-
1
-
-
84878341131
-
Cloud monitoring: A survey
-
(June 2013)
-
G. Aceto, A. Botta, W. De Donato, and A. Pescapè. 2013. Cloud monitoring: A survey. Computer Networks 57, 9 (June 2013), 2093-2115.
-
(2013)
Computer Networks
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
Botta, A.2
De Donato, W.3
Pescapè, A.4
-
2
-
-
84938399371
-
-
Advanced Security Service cERTificate for SOA.. Retrieved from
-
Advanced Security Service cERTificate for SOA. 2010. Advanced Security Service cERTificate for SOA. Retrieved from http://assert4soa.eu/.
-
(2010)
Advanced Security Service CERTificate for SOA
-
-
-
3
-
-
84897070785
-
An overview of issues and recent developments in cloud computing and storage security
-
B.-Y. Choi, K. Han, and S. Song (Eds.). Springer
-
E. Aguiar, Y. Zhang, and M. Blanton. 2013. An overview of issues and recent developments in cloud computing and storage security. In High Performance Semantic Cloud Auditing, B.-Y. Choi, K. Han, and S. Song (Eds.). Springer.
-
(2013)
High Performance Semantic Cloud Auditing
-
-
Aguiar, E.1
Zhang, Y.2
Blanton, M.3
-
6
-
-
84917680927
-
-
CoRR abs/1312.6170 (2013)
-
K. Alhamazani, R. Ranjan, K. Mitra, F. Rabhi, S.U. Khan, A. Guabtni, and V. Bhatnagar. 2013. An overview of the commercial cloud monitoring tools: Research dimensions, design issues, and state-of-the-art. CoRR abs/1312.6170 (2013).
-
(2013)
An Overview of the Commercial Cloud Monitoring Tools: Research Dimensions, Design Issues, and State-of-the-art
-
-
Alhamazani, K.1
Ranjan, R.2
Mitra, K.3
Rabhi, F.4
Khan, S.U.5
Guabtni, A.6
Bhatnagar, V.7
-
7
-
-
77956580783
-
Cloud computing security management
-
March-April. Sharjah, UAE
-
S. A. Almulla and C. Y. Yeun. March-April 2010. Cloud computing security management. In Proc. of ICESMA 2010. Sharjah, UAE.
-
(2010)
Proc. of ICESMA 2010
-
-
Almulla, S.A.1
Yeun, C.Y.2
-
8
-
-
14544269326
-
GridICE: A monitoring service for grid systems
-
April 2005
-
S. Andreozzi, N. De Bortoli, S. Fantinel, A. Ghiselli, G. Rubini, G. Tortone, and M. C. Vistoli. 2005. GridICE: A monitoring service for grid systems. Future Generation Computer Systems 21, 4 (April 2005), 559-571.
-
(2005)
Future Generation Computer Systems
, vol.21
, Issue.4
, pp. 559-571
-
-
Andreozzi, S.1
De Bortoli, N.2
Fantinel, S.3
Ghiselli, A.4
Rubini, G.5
Tortone, G.6
Vistoli, M.C.7
-
9
-
-
84938364863
-
-
Aniketos, ASSERT4SOA, CUMULUS, SecCord. Retrieved from
-
Aniketos, ASSERT4SOA, CUMULUS, SecCord. 2013. Specifications identification & gap analysis Use cases 43, 78, 80. Retrieved from http://csc.etsi.org/Application/documentapp/downloadimmediate/?docId=123.
-
(2013)
Specifications Identification & Gap Analysis Use Cases 43, 78, 80
-
-
-
11
-
-
84891823464
-
Security certification of composite services: A test-based approach
-
June-July
-
M. Anisetti, C. A. Ardagna, and E. Damiani. June-July 2013a. Security certification of composite services: A test-based approach. In Proc. of IEEE ICWS 2013.
-
(2013)
Proc. of IEEE ICWS 2013
-
-
Anisetti, M.1
Ardagna, C.A.2
Damiani, E.3
-
12
-
-
84919666193
-
E-Auctions for multi-cloud service provisioning
-
Anchorage, AL, USA
-
M. Anisetti, C. A. Ardagna, E. Damiani, P. A. Bonatti, M. Faella, C. Galdi, and L. Sauro. 2014. e-Auctions for multi-cloud service provisioning. In Proc. of IEEE SCC 2014. Anchorage, AL, USA.
-
(2014)
Proc. of IEEE SCC 2014
-
-
Anisetti, M.1
Ardagna, C.A.2
Damiani, E.3
Bonatti, P.A.4
Faella, M.5
Galdi, C.6
Sauro, L.7
-
13
-
-
84879910325
-
A test-based security certification scheme for web services
-
(May 2013)
-
M. Anisetti, C. A. Ardagna, E. Damiani, and F. Saonara. 2013b. A test-based security certification scheme for web services. ACM TWEB 7, 2 (May 2013), 1-41.
-
(2013)
ACM TWEB
, vol.7
, Issue.2
, pp. 1-41
-
-
Anisetti, M.1
Ardagna, C.A.2
Damiani, E.3
Saonar, F.4
-
14
-
-
84901455703
-
On the management of cloud nonfunctional properties: The cloud transparency toolkit
-
March-April
-
C. A. Ardagna, R. Asal, E. Damiani, and Q. H. Vu. March-April 2014. On the management of cloud nonfunctional properties: The cloud transparency toolkit. In Proc. of IFIP NTMS 2014.
-
(2014)
Proc. of IFIP NTMS 2014
-
-
Ardagna, C.A.1
Asal, R.2
Damiani, E.3
Vu, Q.H.4
-
16
-
-
68249129760
-
-
Tech. Rep. UCB/EECS-2009-28. EECS Department, U.C. Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. 2009. Above the Clouds: A Berkeley Review of Cloud Computing. In Tech. Rep. UCB/EECS-2009-28. EECS Department, U.C. Berkeley.
-
(2009)
Above the Clouds: A Berkeley Review of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
17
-
-
77950347409
-
A view of cloud computing
-
(April 2010)
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. 2010. A view of cloud computing. CACM 53, 4 (April 2010), 50-58.
-
(2010)
CACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
18
-
-
84899712053
-
-
NIST Special Publication 500-299. Retrieved from
-
W. W. Armour et al. 2013. NIST Cloud Computing Security Reference Architecture. NIST Special Publication 500-299. Retrieved from http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST-Security-Reference-Architecture-2013.05.15-v1.0.pdf.
-
(2013)
NIST Cloud Computing Security Reference Architecture
-
-
Armour, W.W.1
-
19
-
-
84938410811
-
Sharing-based privacy and availability of cloud data warehouses
-
September
-
V. Attasena, N. Harbi, and J. Darmont. September 2013. Sharing-based privacy and availability of cloud data warehouses. In Proc. of EDA 2013.
-
(2013)
Proc. of EDA 2013
-
-
Attasena, V.1
Harbi, N.2
Darmont, J.3
-
21
-
-
84900000827
-
Information flow control for secure cloud computing
-
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. 2014. Information flow control for secure cloud computing. IEEE TNSM (2014).
-
(2014)
IEEE TNSM (2014)
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.3
Singh, J.4
Papagiannis, I.5
Pietzuch, P.6
-
24
-
-
84887308413
-
Security and availability techniques for cloud-based applications
-
(October 2013)
-
G. Ballabio. 2013. Security and availability techniques for cloud-based applications. Computer Fraud & Security 2013, 10 (October 2013), 5-7.
-
(2013)
Computer Fraud & Security
, vol.2013
, Issue.10
, pp. 5-7
-
-
Ballabio, G.1
-
25
-
-
33750060523
-
Dynamo: Dynamic monitoring of WS-BPEL processes
-
December
-
L. Baresi and S. Guinea. December 2005. Dynamo: Dynamic monitoring of WS-BPEL processes. In Proc. of ICSOC 2005.
-
(2005)
Proc. of ICSOC 2005
-
-
Baresi, L.1
Guinea, S.2
-
26
-
-
84887982439
-
Enabling dynamic data and indirect mutual trust for cloud computing storage systems
-
(December 2013)
-
A. Barsoum and A. Hasan. 2013. Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE TPDS 24, 12 (December 2013), 2375-2385.
-
(2013)
IEEE TPDS
, vol.24
, Issue.12
, pp. 2375-2385
-
-
Barsoum, A.1
Hasan, A.2
-
27
-
-
84938413685
-
A distributed and privacy-preservingmethod for network intrusion detection
-
October 2010
-
F. Benali, N. Bennani, G. Gianini, and S. Cimato. October 2010. A distributed and privacy-preservingmethod for network intrusion detection. In Proc. of OTM 2010.
-
(2010)
Proc. of OTM
-
-
Benali, F.1
Bennani, N.2
Gianini, G.3
Cimato, S.4
-
28
-
-
84938397472
-
Toward cloud-based key management for outsourced databases
-
July
-
N. Bennani, E. Damiani, and S. Cimato. July 2010. Toward cloud-based key management for outsourced databases. In Proc. of SAPSE 2010.
-
(2010)
Proc. of SAPSE 2010
-
-
Bennani, N.1
Damiani, E.2
Cimato, S.3
-
29
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
July-August
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. July-August 2006. vTPM: Virtualizing the trusted platform module. In Proc. of USENIX-SS 2006.
-
(2006)
Proc. of USENIX-SS 2006
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
32
-
-
80053148327
-
Certicloud: A novel TPM-based approach to ensure cloud IaaS security
-
July
-
B. Bertholon, S. Varrette, and P. Bouvry. July 2011. Certicloud: A novel TPM-based approach to ensure cloud IaaS security. In Proc. of IEEE CLOUD 2011.
-
(2011)
Proc. of IEEE CLOUD 2011
-
-
Bertholon, B.1
Varrette, S.2
Bouvry, P.3
-
34
-
-
41149174088
-
Monitoring conversational web services
-
September. Dubrovnik, Croati
-
D. Bianculli and C. Ghezzi. September 2007. Monitoring conversational web services. In Proc. of IW-SOSWE 2007. Dubrovnik, Croatia.
-
(2007)
Proc. of IW-SOSWE 2007
-
-
Bianculli, D.1
Ghezzi, C.2
-
35
-
-
85180628981
-
Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud
-
February
-
A. Birgisson, J. G. Politz, U. Erlingsson, A. Taly, M. Vrable, and M. Lentczner. February 2014. Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud. In Proc. of NDSS 2014.
-
(2014)
Proc. of NDSS 2014
-
-
Birgisson, A.1
Politz, J.G.2
Erlingsson, U.3
Taly, A.4
Vrable, M.5
Lentczner, M.6
-
41
-
-
84897586246
-
Security and privacy-enhancing multicloud architectures
-
(July-August 2013)
-
J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. 2013. Security and privacy-enhancing multicloud architectures. IEEE Transactions on Dependable and Secure Computing 10, 4 (July-August 2013), 212-224.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 212-224
-
-
Bohli, J.-M.1
Gruschka, N.2
Jensen, M.3
Iacono, L.L.4
Marnau, N.5
-
43
-
-
0035483245
-
Fuzzy service selection in a distributed object-oriented environment
-
2001
-
P. Bosc, E. Damiani, and M. Fugini. 2001. Fuzzy service selection in a distributed object-oriented environment. IEEE TFS 9, 5 (2001), 682-698.
-
(2001)
IEEE TFS
, vol.9
, Issue.5
, pp. 682-698
-
-
Bosc, P.1
Damiani, E.2
Fugini, M.3
-
44
-
-
84891753751
-
Verifying cloud services: Present and future
-
(July 2013)
-
S. Bouchenak, G. Chockler, H. Chockler, G. Gheorghe, N. Santos, and A. Shraer. 2013. Verifying cloud services: Present and future. ACM SIGOPS Operating Systems Review 47, 2 (July 2013), 6-19.
