-
3
-
-
79751493181
-
Locking the sky: a survey on IaaS cloud security
-
Vaquero L, Rodero-Merino L, Moran D: Locking the sky: a survey on IaaS cloud security. Computing 2011, 91: 93-118.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Moran, D.3
-
8
-
-
84926428159
-
-
Amazon Service Health Dashboard 2011
-
Amazon Service Health Dashboard 2011.
-
-
-
-
10
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Recent Advances in Intrusion Detection Systems
-
Spafford EH, Zamboni D: Intrusion detection using autonomous agents. Comput Networks 2000, 34(4): 547-570. Recent Advances in Intrusion Detection Systems.
-
(2000)
Comput Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
11
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
Lou W
-
Wang C, Wang Q: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM, 2010 Proceedings IEEE. Lou W; 2010: 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
-
12
-
-
80053957073
-
Dynamic Audit Services for Outsourced Storages in Clouds
-
Zhu Y, Ahn G, Hu H, Yau S: Dynamic Audit Services for Outsourced Storages in Clouds. Services Comput, IEEE Trans on 2011, 99: 1.
-
(2011)
Services Comput, IEEE Trans on
, vol.99
, pp. 1
-
-
Zhu, Y.1
Ahn, G.2
Hu, H.3
Yau, S.4
-
13
-
-
83455220824
-
A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures. In Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
-
Massonet P, Naqvi S, Ponsard C, Latanicki J, Rochwerger B, Villari M: A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures. In Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW). 2011 IEEE International Symposium on 2011, 1510-1517.
-
(2011)
2011 IEEE International Symposium on
, pp. 1510-1517
-
-
Massonet, P.1
Naqvi, S.2
Ponsard, C.3
Latanicki, J.4
Rochwerger, B.5
Villari, M.6
-
15
-
-
84926427158
-
-
Hoss C, Johnston S, Reese G, Sapiro B: CloudAudit 1. 0 - Automated Audit, Assertion, Assessment, and Assurance API (A6) Tech. rep. Internet Engineering Task Force - Internet Draft - Experimental. 2010.
-
(2010)
CloudAudit 1.0 - Automated Audit, Assertion, Assessment, and Assurance API (A6) Tech. Rep. Internet Engineering Task Force - Internet Draft - Experimental
-
-
Hoss, C.1
Johnston, S.2
Reese, G.3
Sapiro, B.4
-
21
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Garcia-Teodoro P, Daaz-Verdejo J, Macia-Fernandez G, Vazquez E: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Security 2009, 28(1-2): 18-28. [http://linkinghub. elsevier. com/retrieve/pii/S0167404808000692].
-
(2009)
Comput Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Daaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
22
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha A, Park JM: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput Networks 2007, 51(12): 3448-3470. [http://linkinghub. elsevier. com/retrieve/pii/S138912860700062X].
-
(2007)
Comput Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
23
-
-
77950559014
-
Intrusion Detection in the Cloud
-
Roschke S, Cheng F, Meinel C: Intrusion Detection in the Cloud. Dependable, Autonomic and Secure Computing, 2009 2009, 729-734. [http://dx. doi. org/10. 1109/DASC. 2009. 94].
-
(2009)
Dependable, Autonomic and Secure Computing, 2009
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
24
-
-
77954931494
-
Intrusion Detection for Grid and Cloud Computing
-
Vieira K, Schulter A, Westphall CB, Westphall CM: Intrusion Detection for Grid and Cloud Computing. It Professional 2010, 12(4): 38-43. [http://ieeexplore. ieee. org/lpdocs/epic03/wrapper. htm?arnumber=5232794].
-
(2010)
It Professional
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
26
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
New York
-
Wei J, Zhang X, Ammons G, Bala V, Ning P: Managing security of virtual machine images in a cloud environment. In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09. New York; 2009: 91-96. [http://doi. acm. org/10. 1145/1655008. 1655021].
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
27
-
-
84857146691
-
Securing Virtualized Infrastructure: From Static Security to Virtual Shields
-
Antonopoulos A
-
Antonopoulos A: Securing Virtualized Infrastructure: From Static Security to Virtual Shields. Tech. rep., Nemertes Research 2007. [http://hackreport. net/wp-content/uploads/2007/03/nemertes-issue-paper-securing-virtualized-infrastructure. pdf].
-
(2007)
Tech. Rep., Nemertes Research
-
-
-
28
-
-
84888365606
-
An active DBMS style activity service for cloud environments
-
Schaaf M, Koschel A, Grivas SG, Astrova I: An active DBMS style activity service for cloud environments. Cloud Computing 2010: The First International Conference on Cloud Computing, GRIDs, and Virtualization in Cloud Computing 2010 in ComputationWorld 2010 IARIA 2010, 80-85.
