEE Commun. Surveys Tutorials 15 2 2013 843 859
-
(2013)
IEEE Commun. Surveys Tutorials
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
122
-
-
84886084180
-
Design role-based multi-tenancy access control scheme for cloud services
-
S. Yang, P. Lai, J. Lin, Design role-based multi-tenancy access control scheme for cloud services, in: IEEE International Symposium on Biometrics and Security Technologies (ISBAST), 2013, pp. 273-279.
-
(2013)
IEEE International Symposium on Biometrics and Security Technologies (ISBAST)
, pp. 273-279
-
-
Yang, S.1
Lai, P.2
Lin, J.3
-
123
-
-
84901427258
-
A survey on trust management for Internet of things
-
Z. Yan, P. Zhang, and A.V. Vasilakos A survey on trust management for Internet of things J. Netw. Comput. Appl. 42 2014 120 134
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
124
-
-
84891842869
-
Efficient location aware intrusion detection to protect mobile devices
-
S. Yazji, P. Scheuermann, R.P. Dick, G. Trajcevski, and R. Jin Efficient location aware intrusion detection to protect mobile devices Personal Ubiquitous Comput. 18 1 2014 143 162
-
(2014)
Personal Ubiquitous Comput.
, vol.18
, Issue.1
, pp. 143-162
-
-
Yazji, S.1
Scheuermann, P.2
Dick, R.P.3
Trajcevski, G.4
Jin, R.5
-
125
-
-
84896633141
-
-
Technical Report, Liverpool John Moores University, United Kingdom, Tech. Rep.
-
Y.A. Younis, M. Merabti, K. Kifayat, Secure cloud computing for critical infrastructure: a survey, Technical Report, Liverpool John Moores University, United Kingdom, Tech. Rep. ISBN: 978-1-902560-27-4, 2013.
-
(2013)
Secure Cloud Computing for Critical Infrastructure: A Survey
-
-
Younis, Y.A.1
Merabti, M.2
Kifayat, K.3
-
128
-
-
84885310053
-
Security-preserving live migration of virtual machines in the cloud
-
F. Zhang, and H. Chen Security-preserving live migration of virtual machines in the cloud J. Netw. Syst. Manage. 21 4 2013 562 587
-
(2013)
J. Netw. Syst. Manage.
, vol.21
, Issue.4
, pp. 562-587
-
-
Zhang, F.1
Chen, H.2
-
129
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
F. Zhang, J. Chen, H. Chen, B. Zang, Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization, in: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011, pp. 203-216.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|