-
(2013)
ACM SIGOPS Operating Systems Review
, vol.47
, Issue.2
, pp. 6-19
-
-
Bouchenak, S.1
Chockler, G.2
Chockler, H.3
Gheorghe, G.4
Santos, N.5
Shraer, A.6
-
45
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
November
-
K. D. Bowers, A. Juels, and A. Oprea. November 2009. HAIL: A high-availability and integrity layer for cloud storage. In Proc. of ACM CCS 2009.
-
(2009)
Proc. of ACM CCS 2009
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
46
-
-
84879116782
-
Risk perception and risk management in cloud computing: Results from a case study of Swiss companies
-
(June 2013)
-
N. Brender and I. Markov. 2013. Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. IJIM 33, 5 (June 2013), 726-733.
-
(2013)
IJIM
, vol.33
, Issue.5
, pp. 726-733
-
-
Brender, N.1
Markov, I.2
-
47
-
-
27644441348
-
Towards a taxonomy of software change: Research articles
-
September 2005
-
J. Buckley, T. Mens, M. Zenger, A. Rashid, and G. Kniesel. 2005. Towards a taxonomy of software change: Research articles. Journal of Software Maintenance and Evolution: Research and Practice - Unanticipated Software Evolution 17, 5 (September 2005), 309-332.
-
(2005)
Journal of Software Maintenance and Evolution: Research and Practice - Unanticipated Software Evolution
, vol.17
, Issue.5
, pp. 309-332
-
-
Buckley, J.1
Mens, T.2
Zenger, M.3
Rashid, A.4
Kniesel, G.5
-
49
-
-
84938325712
-
-
Retrieved from
-
Roland A. Burger, Christian Cachin, and Elmar Husmann. 2013. Cloud, Trust, Privacy - Trustworthy cloud computing whitepaper, 2013. Retrieved from http://www.zurich.ibm.com/-cca/papers/tclouds-white.pdf.
-
(2013)
Cloud, Trust, Privacy - Trustworthy Cloud Computing Whitepaper, 2013
-
-
Burger, R.A.1
Cachin, C.2
Husmann, E.3
-
50
-
-
84866670724
-
Side-channel attacks
-
H. C. A. van Tilborg and S. Jajodia (Eds.). Springer
-
T. Caddy. 2011. Side-channel attacks. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia (Eds.). Springer.
-
(2011)
Encyclopedia of Cryptography and Security
-
-
Caddy, T.1
-
52
-
-
84925655451
-
Merkle trees
-
L. Liu, M. T. Özsu, and M. Tamer (Eds.). Springer
-
B. Carminati. 2009. Merkle trees. In Encyclopedia of Database Systems, L. Liu, M. T. Özsu, and M. Tamer (Eds.). Springer.
-
(2009)
Encyclopedia of Database Systems
-
-
Carminati, B.1
-
53
-
-
84875209774
-
Mechanisms for SLA provisioning in cloud-based service providers
-
(February 2013)
-
E. Casalicchio and L. Silvestri. 2013. Mechanisms for SLA provisioning in cloud-based service providers. Computer Networks 57, 3 (February 2013), 795-810.
-
(2013)
Computer Networks
, vol.57
, Issue.3
, pp. 795-810
-
-
Casalicchio, E.1
Silvestri, L.2
-
54
-
-
77955959213
-
-
November. European Network and Information Security Agency (ENISA). Retreived from
-
D. Catteddu and G. Hogben. November 2009a. Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency (ENISA). Retreived from http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessm ent/at-download/fullReport.
-
(2009)
Cloud Computing: Benefits, Risks and Recommendations for Information Security
-
-
Catteddu, D.1
Hogben, G.2
-
57
-
-
84938402561
-
-
Certification infrastrUcture forMUlti-layer cloUd Services. Retrieved from
-
Certification infrastrUcture forMUlti-layer cloUd Services 2013. Certification infrastrUcture forMUlti-layer cloUd Services. Retrieved from http://www.cumulus-project.eu/.
-
(2013)
-
-
-
58
-
-
84938367514
-
-
Certification InteRnationalisation and standaRdization in cloUd Security, Certification, InteRnationalisation and standaRdization in cloUd Security. Retrieved from
-
Certification, InteRnationalisation and standaRdization in cloUd Security 2012. Certification, InteRnationalisation and standaRdization in cloUd Security. Retrieved from http://www.cirrus-project.eu/.
-
(2012)
-
-
-
62
-
-
77954327465
-
-
January, Technical Report No. UCB/EECS-2010-5. Retrieved from
-
Y. Chen, V. Paxson, and R. H. Katz. January 2010. What's New About Cloud Computing Security? Technical Report No. UCB/EECS-2010-5. Retrieved from http://www.eecs.Berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html.
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
63
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
(July 2011)
-
A. Chonka, Y. Xiang, W. Zhou, and A. Bonti. 2011. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Journal of Network and Computer Applications 34, 4 (July 2011), 1097-1107.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
64
-
-
84863238100
-
Dynamic secure cloud storage with provenance
-
D. Naccache (Ed.). Springer-Verlag, Berlin
-
S. S. M. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng. 2012. Dynamic secure cloud storage with provenance. In Cryptography and Security, D. Naccache (Ed.). Springer-Verlag, Berlin, 442-464.
-
(2012)
Cryptography and Security
, pp. 442-464
-
-
Chow, S.S.M.1
Chu, C.-K.2
Huang, X.3
Zhou, J.4
Deng, R.H.5
-
66
-
-
84891807562
-
Key-aggregate cryptosystem for scalable data sharing in cloud storage
-
(February 2014)
-
C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng. 2014. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE TPDS 25, 2 (February 2014), 468-477.
-
(2014)
IEEE TPDS
, vol.25
, Issue.2
, pp. 468-477
-
-
Chu, C.-K.1
Chow, S.S.M.2
Tzeng, W.-G.3
Zhou, J.4
Deng, R.H.5
-
69
-
-
79952951099
-
Cloud9: A software testing service
-
(January 2010)
-
L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, and G. Candea. 2010. Cloud9: A software testing service. ACM SIGOPS Operating Systems Review 43, 4 (January 2010), 5-10.
-
(2010)
ACM SIGOPS Operating Systems Review
, vol.43
, Issue.4
, pp. 5-10
-
-
Ciortea, L.1
Zamfir, C.2
Bucur, S.3
Chipounov, V.4
Candea, G.5
-
70
-
-
84881791018
-
Monitoring service clouds in the future internet
-
G. Tselentis, A. Galis, A. Gavras, S. Krco, V. Lotz, E. Simperl, B. Stiller, and T. Zahariadis (Eds.). IOS Press
-
S. Clayman, A. Galis, C. Chapman, G. Toffetti, L. Rodero-Merino, L. Miguel Vaquero, K. Nagin, and B. Rochwerger. 2010. Monitoring service clouds in the future internet. In Towards the Future Internet, G. Tselentis, A. Galis, A. Gavras, S. Krco, V. Lotz, E. Simperl, B. Stiller, and T. Zahariadis (Eds.). IOS Press, 115-126.
-
(2010)
Towards the Future Internet
, pp. 115-126
-
-
Clayman, S.1
Galis, A.2
Chapman, C.3
Toffetti, G.4
Rodero-Merino, L.5
Miguel Vaquero, L.6
Nagin, K.7
Rochwerger, B.8
-
71
-
-
84938313606
-
-
Cloud Accountability Project 2012. Cloud Accountability Project, Retrieved from
-
Cloud Accountability Project 2012. Cloud Accountability Project. Retrieved from http://www.a4cloud.eu/.
-
-
-
-
72
-
-
84868314580
-
-
Cloud Security Alliance. Retrieved from
-
Cloud Security Alliance. 2010. Guidance for Identity & Access Management V2.1. Retrieved from http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf.
-
(2010)
Guidance for Identity & Access Management V2.1
-
-
-
74
-
-
84886731331
-
-
Cloud Security Alliance
-
Cloud Security Alliance. 2013. The Notorious Nine Cloud Computing Top Threats in 2013. https://downloads.cloudsecurityalliance.org/initiatives/top-threats/The-Notorious-Nine-Cloud-Computing-Top-Threats-in-2013.pdf.
-
(2013)
The Notorious Nine Cloud Computing Top Threats in 2013
-
-
-
75
-
-
84938355655
-
-
Cloud Security on Demand. Retrieved from
-
Cloud Security on Demand 2012. Cloud Security on Demand. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1218817&HistoricalAwards=false.
-
(2012)
Cloud Security on Demand
-
-
-
76
-
-
84919771672
-
-
Cloud Standards Customer Council. August. Retrieved from
-
Cloud Standards Customer Council. August 2012. Security for Cloud Computing 10 Steps to Ensure Success. Retrieved from http://www.cloud-council.org/Security-for-Cloud-Computing-Final-080912.pdf.
-
(2012)
Security for Cloud Computing 10 Steps to Ensure Success
-
-
-
77
-
-
84938359639
-
-
CloudSec. October. Retrieved from
-
CloudSec. October 2013. A Briefing on Cloud Security Challenges and Opportunities. Retrieved from http://www.telenor.com/wp-content/uploads/2013/11/TelenorWhitepaperCloud-V-30-v.pdf.
-
(2013)
A Briefing on Cloud Security Challenges and Opportunities
-
-
-
78
-
-
84938348671
-
-
Continuous Quality Assurance and Optimisation for Cloud brokers. Retrieved from
-
Continuous Quality Assurance and Optimisation for Cloud brokers 2012. Continuous Quality Assurance and Optimisation for Cloud Brokers. Retrieved from http://www.broker-cloud.eu/.
-
(2012)
Continuous Quality Assurance and Optimisation for Cloud Brokers
-
-
-
80
-
-
84859433005
-
A survey of risks, threats and vulnerabilities in cloud computing
-
April, Amman, Jordan
-
K. Dahbur, B. Mohammad, and A. B. Tarakji. April 2011. A survey of risks, threats and vulnerabilities in cloud computing. In Proc. of ISWSA 2011. Amman, Jordan.
-
(2011)
Proc. of ISWSA 2011
-
-
Dahbur, K.1
Mohammad, B.2
Tarakji, A.B.3
-
83
-
-
77953172125
-
Infrastructure as a service security: Challenges and solutions
-
March
-
W. Dawoud, I. Takouna, and C. Meinel. March 2010. Infrastructure as a service security: Challenges and solutions. In Proc. of INFOS 2010.
-
(2010)
Proc. of INFOS 2010
-
-
Dawoud, W.1
Takouna, I.2
Meinel, C.3
-
84
-
-
84968747458
-
Integrity for join queries in the cloud
-
(July-December 2013)
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. 2013. Integrity for join queries in the cloud. IEEE TCC 1, 2 (July-December 2013), 187-200.
-
(2013)
IEEE TCC
, vol.1
, Issue.2
, pp. 187-200
-
-
De Vimercati Di Capitani, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
85
-
-
84929936983
-
Selective and fine-grained access to data in the cloud
-
S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer
-
S. De Capitani di Vimercati, S. Foresti, and P. Samarati. 2014. Selective and fine-grained access to data in the cloud. In Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer.
-
(2014)
Secure Cloud Computing
-
-
De Vimercati Di Capitani, S.1
Foresti, S.2
Samarati, P.3
-
86
-
-
84867658730
-
-
December. European Network and Information Security Agency (ENISA). Retrieved from
-
M. Dekker and G. Hogben. December 2011. Survey and analysis of security parameters in cloud SLAs across the European public sector. European Network and Information Security Agency (ENISA). Retrieved from http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/survey-and-analysisof-security-parameters-in-cloud-slas-across-the-european-public-sector/at-download/fullReport.