-
(2010)
Cloud Computing 2010: The First International Conference on Cloud Computing, GRIDs, and Virtualization in Cloud Computing 2010 in ComputationWorld 2010 IARIA
, pp. 80-85
-
-
Schaaf, M.1
Koschel, A.2
Grivas, S.G.3
Astrova, I.4
-
32
-
-
0038391162
-
Agent based intrusion detection and response system for wireless LANs
-
Chirumamilla M, Ramamurthy B: Agent based intrusion detection and response system for wireless LANs. Communications, 2003. ICC '03 2003, 492-496.
-
(2003)
Communications, 2003. ICC '03
, pp. 492-496
-
-
Chirumamilla, M.1
Ramamurthy, B.2
-
35
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
Balasubramaniyan J, Garcia-Fernandez J, Isacoff D, Spafford E, Zamboni D: An architecture for intrusion detection using autonomous agents. Computer Security Applications Conference, 1998, Proceedings., 14th Annual, 1998, pp 13-24.
-
(1998)
Computer Security Applications Conference, 1998, Proceedings., 14th Annual,
, pp. 13-24
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
36
-
-
62949125343
-
Design and implementation of intrusion detection based on mobile agents
-
Mo Y, Ma Y, Xu L: Design and implementation of intrusion detection based on mobile agents. IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on, 2008, pp 278-281.
-
(2008)
IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on,
, pp. 278-281
-
-
Mo, Y.1
Ma, Y.2
Xu, L.3
-
37
-
-
71249124937
-
An architecture of a distributed intrusion detection system using cooperating agents
-
Sen J, Sengupta I, Chowdhury P: An architecture of a distributed intrusion detection system using cooperating agents. Computing Informatics, 2006. ICOCI '06. International Conference on, 2006, pp 1-6.
-
(2006)
Computing Informatics, 2006. ICOCI '06. International Conference on,
, pp. 1-6
-
-
Sen, J.1
Sengupta, I.2
Chowdhury, P.3
-
39
-
-
84877886126
-
Sicherheitsprobleme für IT Outsourcing basierend auf Cloud Computing
-
Doelitzscher F, Ardelt M, Knahl M, Reich C: Sicherheitsprobleme für IT Outsourcing basierend auf Cloud Computing. HMD - Praxis der Wirtschaftsinformatik 2011, 281: 62.
-
(2011)
HMD - Praxis Der Wirtschaftsinformatik
, vol.281
, pp. 62
-
-
Doelitzscher, F.1
Ardelt, M.2
Knahl, M.3
Reich, C.4
-
42
-
-
0000949239
-
GrIDS - A Graph Based Intrusion Detection System For Large Networks
-
Staniford-chen S, Cheung S, Crawford R, Dilger M, Frank J, Hoagl J, Levitt K, Wee C, Yip R, Zerkle D: GrIDS - A Graph Based Intrusion Detection System For Large Networks. Proceedings of the 19th National Information Systems Security Conference, 1996, pp 361-370.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference,
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagl, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
43
-
-
84926427047
-
Systemautomatisierung
-
[10.1007/978-3-540-46165-4_9], Berlin: Heidelberg
-
Schneider J: Systemautomatisierung. In Kircher H(ed) IT,. Berlin Heidelberg; 2007: pp 110-123. [10. 1007/978-3-540-46165-4_9]. [http://dx. doi. org/10. 1007/978-3-540-46165-4_9].
-
(2007)
Kircher H(Ed) IT
, pp. 110-123
-
-
Schneider, J.1
-
44
-
-
71749113675
-
Cloud Infrastructure & Applications - CloudIA
-
10.1007/978-3-540-46165-4_9, China: Beijing
-
Sulistio A, Reich C, Dölitzscher F: Cloud Infrastructure & Applications - CloudIA. In Proceedings of the 1st International Conference on Cloud Computing (CloudCom'09),. Beijing, China; 2009: pp 583-588. [http://dx. doi. org/10. 1007/978-3-642-10665-1_56].
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing (CloudCom'09),
, pp. 583-588
-
-
Sulistio, A.1
Reich, C.2
Dölitzscher, F.3
-
45
-
-
59649128238
-
Agent mobility architecture based on IEEE-FIPA standards
-
Cucurull J, Marti R, Navarro-Arribas G, Robles S, Overeinder B, Borrell J: Agent mobility architecture based on IEEE-FIPA standards. Comput Commun 2009, 32(4): 712-729.