-
(2011)
Survey and Analysis of Security Parameters in Cloud SLAs Across the European Public Sector
-
-
Dekker, M.1
Hogben, G.2
-
87
-
-
84938371432
-
Covert channels
-
H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
-
Y. Desmedt. 2011. Covert channels. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
-
(2011)
Encyclopedia of Cryptography and Security
-
-
Desmedt, Y.1
-
88
-
-
84866747553
-
CloudProtect: Managing data privacy in cloud applications
-
June . Honolulu, HI, USA
-
M. H. Diallo, B. Hore, E.-C. Chang, S. Mehrotra, and N. Venkatasubramanian. June 2012. CloudProtect: Managing data privacy in cloud applications. In Proc. of IEEE CLOUD 2012. Honolulu, HI, USA.
-
(2012)
Proc. of IEEE CLOUD 2012
-
-
Diallo, M.H.1
Hore, B.2
Chang, E.-C.3
Mehrotra, S.4
Venkatasubramanian, N.5
-
89
-
-
84962362702
-
Understanding cloud audits
-
S. Pearson and G. Yee (Eds.). Springer London
-
F. Doelitzscher, C. Reich, M. Knahl, andN. Clarke. 2013. Understanding cloud audits. In Privacy and Security for Cloud Computing, S. Pearson and G. Yee (Eds.). Springer London, 125-163.
-
(2013)
Privacy and Security for Cloud Computing
, pp. 125-163
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
90
-
-
84926426274
-
An agent based business aware incident detection system for cloud environments
-
F. Doelitzscher, C. Reich, M. Knahl, A. Passfall, and N. Clarke. 2012. An agent based business aware incident detection system for cloud environments. JoCCASA 1, 1 (2012), 1-19.
-
(2012)
JoCCASA 2012
, vol.1
, Issue.1
, pp. 1-19
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Passfall, A.4
Clarke, N.5
-
91
-
-
84899708756
-
Sun behind clouds - On automatic cloud security audits and a cloud audit policy language
-
2013
-
F. Doelitzscher, T. Ruebsamen, T. Karbe, M. Knahl, C. Reich, and N. Clarke. 2013. Sun behind clouds - On automatic cloud security audits and a cloud audit policy language. International Journal on Advances in Networks and Services 6, 1-2 (2013), 1-16.
-
(2013)
International Journal on Advances in Networks and Services
, vol.6
, Issue.1-2
, pp. 1-16
-
-
Doelitzscher, F.1
Ruebsamen, T.2
Karbe, T.3
Knahl, M.4
Reich, C.5
Clarke, N.6
-
92
-
-
84886902973
-
Security assessment of virtual machines in open source clouds
-
May
-
A. Donevski, S. Ristov, and M. Gusev. May 2013. Security assessment of virtual machines in open source clouds. In Proc. of MIPRO 2013.
-
(2013)
Proc. of MIPRO 2013
-
-
Donevski, A.1
Ristov, S.2
Gusev, M.3
-
93
-
-
74549215709
-
Run-time verification of behavioural conformance for conversational web services
-
November
-
D. Dranidis, E. Ramollari, and D. Kourtesis. November 2009. Run-time verification of behavioural conformance for conversational web services. In Proc. of IEEE ECOWS 2009.
-
(2009)
Proc. of IEEE ECOWS 2009
-
-
Dranidis, D.1
Ramollari, E.2
Kourtesis, D.3
-
94
-
-
84894493160
-
Building resilient cloud services using DDDAS and moving target defence
-
2013
-
G. Dsouza, G. Rodriguez, Y. Al-Nashif, and S. Hariri. 2013. Building resilient cloud services using DDDAS and moving target defence. JCC 2, 2/3 (2013), 171-190.
-
(2013)
JCC
, vol.2
, Issue.2-3
, pp. 171-190
-
-
Dsouza, G.1
Rodriguez, G.2
Al-Nashif, Y.3
Hariri, S.4
-
97
-
-
84905819449
-
-
ETSI. November. Retrieved from
-
ETSI. November 2013. Cloud Standards Coordination - Final Report. Retrieved from http://csc.etsi.org/Application/documentapp/downloadimmediate/?docId=204.
-
(2013)
Cloud Standards Coordination - Final Report
-
-
-
98
-
-
84897761405
-
Security issues in cloud environments: A survey
-
(September 2013)
-
D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inacio. 2013. Security issues in cloud environments: A survey. International Journal of Information Security (September 2013), 1-58.
-
(2013)
International Journal of Information Security
, pp. 1-58
-
-
Fernandes, D.A.B.1
Soares, L.F.B.2
Gomes, J.V.3
Freire, M.M.4
Inacio, P.R.M.5
-
101
-
-
79959339905
-
Advanced service monitoring configurations with SLA decomposition and selection
-
March
-
H. Foster and G. Spanoudakis. March 2011a. Advanced service monitoring configurations with SLA decomposition and selection. In Proc. of ACM SAC 2011.
-
(2011)
Proc. of ACM SAC 2011
-
-
Foster, H.1
Spanoudakis, G.2
-
102
-
-
84938342840
-
SMaRT: A workbench for reporting the monitorability of services from SLAs
-
May
-
H. Foster and G. Spanoudakis. May 2011b. SMaRT: A workbench for reporting the monitorability of services from SLAs. In Proc. of PESOS 2011.
-
(2011)
Proc. of PESOS 2011
-
-
Foster, H.1
Spanoudakis, G.2
-
103
-
-
84938409843
-
-
Ganglia. Homepage. Retrieved from
-
Ganglia. 2014. Homepage. Retrieved from http://ganglia.sourceforge.net/.
-
(2014)
-
-
-
104
-
-
84857307012
-
Cloud testing-issues, challenges, needs and practice
-
(September 2011)
-
J. Gao, X. Bai, andW.-T. Tsai. 2011. Cloud testing-issues, challenges, needs and practice. SeiJ 1, 1 (September 2011).
-
(2011)
SeiJ
, vol.1
, pp. 1
-
-
Gao, J.1
Bai, X.2
Tsai, W.-T.3
-
106
-
-
84865048353
-
A framework for ranking of cloud computing services
-
(June 2013)
-
S. K. Garg, S. Versteeg, and R. Buyya. 2013. A framework for ranking of cloud computing services. Future Generation Computer Systems 29, 4 (June 2013), 1012-1023.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.4
, pp. 1012-1023
-
-
Garg, S.K.1
Versteeg, S.2
Buyya, R.3
-
107
-
-
84889904798
-
-
German Federal Office for Information Security. August
-
German Federal Office for Information Security. August 2012. Security Recommendations for Cloud Computing Providers. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Minimum-informa tion/SecurityRecommendationsCloudComputingProviders.pdf?-blob=publicationFile.
-
(2012)
Security Recommendations for Cloud Computing Providers
-
-
-
109
-
-
84889855905
-
Run-time monitoring in service-oriented architectures
-
L. Baresi and E. Di Nitto (Eds.). Springer, Berlin
-
C. Ghezzi and S. Guinea. 2007. Run-time monitoring in service-oriented architectures. In Test and Analysis of Web Services, L. Baresi and E. Di Nitto (Eds.). Springer, Berlin, 237-264.
-
(2007)
Test and Analysis of Web Services
, pp. 237-264
-
-
Ghezzi, C.1
Guinea, S.2
-
110
-
-
84897712723
-
A server-side solution to cache-based side-channel attacks in the cloud
-
June
-
M. Godfrey and M. Zulkernine. June 2013. A server-side solution to cache-based side-channel attacks in the cloud. In Proc. of IEEE CLOUD 2013.
-
(2013)
Proc. of IEEE CLOUD 2013
-
-
Godfrey, M.1
Zulkernine, M.2
-
111
-
-
84873338342
-
The threat in the cloud
-
(January-February 2013)
-
M. Green. 2013. The threat in the cloud. IEEE Security & Privacy 11, 1 (January-February 2013), 86-89.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.1
, pp. 86-89
-
-
Green, M.1
-
112
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
(March-April 2011)
-
B. Grobauer, T. Walloschek, and E. Stocker. 2011. Understanding cloud computing vulnerabilities. IEEE Security & Privacy 9, 2 (March-April 2011), 50-57.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
113
-
-
70449472667
-
Vulnerable cloud: SOAP message security validation revisited
-
July
-
N. Gruschka and L. L. Iacono. July 2009. Vulnerable cloud: SOAP message security validation revisited. In Proc. of IEEE ICWS 2009.
-
(2009)
Proc. of IEEE ICWS 2009
-
-
Gruschka, N.1
Iacono, L.L.2
-
114
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
July
-
N. Gruschka and M. Jensen. July 2010. Attack surfaces: A taxonomy for attacks on cloud services. In Proc. of IEEE CLOUD 2010.
-
(2010)
Proc. of IEEE CLOUD 2010
-
-
Gruschka, N.1
Jensen, M.2
-
115
-
-
77955961955
-
A case for the accountable cloud
-
(April 2010)
-
A. Haeberlen. 2010. A case for the accountable cloud. ACM SIGOPS Operating Systems Review 44, 2 (April 2010), 52-57.
-
(2010)
ACM SIGOPS Operating Systems Review
, vol.44
, Issue.2
, pp. 52-57
-
-
Haeberlen, A.1
-
116
-
-
72949090350
-
Runtime monitoring of web service choreographies using streaming XML
-
March. Honolulu, HI, Hawaii
-
S. Hallé and R. Villemaire. March 2009. Runtime monitoring of web service choreographies using streaming XML. In Proc. of ACM SAC 2009. Honolulu, HI, Hawaii.
-
(2009)
Proc. of ACM SAC 2009
-
-
Hallé, S.1
Villemaire, R.2
-
117
-
-
84857264879
-
The top ten cloud-security practices in next-generation networking
-
(December 2012)
-
W. M. Halton and S. Rahman. 2012. The top ten cloud-security practices in next-generation networking. IJCNDS 8, 1/2 (December 2012), 70-84.
-
(2012)
IJCNDS
, vol.8
, Issue.1-2
, pp. 70-84
-
-
Halton, W.M.1
Rahman, S.2
-
118
-
-
77953805943
-
Large-scale software testing environment using cloud computing technology for dependable parallel and distributed systems
-
April
-
T. Hanawa, T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, and M. Sato. April 2010. Large-scale software testing environment using cloud computing technology for dependable parallel and distributed systems. In Proc. of ICSTW 2010.
-
(2010)
Proc. of ICSTW 2010
-
-
Hanawa, T.1
Banzai, T.2
Koizumi, H.3
Kanbayashi, R.4
Imada, T.5
Sato, M.6
-
119
-
-
79955163872
-
A time-bound ticket-based mutual authentication scheme for cloud computing
-
2011
-
Z. Hao, S. Zhong, and N. Yu. 2011. A time-bound ticket-based mutual authentication scheme for cloud computing. IJCCC 6, 2 (2011), 227-235.
-
(2011)
IJCCC
, vol.6
, Issue.2
, pp. 227-235
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
120
-
-
84887724123
-
An analysis of security issues for cloud computing
-
2013
-
K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez. 2013. An analysis of security issues for cloud computing. JISA 4, 1 (2013), 1-13.
-
(2013)
JISA
, vol.4
, Issue.1
, pp. 1-13
-
-
Hashizume, K.1
Rosado, D.G.2
Fernandez-Medina, E.3
Fernandez, E.B.4
-
121
-
-
84876187834
-
-
European Network and Information Security Agency (ENISA). Retrieved from
-
G. Hogben and M. Dekker. 2012. Procure Secure: A guide to monitoring of security service levels in cloud contracts. European Network and Information Security Agency (ENISA). Retrieved from http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/procure-secure-a-guide-tomonitoring- of-security-service-levels-in-cloud-contracts/at-download/fullReport.
-
(2012)
Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts
-
-
Hogben, G.1
Dekker, M.2
-
123
-
-
84865031080
-
Cloud computings security requirements: A systematic review
-
May
-
I. Iankoulova and M. Daneva. May 2012. Cloud computings security requirements: A systematic review. In Proc. of RCIS 2012.
-
(2012)
Proc. of RCIS 2012
-
-
Iankoulova, I.1
Danev, M.2
-
125
-
-
84938331391
-
Emerging security challenges of cloud virtual infrastructure
-
November-December, Sydney, Australi
-
A. S. Ibrahim, J. Hamlyn-Harris, and J. Grundy. November-December 2010. Emerging security challenges of cloud virtual infrastructure. In Proc. of APSEC-CLOUD 2010. Sydney, Australia.
-
(2010)
Proc. of APSEC-CLOUD 2010.
-
-
Ibrahim, A.S.1
Hamlyn-Harris, J.2
Grundy, J.3
-
126
-
-
84938371995
-
-
Infrastructure for Secure Cloud Computing , Infrastructure for Secure Cloud Computing. Retrieved from
-
Infrastructure for Secure Cloud Computing 2013. Infrastructure for Secure Cloud Computing. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1253870&HistoricalAwards=false.
-
(2013)
-
-
-
127
-
-
84888061178
-
Toward a taxonomy and costing method for security services
-
December
-
C. Irvine and T. Levin. December 1999. Toward a taxonomy and costing method for security services. In Proc. of ACSAC 1999.
-
(1999)
Proc. of ACSAC 1999
-
-
Irvine, C.1
Levin, T.2
-
128
-
-
84881458187
-
Recoverable encryption through a noised secret over a large cloud
-
A. Hameurlain, J. Küng, and R. Wagner (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
S. Jajodia, W. Litwin, and T. Schwarz. 2013. Recoverable encryption through a noised secret over a large cloud. In Transactions on Large-Scale Data- and Knowledge-Centered Systems IX, A. Hameurlain, J. Küng, and R. Wagner (Eds.). Lecture Notes in Computer Science, Vol. 7980. Springer, Berlin, 42-64.
-
(2013)
Transactions on Large-Scale Data- And Knowledge-Centered Systems IX
, vol.7980
, pp. 42-64
-
-
Jajodia, S.1
Litwin, W.2
Schwarz, T.3
-
130
-
-
84866753912
-
Expertus: A generator approach to automate performance testing in IaaS clouds
-
June
-
D. Jayasinghe, G. Swint, S. Malkowski, J. Li, Q. Wang, J. Park, and C. Pu. June 2012. Expertus: A generator approach to automate performance testing in IaaS clouds. In Proc. of IEEE CLOUD 2012.
-
(2012)
Proc. of IEEE CLOUD 2012
-
-
Jayasinghe, D.1
Swint, G.2
Malkowski, S.3
Li, J.4
Wang, Q.5
Park, J.6
Pu, C.7
-
131
-
-
84879167714
-
The three pillars of a secure hybrid cloud environment
-
(June 2013)
-
C. Jenkins. 2013. The three pillars of a secure hybrid cloud environment. Computer Fraud & Security 2013, 6 (June 2013), 13-15.
-
(2013)
Computer Fraud & Security
, vol.2013
, Issue.6
, pp. 13-15
-
-
Jenkins, C.1
-
133
-
-
84887635648
-
Adaptive resource management for balancing availability and performance in cloud computing
-
August
-
R. Jhawar and V. Piuri. August 2013. Adaptive resource management for balancing availability and performance in cloud computing. In Proc. of SECRYPT 2013.
-
(2013)
Proc. of SECRYPT 2013
-
-
Jhawar, R.1
Piuri, V.2
-
134
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
December
-
R. Jhawar, V. Piuri, and P. Samarati. December 2012. Supporting security requirements for resource management in cloud computing. In Proc. of IEEE CSE 2012.
-
(2012)
Proc. of IEEE CSE 2012
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
135
-
-
84881291342
-
Towards assurance of availability in virtualized cloud system
-
May
-
S. Jin, J. Seol, and S. Maeng. May 2013. Towards assurance of availability in virtualized cloud system. In Proc. of IEEE/ACM CCGrid 2013.
-
(2013)
Proc. of IEEE/ACM CCGrid 2013
-
-
Jin, S.1
Seol, J.2
Maeng, S.3
-
136
-
-
84873677485
-
New approaches to security and availability for cloud data
-
(February 2013)
-
A. Juels and A. Oprea. 2013. New approaches to security and availability for cloud data. CACM 56, 2 (February 2013).
-
(2013)
CACM
, vol.56
, pp. 2
-
-
Juels, A.1
Oprea, A.2
-
137
-
-
84883112893
-
Privacy preserving cloud data access with multi-authorities
-
April
-
T. Jung, X.-Y. Li, and Z. Wan. April 2013. Privacy preserving cloud data access with multi-authorities. In Proc. of IEEE INFOCOM 2013.
-
(2013)
Proc. of IEEE INFOCOM 2013
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
-
139
-
-
84893584607
-
SCM: A design and implementation of monitoring system for cloudstack
-
November
-
L. Kai, T.Weiqin, Z. Liping, and H. Chao. November 2013. SCM: A design and implementation of monitoring system for cloudstack. In Proc. of CSC 2013.
-
(2013)
Proc. of CSC 2013
-
-
Kai, L.1
Weiqin, T.2
Liping, Z.3
Chao, H.4
-
141
-
-
57349106468
-
SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments
-
June
-
S. Kang, J. Lee, H. Jang, H. Lee, Y. Lee, S. Park, T. Park, and J. Song. June 2008. SeeMon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments. In Proc. of MobiSys 2008.
-
(2008)
Proc. of MobiSys 2008
-
-
Kang, S.1
Lee, J.2
Jang, H.3
Lee, H.4
Lee, Y.5
Park, S.6
Park, T.7
Song, J.8
-
142
-
-
77955131289
-
Can public-cloud security meet its unique challenges?
-
(July-August 2010)
-
L. M. Kaufman. 2010. Can public-cloud security meet its unique challenges? IEEE Security & Privacy 8, 4 (July-August 2010), 55-57.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.4
, pp. 55-57
-
-
Kaufman, L.M.1
-
143
-
-
84938343856
-
Cloud based secure and privacy enhanced authentication & authorization protocol
-
September
-
U. Khalid, A. Ghafoor, M. Irum, andM. A. Shibli. September 2013. Cloud based secure and privacy enhanced authentication & authorization protocol. In Proc. of KES 2013.
-
(2013)
Proc. of KES 2013
-
-
Khalid, U.1
Ghafoor, A.2
Irum, M.3
Shibli, M.A.4
-
144
-
-
77957700442
-
Establishing trust in cloud computing
-
(September- October 2010)
-
K. M. Khan and Q. Malluhi. 2010. Establishing trust in cloud computing. IT Professional 12, 5 (September- October 2010), 20-27.
-
(2010)
IT Professional
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
145
-
-
77953733759
-
Migrating autonomic self-testing to the cloud
-
April
-
T. M. King and A. S. Ganti. April 2010. Migrating autonomic self-testing to the cloud. In Proc. of ICSTW 2010.
-
(2010)
Proc. of ICSTW 2010
-
-
King, T.M.1
Ganti, A.S.2
-
147
-
-
79952395279
-
Do you get what you pay for? Using proof-of-work functions to verify performance assertions in the cloud
-
November-December
-
F. Koeppe and J. Schneider. November-December 2010. Do you get what you pay for? using proof-of-work functions to verify performance assertions in the cloud. In Proc. of IEEE CloudCom 2010.
-
(2010)
Proc. of IEEE CloudCom 2010
-
-
Koeppe, F.1
Schneider, J.2
-
148
-
-
77749234127
-
Increased reliability in SOA environments through registry-based conformance testing ofWeb services
-
D. Kourtesis, E. Ramollari, D. Dranidis, and I. Paraskakis. 2010. Increased reliability in SOA environments through registry-based conformance testing ofWeb services. Production Planning & Control 21, 2 (2010), 130-144.
-
(2010)
Production Planning & Control 2010
, vol.21
, Issue.2
, pp. 130-144
-
-
Kourtesis, D.1
Ramollari, E.2
Dranidis, D.3
Paraskakis, I.4
-
149
-
-
84875980858
-
Private virtual infrastructure for cloud computing
-
June. San Diego, CA, USA
-
F. J. Krautheim. June 2009. Private virtual infrastructure for cloud computing. In Proc. of HotCloud 2009. San Diego, CA, USA.
-
(2009)
Proc. of HotCloud 2009
-
-
Krautheim, F.J.1
-
152
-
-
79952383924
-
OpenPMF SCaaS: Authorization as a service for cloud & SOA applications
-
November-December
-
U. Lang. November-December 2010. OpenPMF SCaaS: Authorization as a service for cloud & SOA applications. In Proc. of IEEE CloudCom 2010.
-
(2010)
Proc. of IEEE CloudCom 2010
-
-
Lang, U.1
-
153
-
-
79955677448
-
Multi-level intrusion detection system and log management in cloud computing
-
February . Gangwon-Do, South Korea
-
J.-H. Lee, M.-W. Park, J.-H. Eom, and T.-M. Chung. February 2011. Multi-level intrusion detection system and log management in cloud computing. In Proc. of ICACT 2011. Gangwon-Do, South Korea.
-
(2011)
Proc. of ICACT 2011
-
-
Lee, J.-H.1
Park, M.-W.2
Eom, J.-H.3
Chung, T.-M.4
-
154
-
-
84894209248
-
Identity-based cryptography for cloud security
-
H. Li, Y. Dai, and B. Yang. 2011a. Identity-based cryptography for cloud security. IACR Cryptology ePrint Archive 2011 (2011), 169.
-
(2011)
IACR Cryptology EPrint Archive
, vol.2011
, Issue.2011
, pp. 169
-
-
Li, H.1
Dai, Y.2
Yang, B.3
-
155
-
-
80053654165
-
CyberGuarder: A virtualization security assurance architecture for green cloud computing
-
(May 2011)
-
J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K. P. Lam. 2011b. CyberGuarder: A virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems 28, 2 (May 2011), 379-390.
-
(2011)
Future Generation Computer Systems
, vol.28
, Issue.2
, pp. 379-390
-
-
Li, J.1
Li, B.2
Wo, T.3
Hu, C.4
Huai, J.5
Liu, L.6
Lam, K.P.7
-
156
-
-
85013945047
-
MyCloud: Supporting user-configured privacy protection in cloud computing
-
December
-
M. Li, W. Zang, K. Bai, M. Yu, and P. Liu. December 2013. MyCloud: Supporting user-configured privacy protection in cloud computing. In Proc. of ACSAC 2013.
-
(2013)
Proc. of ACSAC 2013
-
-
Li, M.1
Zang, W.2
Bai, K.3
Yu, M.4
Liu, P.5
-
158
-
-
84860512062
-
A secure erasure code-based cloud storage system with secure data forwarding
-
(June 2012)
-
H.-Y. Lin and W.-G. Tzeng. 2012. A secure erasure code-based cloud storage system with secure data forwarding. IEEE TPDS 23, 6 (June 2012), 995-1003.
-
(2012)
IEEE TPDS
, vol.23
, Issue.6
, pp. 995-1003
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
159
-
-
78650154288
-
A new form of DOS attack in a cloud and its avoidance mechanism
-
October
-
H. Liu. October 2010. A new form of DOS attack in a cloud and its avoidance mechanism. In Proc. of ACM CCSW 2010.
-
(2010)
Proc. of ACM CCSW 2010
-
-
Liu, H.1
-
160
-
-
84893461004
-
Hierarchical attribute-based access control with authentication for outsourced data in cloud computing
-
July
-
X. Liu, Y. Xia, S. Jiang, F. Xia, and Y. Wang. July 2013. Hierarchical attribute-based access control with authentication for outsourced data in cloud computing. In Proc. of IEEE TrustCom 2013.