-
(2009)
Comput Commun
, vol.32
, Issue.4
, pp. 712-729
-
-
Cucurull, J.1
Marti, R.2
Navarro-Arribas, G.3
Robles, S.4
Overeinder, B.5
Borrell, J.6
-
48
-
-
84926428155
-
Cloudburst
-
Kortchinsky K: Cloudburst. Black Hat USA 2009. [http://www. blackhat. com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER. pdf].
-
(2009)
Black Hat USA
-
-
Kortchinsky, K.1
-
49
-
-
84881139601
-
Virtunoid: A KVM Guest → Host privilege, escalation exploit
-
Elhage N: Virtunoid: A KVM Guest → Host privilege, escalation exploit. Black Hat USA 2011. [http://media. blackhat. com/bh-us-11/Elhage/BH_US_11_Elhage_Virtunoid_WP. pdf].
-
(2011)
Black Hat USA
-
-
Elhage, N.1
-
51
-
-
24744463407
-
Scalability and Performance of JADE Message Transport System
-
Cortese E, Quarta F, Vitaglione G, Lab TI, Direzionale C, Message J, System T: Scalability and Performance of JADE Message Transport System. Journal of Analysis of Suitability for Holonic Manufacturing Systems 2002, 3(3): 52-65. [http://citeseer. ist. psu. edu/vitaglione02scalability. html].
-
(2002)
Journal of Analysis of Suitability for Holonic Manufacturing Systems
, vol.3
, Issue.3
, pp. 52-65
-
-
Cortese, E.1
Quarta, F.2
Vitaglione, G.3
Lab, T.I.4
Direzionale, C.5
Message, J.6
System, T.7
-
55
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Garcia-Teodoro P, Daaz-Verdejo J, Macia-Fernandez G, Vazquez E: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Security 2009, 28(1-2): 18-28. [http://linkinghub. elsevier. com/retrieve/pii/S0167404808000692].
-
(2009)
Comput Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Daaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
56
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha A, Park JM: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput Networks 2007, 51(12): 3448-3470. [http://linkinghub. elsevier. com/retrieve/pii/S138912860700062X].
-
(2007)
Comput Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
57
-
-
77950559014
-
Intrusion Detection in the Cloud
-
Roschke S, Cheng F, Meinel C: Intrusion Detection in the Cloud. Dependable, Autonomic and Secure Computing, 2009 2009, 729-734. [http://dx. doi. org/10. 1109/DASC. 2009. 94].
-
(2009)
Dependable, Autonomic and Secure Computing, 2009
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
58
-
-
77954931494
-
Intrusion Detection for Grid and Cloud Computing
-
Vieira K, Schulter A, Westphall CB, Westphall CM: Intrusion Detection for Grid and Cloud Computing. It Professional 2010, 12(4): 38-43. [http://ieeexplore. ieee. org/lpdocs/epic03/wrapper. htm?arnumber=5232794].
-
(2010)
It Professional
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
60
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
New York
-
Wei J, Zhang X, Ammons G, Bala V, Ning P: Managing security of virtual machine images in a cloud environment. In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09. New York; 2009: 91-96. [http://doi. acm. org/10. 1145/1655008. 1655021].
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
61
-
-
84857146691
-
Securing Virtualized Infrastructure: From Static Security to Virtual Shields
-
Antonopoulos A
-
Antonopoulos A: Securing Virtualized Infrastructure: From Static Security to Virtual Shields. Tech. rep., Nemertes Research 2007. [http://hackreport. net/wp-content/uploads/2007/03/nemertes-issue-paper-securing-virtualized-infrastructure. pdf].
-
(2007)
Tech. Rep., Nemertes Research
-
-
-
62
-
-
84888365606
-
An active DBMS style activity service for cloud environments
-
Schaaf M, Koschel A, Grivas SG, Astrova I: An active DBMS style activity service for cloud environments. Cloud Computing 2010: The First International Conference on Cloud Computing, GRIDs, and Virtualization in Cloud Computing 2010 in ComputationWorld 2010 IARIA 2010, 80-85.
-
(2010)
Cloud Computing 2010: The First International Conference on Cloud Computing, GRIDs, and Virtualization in Cloud Computing 2010 in ComputationWorld 2010 IARIA
, pp. 80-85
-
-
Schaaf, M.1
Koschel, A.2
Grivas, S.G.3
Astrova, I.4
-
66
-
-
0038391162
-
Agent based intrusion detection and response system for wireless LANs
-
Chirumamilla M, Ramamurthy B: Agent based intrusion detection and response system for wireless LANs. Communications, 2003. ICC '03 2003, 492-496.
-
(2003)
Communications, 2003. ICC '03
, pp. 492-496
-
-
Chirumamilla, M.1
Ramamurthy, B.2
-
69
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
Balasubramaniyan J, Garcia-Fernandez J, Isacoff D, Spafford E, Zamboni D: An architecture for intrusion detection using autonomous agents. Computer Security Applications Conference, 1998, Proceedings., 14th Annual, 1998, pp 13-24.