-
(2013)
Proc. of IEEE TrustCom 2013
-
-
Liu, X.1
Xia, Y.2
Jiang, S.3
Xia, F.4
Wang, Y.5
-
163
-
-
84938315857
-
A multi-criteria QoS-aware trust service composition algorithm in cloud computing environments
-
2014
-
W. Lu, X. Hu, S. Wang, and X. Li. 2014. A multi-criteria QoS-aware trust service composition algorithm in cloud computing environments. IJGDC 7, 1 (2014), 77-88.
-
(2014)
IJGDC
, vol.7
, Issue.1
, pp. 77-88
-
-
Lu, W.1
Hu, X.2
Wang, S.3
Li, X.4
-
164
-
-
84938392011
-
Federated cloud security architecture for secure and agile clouds
-
K. J. Han, B.-Y. Choi, and S. Song (Eds.). Springer, New York
-
W. Luo, L. Xu, Z. Zhan, Q. Zheng, and S. Xu. 2014. Federated cloud security architecture for secure and agile clouds. In High Performance Cloud Auditing and Applications, K. J. Han, B.-Y. Choi, and S. Song (Eds.). Springer, New York.
-
(2014)
High Performance Cloud Auditing and Applications
-
-
Luo, W.1
Xu, L.2
Zhan, Z.3
Zheng, Q.4
Xu, S.5
-
165
-
-
84904126401
-
A virtual machine cloning approach based on trusted computing
-
(November 2013)
-
W. Ma, X. Li, Y. Shi, and Y. Guo. 2013. A virtual machine cloning approach based on trusted computing. TELKOMNIKA 11, 11 (November 2013), 6935-6942.
-
(2013)
TELKOMNIKA
, vol.11
, Issue.11
, pp. 6935-6942
-
-
Ma, W.1
Li, X.2
Shi, Y.3
Guo, Y.4
-
166
-
-
33748782229
-
Comply or explain": Market discipline and non-compliance with the Combined Code
-
2006
-
I. MacNeil and X. Li. 2006. "Comply or explain": Market discipline and non-compliance with the Combined Code. Corporate Governance: An International Review 14, 5 (2006), 486-496.
-
(2006)
Corporate Governance: An International Review
, vol.14
, Issue.5
, pp. 486-496
-
-
MacNeil, I.1
Li., X.2
-
167
-
-
84889872804
-
Monitoring WS-agreements: An event calculusbased approach
-
L. Baresi and E. Di Nitto (Eds.). Springer, Berlin
-
K. Mahbub and G. Spanoudakis. 2007. Monitoring WS-agreements: An event calculusbased approach. In Test and Analysis of Web Services, L. Baresi and E. Di Nitto (Eds.). Springer, Berlin, 265-306.
-
(2007)
Test and Analysis of Web Services
, pp. 265-306
-
-
Mahbub, K.1
Spanoudakis, G.2
-
168
-
-
20444433248
-
A framework for requirements monitoring of service based systems
-
November
-
K. Mahbub and G. Spanoudakis. November 2004. A framework for requirements monitoring of service based systems. In Proc. of ICSOC 2004.
-
(2004)
Proc. of ICSOC 2004
-
-
Mahbub, K.1
Spanoudakis, G.2
-
169
-
-
84864248639
-
A whitebox approach for automated security testing of android applications on the cloud
-
June
-
R. Mahmood, N. Esfahani, T. Kacem, N. Mirzaei, S. Malek, and A. Stavrou. June 2012. A whitebox approach for automated security testing of android applications on the cloud. In Proc. of AST 2012.
-
(2012)
Proc. of AST 2012
-
-
Mahmood, R.1
Esfahani, N.2
Kacem, T.3
Mirzaei, N.4
Malek, S.5
Stavrou, A.6
-
170
-
-
57549096898
-
Danger in the clouds
-
December 2008
-
S. Mansfield-Devine. 2008. Danger in the clouds. Network Security 2008, 12 (December 2008), 9-11.
-
(2008)
Network Security
, vol.2008
, Issue.12
, pp. 9-11
-
-
Mansfield-Devine, S.1
-
172
-
-
3342966061
-
The ganglia distributed monitoring system: Design, implementation, and experience
-
July 2004
-
M. L. Massie, B. N. Chun, and D. E. Culler. 2004. The ganglia distributed monitoring system: Design, implementation, and experience. Parallel Comput. 30, 7 (July 2004), 817-840.
-
(2004)
Parallel Comput.
, vol.30
, Issue.7
, pp. 817-840
-
-
Massie, M.L.1
Chun, B.N.2
Culler, D.E.3
-
173
-
-
84899724634
-
-
O'Reilly Media
-
M. Massie, B. Li, B. Nicholes, V. Vuksan, R. Alexander, J. Buchbinder, F. Costa, A. Dean, D. Josephsen, P. Phaal, and D. Pocock. 2012. Monitoring with Ganglia - Tracking Dynamic Host and Application Metrics at Scale. O'Reilly Media.
-
(2012)
Monitoring with Ganglia - Tracking Dynamic Host and Application Metrics at Scale
-
-
Massie, M.1
Li, B.2
Nicholes, B.3
Vuksan, V.4
Alexander, R.5
Buchbinder, J.6
Costa, F.7
Dean, A.8
Josephsen, D.9
Phaal, P.10
Pocock, D.11
-
174
-
-
46849086890
-
XML signature element wrapping attacks and countermeasures
-
November. Fairfax, VA, USA
-
M. McIntosh and P. Austel. November 2005. XML signature element wrapping attacks and countermeasures. In Proc. of SWS 2005. Fairfax, VA, USA.
-
(2005)
Proc. of SWS 2005
-
-
McIntosh, M.1
Austel, P.2
-
175
-
-
84938396526
-
TTP-ACE: A trusted third party for auditing in cloud environment
-
September
-
S. Mei, H. Ba, F. Tu, J. Ren, and Z. Wang. September 2013. TTP-ACE: A trusted third party for auditing in cloud environment. In Proc. of ICSCTEA 2013. September.
-
(2013)
Proc. of ICSCTEA 2013
-
-
Mei, S.1
Ba, H.2
Tu, F.3
Ren, J.4
Wang, Z.5
-
177
-
-
84881144407
-
Enhanced monitoring-as-A-service for effective cloud management
-
(September 2013)
-
S. Meng and L. Liu. 2013. Enhanced monitoring-as-a-service for effective cloud management. IEEE TC 62, 9 (September 2013), 1705-1720.
-
(2013)
IEEE TC
, vol.62
, Issue.9
, pp. 1705-1720
-
-
Meng, S.1
Liu, L.2
-
178
-
-
84886723209
-
A survey on security issues and solutions at different layers of cloud computing
-
(February 2013)
-
C. Modi, D. Patel, B. Borisaniya, A. Patel, andM. Rajarajan. 2013a. A survey on security issues and solutions at different layers of cloud computing. Journal of Supercomputing 63, 2 (February 2013).
-
(2013)
Journal of Supercomputing
, vol.63
, pp. 2
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, A.4
Rajarajan, M.5
-
179
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
(June 2013)
-
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan. 2013b. A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications 36, 1 (June 2013), 42-57.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
180
-
-
85006223235
-
A survey on resource allocation and monitoring in cloud computing
-
(February 2014)
-
M. H. Mohamaddiah, A. Abdullah, S. Subramaniam, and M. Hussin. 2014. A survey on resource allocation and monitoring in cloud computing. IJMLC 4, 1 (February 2014).
-
(2014)
IJMLC
, vol.4
, pp. 1
-
-
Mohamaddiah, M.H.1
Abdullah, A.2
Subramaniam, S.3
Hussin, M.4
-
181
-
-
84857187859
-
Monitoring intrusions and security breaches in highly distributed cloud environments
-
November-December
-
A. T. Monfared and M. G. Jaatun. November-December 2011. Monitoring intrusions and security breaches in highly distributed cloud environments. In Proc. of IEEE CloudCom 2011.
-
(2011)
Proc. of IEEE CloudCom 2011
-
-
Monfared, A.T.1
Jaatun, M.G.2
-
182
-
-
84863140035
-
-
Master Thesis - ETH Zürich. Retreived from
-
J. Moreno. 2010. A Testing Framework for Cloud Storage Systems. Master Thesis - ETH Zürich. Retreived from http://e-collection.library.ethz.ch/eserv/eth:1987/eth-1987-01.pdf.
-
(2010)
A Testing Framework for Cloud Storage Systems
-
-
Moreno, J.1
-
183
-
-
84922992001
-
Trusted platform module
-
H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
-
T. Morris. 2011. Trusted platform module. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
-
(2011)
Encyclopedia of Cryptography and Security
-
-
Morris, T.1
-
184
-
-
57349093724
-
Non-intrusive monitoring and service adaptation for WS-BPEL
-
April
-
O. Moser, F. Rosenberg, and S. Dustdar. April 2008. Non-intrusive monitoring and service adaptation for WS-BPEL. In Proc. of WWW 2008.
-
(2008)
Proc. of WWW 2008
-
-
Moser, O.1
Rosenberg, F.2
Dustdar, S.3
-
185
-
-
84881474672
-
A framework to support selection of cloud providers based on security and privacy requirements
-
(March 2013)
-
H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis. 2013. A framework to support selection of cloud providers based on security and privacy requirements. JSS 86, 9 (March 2013), 2276-2293.
-
(2013)
JSS
, vol.86
, Issue.9
, pp. 2276-2293
-
-
Mouratidis, H.1
Islam, S.2
Kalloniatis, C.3
Gritzalis, S.4
-
186
-
-
84888019509
-
Bridging the GAP between software certification and trusted computing for securing cloud computing
-
June
-
A. Muñoz and A. Maña. June 2013. Bridging the GAP between software certification and trusted computing for securing cloud computing. In Proc. of IEEE SERVICES 2013.
-
(2013)
Proc. of IEEE SERVICES 2013
-
-
Muñoz, A.1
Maña, A.2
-
188
-
-
84884783064
-
Privacy preserving policy-based content sharing in public clouds
-
(November 2013)
-
M. Nabeel, N. Shang, and E. Bertino. 2013. Privacy preserving policy-based content sharing in public clouds. IEEE TKDE 25, 11 (November 2013), 2602-2614.
-
(2013)
IEEE TKDE
, vol.25
, Issue.11
, pp. 2602-2614
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
189
-
-
80051572582
-
-
Nagios.. Retrieved from
-
Nagios. 2014. Cloud Computing. Retrieved from http://www.nagios.com/solutions/cloud-computing.
-
(2014)
Cloud Computing
-
-
-
190
-
-
84893073951
-
-
Network of Excellence on Engineering Secure Future Internet Software Services and Systems. Retrieved from
-
Network of Excellence on Engineering Secure Future Internet Software Services and Systems. 2010. Network of Excellence on Engineering Secure Future Internet Software Services and Systems. Retrieved from http://www.nessos-project.eu/.
-
(2010)
Network of Excellence on Engineering Secure Future Internet Software Services and Systems
-
-
-
191
-
-
84901667966
-
On the security of an efficient dynamic auditing protocol in cloud storage
-
J. Ni, Y. Yu, Y. Mu, and Q. Xia. 2014. On the security of an efficient dynamic auditing protocol in cloud storage. IEEE TPDS (2014).
-
(2014)
IEEE TPDS (2014)
-
-
Ni, J.1
Yu, Y.2
Mu, Y.3
Xia, Q.4
-
192
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
March . Sierre, Switzerland
-
K. Okamura and Y. Oyama. March 2010. Load-based covert channels between xen virtual machines. In Proc. of ACM SAC 2010. Sierre, Switzerland.
-
(2010)
Proc. of ACM SAC 2010
-
-
Okamura, K.1
Oyam, Y.2
-
193
-
-
78449282660
-
Security architectures for cloud computing
-
(October 2010)
-
M. Okuhara, T. Shiozaki, and T. Suzuki. 2010. Security architectures for cloud computing. Fujitsu Scientific and Technical Journal 46, 4 (October 2010), 397-402.
-
(2010)
Fujitsu Scientific and Technical Journal
, vol.46
, Issue.4
, pp. 397-402
-
-
Okuhara, M.1
Shiozaki, T.2
Suzuki, T.3
-
194
-
-
84938349985
-
-
OpenStack Open Source Cloud Computing Software, Retrieved from
-
OpenStack Open Source Cloud Computing Software 2015. OpenStack Open Source Cloud Computing Software. Retrieved from https://www.openstack.org/.
-
(2015)
OpenStack Open Source Cloud Computing Software
-
-
-
196
-
-
79955554783
-
Managing evolving services
-
(May-June 2011)
-
M. P. Papazoglou, V. Andrikopoulos, and S. Benbernou. 2011. Managing evolving services. IEEE Software 28, 3 (May-June 2011), 49-55.
-
(2011)
IEEE Software
, vol.28
, Issue.3
, pp. 49-55
-
-
Papazoglou, M.P.1
Andrikopoulos, V.2
Benbernou, S.3
-
197
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
(April 2010)
-
S. Paquette, P. T. Jaeger, and S. C. Wilson. 2010. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 27, 3 (April 2010), 245-253.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.T.2
Wilson, S.C.3
-
198
-
-
84883814353
-
THEMIS: A mutually verifiable billing system for the cloud computing environment
-
(July-September 2013)
-
K.-W. Park, J. Han, J. Chung, and K. H. Park. 2013. THEMIS: A mutually verifiable billing system for the cloud computing environment. IEEE TSC 6, 3 (July-September 2013), 300-313.
-
(2013)
IEEE TSC
, vol.6
, Issue.3
, pp. 300-313
-
-
Park, K.-W.1
Han, J.2
Chung, J.3
Park, K.H.4
-
199
-
-
77953793664
-
When to migrate software testing to the cloud?
-
April 2010
-
T. Parveen and S. Tilley. April 2010. When to migrate software testing to the cloud?. In Proc of ICSTW 2010.
-
(2010)
Proc of ICSTW
-
-
Parveen, T.1
Tilley, S.2
-
200
-
-
84870667876
-
An intrusion detection and prevention system in cloud computing: A systematic review
-
(January 2013)
-
A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino JúNior. 2013. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 36, 1 (January 2013), 25-41.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 25-41
-
-
Patel, A.1
Taghavi, M.2
Bakhtiyari, K.3
Celestino, J.4
-
202
-
-
84875146484
-
Virtualization: Issues, security threats, and solutions
-
(February 2013)
-
M. Pearce, S. Zeadally, and R. Hunt. 2013. Virtualization: Issues, security threats, and solutions. ACMCSUR 45, 2 (February 2013), 17:1-17:39.
-
(2013)
ACMCSUR
, vol.45
, Issue.2
, pp. 171-1739
-
-
Pearce, M.1
Zeadally, S.2
Hunt, R.3
-
203
-
-
79959961301
-
Toward accountability in the cloud
-
2011
-
S. Pearson. 2011. Toward accountability in the cloud. IEEE Internet Computing 15, 4 (2011), 64-69.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.4
, pp. 64-69
-
-
Pearson, S.1
-
204
-
-
84863498411
-
Privacy, security and trust in cloud computing
-
S. Pearson and G. Yee (Eds.). Springer London
-
S. Pearson. 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing, S. Pearson and G. Yee (Eds.). Springer London, 3-42.
-
(2013)
Privacy and Security for Cloud Computing
, pp. 3-42
-
-
Pearson, S.1
-
205
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
November-December
-
S. Pearson and A. Benameur. November-December 2010. Privacy, security and trust issues arising from cloud computing. In Proc. of IEEE CloudCom 2010.
-
(2010)
Proc. of IEEE CloudCom 2010
-
-
Pearson, S.1
Benameur, A.2
-
208
-
-
77958132271
-
Don't trust. and verify: A security architecture stack for the cloud
-
(September-October 2010)
-
G. Peterson. 2010. Don't trust. and verify: A security architecture stack for the cloud. IEEE Security & Privacy 8, 5 (September-October 2010), 83-86.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.5
, pp. 83-86
-
-
Peterson, G.1
-
209
-
-
80051924493
-
CloudVal: A framework for validation of virtualization environment in cloud infrastructure
-
June
-
C. Pham, D. Chen, Z. Kalbarczyk, and R. K. Iyer. June 2011. CloudVal: A framework for validation of virtualization environment in cloud infrastructure. In Proc of IEEE/IFIP DSN 2011.
-
(2011)
Proc of IEEE/IFIP DSN 2011
-
-
Pham, C.1
Chen, D.2
Kalbarczyk, Z.3
Iyer, R.K.4
-
210
-
-
84938408972
-
-
Policy and Security Configuration Management 2010. Retrieved from
-
Policy and Security Configuration Management 2010. Policy and Security Configuration Management. Retrieved from http://www.posecco.eu/.
-
Policy and Security Configuration Management
-
-
-
212
-
-
84938365997
-
MAC algorithms
-
H.C.A. van Tilborg and S. Jajodia (Eds.). Springer
-
B. Preneel. 2011. MAC algorithms. In Encyclopedia of Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (Eds.). Springer.
-
(2011)
Encyclopedia of Cryptography and Security
-
-
Preneel, B.1
-
213
-
-
84888840097
-
Simultaneous authentication and secrecy in identity-based data upload to cloud
-
(April 2013)
-
B. Qin, H. Wang, Q. Wu, J. Liu, and J. Domingo-Ferrer. 2013. Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Computing 16, 4 (April 2013), 845-859.
-
(2013)
Cluster Computing
, vol.16
, Issue.4
, pp. 845-859
-
-
Qin, B.1
Wang, H.2
Wu, Q.3
Liu, J.4
Domingo-Ferrer, J.5
-
215
-
-
84893307436
-
QoS guarantees and service differentiation for dynamic cloud applications
-
(March 2013)
-
J. Rao, Y. Wei, J. Gong, and C.-Z. Xu. 2013. QoS guarantees and service differentiation for dynamic cloud applications. IEEE TNSM 10, 1 (March 2013), 43-55.
-
(2013)
IEEE TNSM
, vol.10
, Issue.1
, pp. 43-55
-
-
Rao, J.1
Wei, Y.2
Gong, J.3
Xu, C.-Z.4
-
216
-
-
84923953445
-
Data and infrastructure security auditing in cloud computing environments
-
(December 2013)
-
H. Rasheed. 2013. Data and infrastructure security auditing in cloud computing environments. IJIM (December 2013).
-
(2013)
IJIM
-
-
Rasheed, H.1
-
217
-
-
84888295277
-
Privacy enhanced access control for outsourced data sharing
-
February-March
-
M. Raykova, H. Zhao, and S. M. Bellovin. February-March 2012. Privacy enhanced access control for outsourced data sharing. In Proc. of FC 2012.
-
(2012)
Proc. of FC 2012
-
-
Raykova, M.1
Zhao, H.2
Bellovin, S.M.3
-
218
-
-
84862907810
-
Security challenges for the public cloud
-
(January-February 2012)
-
K. Ren, C. Wang, and Q. Wang. 2012. Security challenges for the public cloud. IEEE Internet Computing 16, 1 (January-February 2012), 69-73.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
219
-
-
84898094537
-
-
Resources and Services Virtualization without Barriers
-
Resources and Services Virtualization without Barriers 2008. Resources and Services Virtualization without Barriers. http://www.reservoir-fp7.eu/.
-
(2008)
Resources and Services Virtualization Without Barriers.
-
-
-
220
-
-
84938310152
-
-
Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing. Retrieved from
-
Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing 2013. Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing. Retrieved from http://www.nsf.gov/awardsearch/showAward?AWD-ID=1332035&HistoricalAwards=false.
-
(2013)
Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing
-
-
-
221
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
November
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. November 2009. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proc. of ACM CCS 2009.
-
(2009)
Proc. of ACM CCS 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
223
-
-
80052161321
-
Lucy in the sky without diamonds: Stealing confidential data in the cloud
-
June
-
F. Rocha and M. Correia. June 2011. Lucy in the sky without diamonds: Stealing confidential data in the cloud. In Proc. of IEEE/IFIP DSN-W 2011.
-
(2011)
Proc. of IEEE/IFIP DSN-W 2011
-
-
Rocha, F.1
Correi, M.2
-
224
-
-
84855993467
-
Building safe PaaS clouds: A survey on security in multitenant software platforms
-
(February 2012)
-
L. Rodero-Merino, L. M. Vaquero, E. Caron, A. Muresan, and F. Desprez. 2012. Building safe PaaS clouds: A survey on security in multitenant software platforms. Computers & Security 31, 1 (February 2012), 96-108.
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 96-108
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Caron, E.3
Muresan, A.4
Desprez, F.5
-
225
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
(May 2013)
-
C. Rong, S. T. Nguyen, and M. G. Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering 39, 1 (May 2013), 47-54.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
226
-
-
84891761004
-
Decentralized access control with anonymous authentication of data stored in clouds
-
(February 2014)
-
S. Ruj, M. Stojmenovic, and A. Nayak. 2014. Decentralized access control with anonymous authentication of data stored in clouds. IEEE TPDS 25, 2 (February 2014), 384-394.
-
(2014)
IEEE TPDS
, vol.25
, Issue.2
, pp. 384-394
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
227
-
-
84881472688
-
Cloud computing security: The scientific challenge, and a survey of solutions
-
(February 2013)
-
M. D. Ryan. 2013. Cloud computing security: The scientific challenge, and a survey of solutions. JSS 86, 9 (February 2013), 2263-2268.
-
(2013)
JSS
, vol.86
, Issue.9
, pp. 2263-2268
-
-
Ryan, M.D.1
-
228
-
-
43749124807
-
Supporting the dynamic evolution of web service protocols in service-oriented architectures
-
April 2008
-
S. H. Ryu, F. Casati, H. Skogsrud, B. Betanallah, and R. Saint-Paul. 2008. Supporting the dynamic evolution of web service protocols in service-oriented architectures. ACM TWEB 2, 2 (April 2008), 13:1-13:46.
-
(2008)
ACM TWEB
, vol.2
, Issue.2
, pp. 131-1346
-
-
Ryu, S.H.1
Casati, F.2
Skogsrud, H.3
Betanallah, B.4
Saint-Paul, R.5
-
229
-
-
84866745335
-
SLA-based and consumer-centric dynamic provisioning for cloud databases
-
June 2012
-
S. Sakr and A. Liu. June 2012. SLA-based and consumer-centric dynamic provisioning for cloud databases. In Proc. of IEEE CLOUD 2012.
-
Proc. of IEEE CLOUD 2012
-
-
Sakr, S.1
Liu, A.2
-
230
-
-
47949096953
-
Specifyingmonitoring and switching problems in context
-
October
-
M. Salifu, Yijun Yu, and B. Nuseibeh.October 2007. Specifyingmonitoring and switching problems in context. In Proc. of IEEE RE 2007.
-
(2007)
Proc. of IEEE RE 2007
-
-
Salifu, M.1
Yu, Y.2
Nuseibeh, B.3
-
232
-
-
77957948993
-
QUIRC: A quantitative impact and risk assessment framework for cloud security
-
P. Saripalli and B. Walters. 2010. QUIRC: A quantitative impact and risk assessment framework for cloud security. In Proc. of IEEE CLOUD 2010.
-
(2010)
Proc. of IEEE CLOUD 2010
-
-
Saripalli, P.1
Walters, B.2
-
234
-
-
84938346469
-
-
Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
-
Secure and Privacy-assured Data Service Outsourcing in Cloud Computing 2012. Secure and Privacy-assured Data Service Outsourcing in Cloud Computing. http://www.nsf.gov/awardsearch/showAward?AWD-ID=1262277&HistoricalAwards=false.