-
(1998)
Computer Security Applications Conference, 1998, Proceedings., 14th Annual,
, pp. 13-24
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
70
-
-
62949125343
-
Design and implementation of intrusion detection based on mobile agents
-
Mo Y, Ma Y, Xu L: Design and implementation of intrusion detection based on mobile agents. IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on, 2008, pp 278-281.
-
(2008)
IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on,
, pp. 278-281
-
-
Mo, Y.1
Ma, Y.2
Xu, L.3
-
71
-
-
71249124937
-
An architecture of a distributed intrusion detection system using cooperating agents
-
Sen J, Sengupta I, Chowdhury P: An architecture of a distributed intrusion detection system using cooperating agents. Computing Informatics, 2006. ICOCI '06. International Conference on, 2006, pp 1-6.
-
(2006)
Computing Informatics, 2006. ICOCI '06. International Conference on,
, pp. 1-6
-
-
Sen, J.1
Sengupta, I.2
Chowdhury, P.3
-
73
-
-
84877886126
-
Sicherheitsprobleme für IT Outsourcing basierend auf Cloud Computing
-
Doelitzscher F, Ardelt M, Knahl M, Reich C: Sicherheitsprobleme für IT Outsourcing basierend auf Cloud Computing. HMD - Praxis der Wirtschaftsinformatik 2011, 281: 62.
-
(2011)
HMD - Praxis Der Wirtschaftsinformatik
, vol.281
, pp. 62
-
-
Doelitzscher, F.1
Ardelt, M.2
Knahl, M.3
Reich, C.4
-
76
-
-
0000949239
-
GrIDS - A Graph Based Intrusion Detection System For Large Networks
-
Staniford-chen S, Cheung S, Crawford R, Dilger M, Frank J, Hoagl J, Levitt K, Wee C, Yip R, Zerkle D: GrIDS - A Graph Based Intrusion Detection System For Large Networks. Proceedings of the 19th National Information Systems Security Conference, 1996, pp 361-370.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference,
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagl, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
77
-
-
84926427047
-
Systemautomatisierung
-
[10.1007/978-3-540-46165-4_9], Berlin: Heidelberg
-
Schneider J: Systemautomatisierung. In Kircher H(ed) IT,. Berlin Heidelberg; 2007: pp 110-123. [10. 1007/978-3-540-46165-4_9]. [http://dx. doi. org/10. 1007/978-3-540-46165-4_9].
-
(2007)
Kircher H(Ed) IT,
, pp. 110-123
-
-
Schneider, J.1
-
79
-
-
59649128238
-
Agent mobility architecture based on IEEE-FIPA standards
-
Cucurull J, Marti R, Navarro-Arribas G, Robles S, Overeinder B, Borrell J: Agent mobility architecture based on IEEE-FIPA standards. Comput Commun 2009, 32(4): 712-729.
-
(2009)
Comput Commun
, vol.32
, Issue.4
, pp. 712-729
-
-
Cucurull, J.1
Marti, R.2
Navarro-Arribas, G.3
Robles, S.4
Overeinder, B.5
Borrell, J.6
-
82
-
-
84926428155
-
Cloudburst
-
Kortchinsky K: Cloudburst. Black Hat USA 2009. [http://www. blackhat. com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER. pdf].
-
(2009)
Black Hat USA
-
-
Kortchinsky, K.1
-
83
-
-
84881139601
-
Virtunoid: A KVM Guest → Host privilege, escalation exploit
-
Elhage N: Virtunoid: A KVM Guest → Host privilege, escalation exploit. Black Hat USA 2011. [http://media. blackhat. com/bh-us-11/Elhage/BH_US_11_Elhage_Virtunoid_WP. pdf].
-
(2011)
Black Hat USA
-
-
Elhage, N.1
-
85
-
-
24744463407
-
Scalability and Performance of JADE Message Transport System
-
Cortese E, Quarta F, Vitaglione G, Lab TI, Direzionale C, Message J, System T: Scalability and Performance of JADE Message Transport System. Journal of Analysis of Suitability for Holonic Manufacturing Systems 2002, 3(3): 52-65. [http://citeseer. ist. psu. edu/vitaglione02scalability. html
-
(2002)
Journal of Analysis of Suitability for Holonic Manufacturing Systems
, vol.3
, Issue.3
, pp. 52-65
-
-
Cortese, E.1
Quarta, F.2
Vitaglione, G.3
Lab, T.I.4
Direzionale, C.5
Message, J.6
System, T.7
|