-
(2012)
Secure and Privacy-assured Data Service Outsourcing in Cloud Computing
-
-
-
235
-
-
84938313454
-
-
Secure Data-Intensive Computing on Hybrid Clouds
-
Secure Data-Intensive Computing on Hybrid Clouds 2012. Secure Data-Intensive Computing on Hybrid Clouds. http://www.nsf.gov/awardsearch/showAward?AWD-ID=1223495&HistoricalAwards=false.
-
(2012)
Secure Data-Intensive Computing on Hybrid Clouds
-
-
-
236
-
-
84893045126
-
-
Secure Provision and Consumption in the Internet of Services. Retrieved from
-
Secure Provision and Consumption in the Internet of Services 2010. Secure Provision and Consumption in the Internet of Services. Retrieved from http://www.spacios.eu/.
-
(2010)
Secure Provision and Consumption in the Internet of Services
-
-
-
237
-
-
84938346351
-
-
Secure Provisioning of Cloud Services based on SLAmanagement . Retrieved from
-
Secure Provisioning of Cloud Services based on SLAmanagement 2013. Secure Provisioning of Cloud Services Based on SLA Management. Retrieved from http://specs-project.eu/.
-
(2013)
Secure Provisioning of Cloud Services Based on SLA Management
-
-
-
238
-
-
84938379746
-
A simple technique for securing data at rest stored in a computing cloud
-
December. Beijing, China
-
J. Sedayao, S. Su, X. Ma, M. Jiang, and K. Miao. December 2009. A simple technique for securing data at rest stored in a computing cloud. In Proc. of CloudCom 2009. Beijing, China.
-
(2009)
Proc. of CloudCom 2009
-
-
Sedayao, J.1
Su, S.2
Ma, X.3
Jiang, M.4
Miao, K.5
-
239
-
-
84879919116
-
-
SEI., Retrieved from
-
SEI. 2011. Securing Web Services for Army SOA. Retrieved from http://www.sei.cmu.edu/solutions/softwaredev/securing-web-services.cfm.
-
(2011)
Securing Web Services for Army SOA
-
-
-
242
-
-
84888031754
-
Auditing and analysis of network traffic in cloud environment
-
June-July
-
S. Shetty. June-July 2013. Auditing and analysis of network traffic in cloud environment. In Proc. of IEEE SERVICES 2013.
-
(2013)
Proc. of IEEE SERVICES 2013
-
-
Shetty, S.1
-
243
-
-
78650085550
-
Venus: Verification for untrusted cloud storage
-
October
-
A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. October 2010. Venus: Verification for untrusted cloud storage. In Proc. of ACM CCSW 2010.
-
(2010)
Proc. of ACM CCSW 2010
-
-
Shraer, A.1
Cachin, C.2
Cidon, A.3
Keidar, I.4
Michalevsky, Y.5
Shaket, D.6
-
244
-
-
70349428494
-
Runtime monitoring of web service conversations
-
July-September 2009
-
J. Simmonds, Y. Gan, M. Chechik, S. Nejati, B. O'Farrell, E. Litani, and J. Waterhouse. 2009. Runtime monitoring of web service conversations. IEEE TSC 2, 3 (July-September 2009), 223-244.
-
(2009)
IEEE TSC
, vol.2
, Issue.3
, pp. 223-244
-
-
Simmonds, J.1
Gan, Y.2
Chechik, M.3
Nejati, S.4
O'Farrell, B.5
Litani, E.6
Waterhouse, J.7
-
245
-
-
84873619608
-
Collaboration in multicloud computing environments: Framework and security issues
-
(February 2013)
-
M. Singhal, S. Chandrasekhar, T. Ge, R. Sandhu, R. Krishnan, G.-J. Ahn, and E. Bertino. 2013. Collaboration in multicloud computing environments: Framework and security issues. Computer 46, 2 (February 2013), 76-84.
-
(2013)
Computer
, vol.46
, Issue.2
, pp. 76-84
-
-
Singhal, M.1
Chandrasekhar, S.2
Ge, T.3
Sandhu, R.4
Krishnan, R.5
Ahn, G.-J.6
Bertino, E.7
-
246
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono. 2011. All your clouds are belong to us: Security analysis of cloud management interfaces. In Proc. of ACM CCSW 2011.
-
(2011)
Proc. of ACM CCSW 2011
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
247
-
-
84863185930
-
TrustCube: An infrastructure that builds trust in client
-
D. Gawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik (Eds.). Vieweg+Teubner
-
Z. Song, J.Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka. 2009. TrustCube: An infrastructure that builds trust in client. In Future of Trust in Computing, D. Gawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik (Eds.). Vieweg+Teubner, 68-79.
-
(2009)
Future of Trust in Computing
, pp. 68-79
-
-
Song, Z.1
Molina, J.2
Lee, S.3
Lee, H.4
Kotani, S.5
Masuoka, R.6
-
248
-
-
84872000645
-
Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach
-
October 2012
-
G. Spanoudakis, E. Damiani, and A. Maña. October 2012. Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach. In Proc. of IEEE HASE 2012.
-
Proc. of IEEE HASE 2012
-
-
Spanoudakis, G.1
Damiani, E.2
Maña, A.3
-
249
-
-
84896860116
-
State-of-The-Art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment
-
August
-
M. K. Srinivasan, K. Sarukesi, P. Rodrigues, M. S.Manoj, and P. Revathy. August 2012. State-of-the-art cloud computing security taxonomies: A classification of security challenges in the present cloud computing environment. In Proc. of ICACCI 2012.
-
(2012)
Proc. of ICACCI 2012
-
-
Srinivasan, M.K.1
Sarukesi, K.2
Rodrigues, P.3
Manoj, M.S.4
Revathy, P.5
-
250
-
-
84938367992
-
Application-level denial of service
-
H. C. A. van Tilborg and S. Jajodia (Eds.). Springer
-
M. Srivatsa and A. Iyengar. 2011. Application-level denial of service. In Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia (Eds.). Springer.
-
(2011)
Encyclopedia of Cryptography and Security
-
-
Srivatsa, M.1
Iyengar, A.2
-
251
-
-
84885001426
-
Integrated TaaS platform for mobile development: Architecture solutions
-
May
-
O. Starov and S. Vilkomir. May 2013. Integrated TaaS platform for mobile development: Architecture solutions. In Proc. of AST 2013.
-
(2013)
Proc. of AST 2013
-
-
Starov, O.1
Vilkomir, S.2
-
252
-
-
84874906821
-
Iris: A scalable cloud file system with efficient integrity checks
-
December
-
E. Stefanov, M. van Dijk, A. Juels, and A. Oprea. December 2012. Iris: A scalable cloud file system with efficient integrity checks. In Proc. of ACSAC 2012.
-
(2012)
Proc. of ACSAC 2012
-
-
Stefanov, E.1
Van Dijk, M.2
Juels, A.3
Opre, A.4
-
254
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
(January 2011)
-
S. Subashini and V. Kavitha. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1 (January 2011), 1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
255
-
-
84938389835
-
Towards a self-protecting cloud
-
September
-
A. Sulistio and C. Reich. September 2013. Towards a self-protecting cloud. In Proc. of OTM 2013.
-
(2013)
Proc. of OTM 2013
-
-
Sulistio, A.1
Reich, C.2
-
256
-
-
84861176850
-
Ensuring distributed accountability for data sharing in the cloud
-
(July 2012)
-
S. Sundareswaran, A. C. Squicciarini, and D. Lin. 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE TDSC 9, 4 (July 2012), 556-568.
-
(2012)
IEEE TDSC
, vol.9
, Issue.4
, pp. 556-568
-
-
Sundareswaran, S.1
Squicciarini, A.C.2
Lin, D.3
-
257
-
-
84873696561
-
Cloud services certification
-
(February 2013)
-
A. Sunyaev and S. Schneider. 2013. Cloud services certification. CACM 56, 2 (February 2013), 33-36.
-
(2013)
CACM
, vol.56
, Issue.2
, pp. 33-36
-
-
Sunyaev, A.1
Schneider, S.2
-
258
-
-
84929854649
-
Hardware-enhanced security for cloud computing
-
S. Jajodia, K. Kant, P. Samarati V. Swarup, and C. Wang (Eds.). Springer
-
J. Szefer and R. B. Lee. 2014. Hardware-enhanced security for cloud computing. In Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, and C. Wang (Eds.). Springer.
-
(2014)
Secure Cloud Computing
-
-
Szefer, J.1
Lee, R.B.2
-
259
-
-
84857960811
-
Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment
-
January
-
H. Takabi and J. B. D. Joshi. January 2012. Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment. In Proc. of HICSS 2012.
-
(2012)
Proc. of HICSS 2012
-
-
Takabi, H.1
Joshi, J.B.D.2
-
260
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
(November-December 2010)
-
H. Takabi, J. B. D. Joshi, and Gail-Joon Ahn. 2010b. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8, 6 (November-December 2010), 24-31.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
261
-
-
78649806730
-
SecureCloud: Towards a comprehensive security framework for cloud computing environments
-
July
-
H. Takabi, J. B. D. Joshi, and G.-J. Ahn. July 2010a. SecureCloud: Towards a comprehensive security framework for cloud computing environments. In Proc. of IEEE COMPSACW 2010.
-
(2010)
Proc. of IEEE COMPSACW 2010
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
262
-
-
84863704395
-
Enabling secure multitenancy in cloud computing: Challenges and approaches
-
April
-
T. Takahashi, G. Blanc, Y. Kadobayashi, D. Fall, H. Hazeyama, and S. Matsuo. April 2012. Enabling secure multitenancy in cloud computing: Challenges and approaches. In Proc. of BCFIC 2012.
-
(2012)
Proc. of BCFIC 2012
-
-
Takahashi, T.1
Blanc, G.2
Kadobayashi, Y.3
Fall, D.4
Hazeyama, H.5
Matsuo, S.6
-
263
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
(November 2012)
-
Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman. 2012. Secure overlay cloud storage with access control and assured deletion. IEEE TDSC 9, 6 (November 2012), 903-916.
-
(2012)
IEEE TDSC
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
Perlman, R.4
-
264
-
-
84897986856
-
Improving cyber resiliency of cloud application services by applying software behavior encryption (SBE)
-
March
-
D. Thebeau II, B. Reidy, R. Valerdi, A. Gudagi, H. Kurra, Y. Al-Nashif, S. Hariri, and F. Sheldon. March 2014. Improving cyber resiliency of cloud application services by applying software behavior encryption (SBE). In Proc. of CSER 2014.
-
(2014)
Proc. of CSER 2014
-
-
Thebeau, D.1
Reidy, B.2
Valerdi, R.3
Gudagi, A.4
Kurra, H.5
Al-Nashif, Y.6
Hariri, S.7
Sheldon, F.8
-
266
-
-
12944287797
-
SCALEA-G: A unified monitoring and performance analysis system for the grid
-
December 2004
-
H.-L. Truongc and T. Fahringer. 2004. SCALEA-G: A unified monitoring and performance analysis system for the grid. Scientific Programming 12, 4 (December 2004), 225-237.
-
(2004)
Scientific Programming
, vol.12
, Issue.4
, pp. 225-237
-
-
Truongc, H.-L.1
Fahringer, T.2
-
267
-
-
84863022550
-
Threat as a service? Virtualization's impact on cloud security
-
(January-February 2012)
-
H.-Y. Tsai, M. Siebenhaar, A. Miede, Y.-L. Huang, and R. Steinmetz. 2012. Threat as a service? virtualization's impact on cloud security. IT Professional 14, 1 (January-February 2012), 32-37.
-
(2012)
IT Professional
, vol.14
, Issue.1
, pp. 32-37
-
-
Tsai, H.-Y.1
Siebenhaar, M.2
Miede, A.3
Huang, Y.-L.4
Steinmetz, R.5
-
268
-
-
79955718935
-
An approach for service composition and testing for cloud computing
-
June-July
-
W.-T. Tsai, P. Zhong, J. Balasooriya, Y. Chen, X. Bai, and J. Elston. June-July 2011. An approach for service composition and testing for cloud computing. In Proc. of ISADS 2011.
-
(2011)
Proc. of ISADS 2011
-
-
Tsai, W.-T.1
Zhong, P.2
Balasooriya, J.3
Chen, Y.4
Bai, X.5
Elston, J.6
-
269
-
-
84969915329
-
Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds
-
(July 2013)
-
P. K. Tysowski and M. A. Hasan. 2013. Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE TCC 1, 2 (July 2013), 172-186.
-
(2013)
IEEE TCC
, vol.1
, Issue.2
, pp. 172-186
-
-
Tysowski, P.K.1
Hasan, M.A.2
-
270
-
-
84869476900
-
Hourglass schemes: How to prove that cloud files are encrypted
-
October 2012. Raleigh, NC, USA
-
M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, E. Stefanov, and N. Triandopoulos. October 2012. Hourglass schemes: How to prove that cloud files are encrypted. In Proc. of ACM CCS 2012. Raleigh, NC, USA.
-
(2012)
Proc. of ACM CCS
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
Stefanov, E.5
Triandopoulos, N.6
-
271
-
-
70350405249
-
-
October. International Software Testing Qualifications Board (ISTQB). Retrieved from
-
E. van Veenendaal. October 2012. Standard glossary of terms used in Software Testing. International Software Testing Qualifications Board (ISTQB). Retrieved from http://www.istqb.org/downloads/finish/20/101.html.
-
(2012)
Standard Glossary of Terms Used in Software Testing
-
-
Van Veenendaal, E.1
-
272
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
(January 2011)
-
L. M. Vaquero, L. Rodero-Merino, and D. Moran. 2011. Locking the sky: A survey on IaaS cloud security. Computing 91, 1 (January 2011), 93-118.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Moran, D.3
-
273
-
-
84944333491
-
Secure and privacy-aware multiplexing of hardware-protected TPM integrity measurements among virtual machines
-
November 2013.
-
M. Velten and F. Stumpf. November 2013. Secure and privacy-aware multiplexing of hardware-protected TPM integrity measurements among virtual machines. In Proc. of ICISC 2012.
-
(2012)
Proc. of ICISC
-
-
Velten, M.1
Stumpf, F.2
-
274
-
-
84863392301
-
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
(April 2012)
-
Z.Wan, J. Liu, and R.-H. Deng. 2012. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE TIFS 7, 2 (April 2012), 743-754.
-
(2012)
IEEE TIFS
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.-H.3
-
275
-
-
84893341393
-
Storing shared data on the cloud via security-mediator
-
July 2013
-
B.Wang, S. S. M. Chow, M. Li, and H. Li. July 2013a. Storing shared data on the cloud via security-mediator. In Proc. of IEEE ICDCS 2013.
-
(2013)
Proc. of IEEE ICDCS
-
-
Wang, B.1
Chow, S.S.M.2
Li, M.3
Li, H.4
-
276
-
-
84922271700
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
B.Wang, B. Li, and H. Li. 2014. Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE TCC (2014).
-
(2014)
IEEE TCC (2014)
-
-
Wang, B.1
Li, B.2
Li, H.3
-
277
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
April 2013
-
B. Wang, B. Li, and H. Li. April 2013. Public auditing for shared data with efficient user revocation in the cloud. In Proc. of IEEE INFOCOM 2013.
-
(2013)
Proc. of IEEE INFOCOM
-
-
Wang, B.1
Li, B.2
Li, H.3
-
278
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
(August 2012)
-
C. Wang, N. Cao, K. Ren, and W. Lou. 2012. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23, 8 (August 2012), 1467-1479.
-
(2012)
IEEE TPDS
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
279
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
(February 2013)
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. 2013b. Privacy-preserving public auditing for secure cloud storage. IEEE TC 62, 2 (February 2013), 362-375.
-
(2013)
IEEE TC
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
280
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
(April 2012)
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. 2012. Toward secure and dependable storage services in cloud computing. IEEE TSC 5, 2 (April 2012), 220-232.
-
(2012)
IEEE TSC
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
281
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
March 2010
-
C. Wang, Q. Wang, K. Ren, and W. Lou. March 2010. Privacy-preserving public auditing for data storage security in cloud computing. In Proc. of IEEE INFOCOM 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
283
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
(May 2011)
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE TPDS 22, 5 (May 2011), 847-859.
-
(2011)
IEEE TPDS
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
284
-
-
79952380988
-
Modeling the runtime integrity of cloud servers: A scoped invariant perspective
-
November-December 2013
-
J. Wei, C. Pu, C. V. Rozas, A. Rajan, and F. Zhu. November-December 2013. Modeling the runtime integrity of cloud servers: A scoped invariant perspective. In Proc. of IEEE CloudCom 2010.
-
(2010)
Proc. of IEEE CloudCom
-
-
Wei, J.1
Pu, C.2
Rozas, C.V.3
Rajan, A.4
Zhu, F.5
-
285
-
-
84938383580
-
Third-party private DFA evaluation on encrypted files in the cloud
-
September 2012
-
L. Wei and M. K. Reiter. September 2012. Third-party private DFA evaluation on encrypted files in the cloud. In Proc. of ESORICS 2012.
-
(2012)
Proc. of ESORICS
-
-
Wei, L.1
Reiter, M.K.2
-
286
-
-
84938355388
-
Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
-
September. Egham, UK
-
L. Wei and M. K. Reiter. September 2013. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In Proc. of ESORICS 2013. Egham, UK.
-
(2013)
Proc. of ESORICS 2013
-
-
Wei, L.1
Reiter, M.K.2
-
287
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
April, (April April 2014)
-
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos. April 2014. Security and privacy for storage and computation in cloud computing. Information Sciences 258 (April April 2014), 371-386.
-
(2014)
Information Sciences
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
289
-
-
84877272118
-
Security and privacy in cloud computing
-
(April-June 2013)
-
Z. Xiao and Y. Xiao. 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials 15, 2 (April-June 2013), 843-859.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
290
-
-
84885205587
-
SnortFlow: A openflow-based intrusion prevention system in cloud environment
-
March 2013
-
T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar. March 2013. SnortFlow: A openflow-based intrusion prevention system in cloud environment. In Proc. of GENI GREE 2012.
-
(2012)
Proc. of GENI GREE
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.-J.4
Khatkar, P.5
-
291
-
-
84888848223
-
Software service signature (s3) for authentication in cloud computing
-
(December 2013)
-
L. Xu, X. Cao, Y. Zhang, and W. Wu. 2013a. Software service signature (s3) for authentication in cloud computing. Cluster Computing 16, 4 (December 2013), 905-914.
-
(2013)
Cluster Computing
, vol.16
, Issue.4
, pp. 905-914
-
-
Xu, L.1
Cao, X.2
Zhang, Y.3
Wu, W.4
-
292
-
-
84883084283
-
Proof-carrying cloud computation: The case of convex optimization
-
April 2013. Turin, Italy
-
Z. Xu, C. Wang, Q. Wang, K. Ren, and L. Wang. April 2013b. Proof-carrying cloud computation: The case of convex optimization. In Proc. of IEEE INFOCOM 2013. Turin, Italy.
-
(2013)
Proc. of IEEE INFOCOM
-
-
Xu, Z.1
Wang, C.2
Wang, Q.3
Ren, K.4
Wang, L.5
-
293
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
(September 2013)
-
K. Yang and X. Jia. 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE TPDS 24, 9 (September 2013), 1717-1726.
-
(2013)
IEEE TPDS
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
294
-
-
84883076035
-
AC-MACS: Effective data access control for multiauthority cloud storage systems
-
April 2013. Turin, Italy
-
K. Yang, X. Jia, K. Ren, and B. Zhang. April 2013. DAC-MACS: Effective data access control for multiauthority cloud storage systems. In Proc. of IEEE INFOCOM 2013. Turin, Italy.
-
(2013)
Proc. of IEEE INFOCOM
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
-
295
-
-
84877647239
-
Verifying cloud service level agreement
-
December . Anaheim, CA, USA
-
L. Ye, H. Zhang, J. Shi, and X. Du. December 2012. Verifying cloud service level agreement. In Proc. of IEEE GLOBECOM 2012. Anaheim, CA, USA.
-
(2012)
Proc. of IEEE GLOBECOM 2012
-
-
Ye, L.1
Zhang, H.2
Shi, J.3
Du, X.4
-
297
-
-
84897586040
-
Toward secure multikeyword top-k retrieval over encrypted cloud data
-
(July 2013)
-
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li. 2013a. Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE TDSC 10, 4 (July 2013), 239-250.
-
(2013)
IEEE TDSC
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
-
298
-
-
78449233821
-
Testing as a service over cloud
-
June 2010
-
L. Yu, W.-T. Tsai, X. Chen, L. Liu, Y. Zhao, L. Tang, and W. Zhao. June 2010a. Testing as a service over cloud. In Proc. of IEEE SOSE 2010.
-
(2010)
Proc. of IEEE SOSE
-
-
Yu, L.1
Tsai, W.-T.2
Chen, X.3
Liu, L.4
Zhao, Y.5
Tang, L.6
Zhao, W.7
-
299
-
-
84958591167
-
Can we beat DDoS attacks in clouds?
-
(July 2013)
-
S. Yu, Y. Tian, S. Guo, and D. Wu. 2013b. Can we beat DDoS attacks in clouds? IEEE TPDS (July 2013).
-
(2013)
IEEE TPDS
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.4
-
300
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
March
-
S. Yu, C. Wang, K. Ren, and W. Lou. March 2010b. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proc. of IEEE INFOCOM 2010.
-
(2010)
Proc. of IEEE INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
302
-
-
79958738559
-
Risk-based security testing in cloud computing environments
-
March
-
P. Zech. March 2011. Risk-based security testing in cloud computing environments. In Proc. of IEEE ICST 2011.
-
(2011)
Proc. of IEEE ICST 2011
-
-
Zech, P.1
-
304
-
-
84889019424
-
Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
-
November
-
Y. Zhang and M. K. Reiter. November 2013. Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In Proc. of ACM CCS 2013.
-
(2013)
Proc. of ACM CCS 2013
-
-
Zhang, Y.1
Reiter, M.K.2
-
305
-
-
84858038685
-
Flexible service selection with user-specific QoS support in service-oriented architecture
-
(March 2012)
-
L. Zhao, Y. Ren, M. Li, and K. Sakurai. 2012. Flexible service selection with user-specific QoS support in service-oriented architecture. Journal of Network and Computer Applications 35, 3 (March 2012), 962-973.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 962-973
-
-
Zhao, L.1
Ren, Y.2
Li, M.3
Sakurai, K.4
-
307
-
-
84878830854
-
Dynamic audit services for outsourced storages in clouds
-
(April 2013)
-
Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu. 2013. Dynamic audit services for outsourced storages in clouds. IEEE TSC 6, 2 (April 2013), 227-238.
-
(2013)
IEEE TSC
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Hu, C.-J.6
-
309
-
-
79959557055
-
Addressing cloud computing security issues
-
(March 2012)
-
D. Zissis and D. Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems 28, 3 (March 2012), 583-592.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
310
-
-
84885955735
-
Design and implementation of a trusted monitoring framework for cloud platforms
-
(October 2013)
-
D. Zou, W. Zhang, W. Qiang, G. Xiang, L. T. Yang, H. Jin, and K. Hu. 2013. Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems 29, 8 (October 2013), 2092-2102.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.8
, pp. 2092-2102
-
-
Zou, D.1
Zhang, W.2
Qiang, W.3
Xiang, G.4
Yang, L.T.5
Jin, H.6
Hu, K.7
|