-
1
-
-
77957283243
-
Policy-driven service composition with information flow control
-
She, W., Yen, I.,Thuraisingham, B., and Bertino, E., "Policy-Driven Service Composition with Information Flow Control", IEEE Int'l Conf. on Web Services, 2010, pp. 50-57.
-
(2010)
IEEE Int'l Conf. on Web Services
, pp. 50-57
-
-
She, W.1
Yen, I.2
Thuraisingham, B.3
Bertino, E.4
-
2
-
-
80053165731
-
Rule-based run-time information flow control in service cloud
-
She, W., Yen, I.,Thuraisingham, B., and Bertino, E., "Rule-Based Run-Time Information Flow Control in Service Cloud", IEEE Int'l Conf. on Web Services, 2011, pp. 524-531.
-
(2011)
IEEE Int'l Conf. on Web Services
, pp. 524-531
-
-
She, W.1
Yen, I.2
Thuraisingham, B.3
Bertino, E.4
-
3
-
-
84894430070
-
A scalable architecture for automatic service composition
-
Paik, I., Chen, W., and Huhns, M. N., "A Scalable Architecture for Automatic Service Composition", IEEE Transactions on Services Computing, 7(1), 2014, pp. 82-95.
-
(2014)
IEEE Transactions on Services Computing
, vol.7
, Issue.1
, pp. 82-95
-
-
Paik, I.1
Chen, W.2
Huhns, M.N.3
-
4
-
-
84863898285
-
Tree-based search algorithm for web service composition in saas
-
Wu, C., And Khoury, I., "Tree-Based Search Algorithm for Web Service Composition in Saas", 9th Int'l Conf. on Information Technology-New Generations, 2012, pp. 132-138.
-
(2012)
9th Int'l Conf. on Information Technology-New Generations
, pp. 132-138
-
-
Wu, C.1
Khoury, I.2
-
5
-
-
84862968346
-
Wsrank: A method for web service ranking in cloud environment
-
Hu, R., Dou, W., Liu, X. F., and Liu, J., "WSrank: A Method for Web Service Ranking in Cloud Environment", 9th IEEE Int'l Conf. on Dependable, Autonomic and Secure Computing, 2011, pp. 585-592.
-
(2011)
9th IEEE Int'l Conf. on Dependable, Autonomic and Secure Computing
, pp. 585-592
-
-
Hu, R.1
Dou, W.2
Liu, X.F.3
Liu, J.4
-
6
-
-
79961143765
-
Improving utilization of infrastructure clouds
-
Marshall, P., Keahey, K., and Freeman, T., "Improving Utilization of Infrastructure Clouds", 11th IEEE/ACM Int'l Symposium on Cluster, Cloud and Grid Computing, 2011, pp. 205-214.
-
(2011)
11th IEEE/ACM Int'l Symposium on Cluster, Cloud and Grid Computing
, pp. 205-214
-
-
Marshall, P.1
Keahey, K.2
Freeman, T.3
-
7
-
-
46849100465
-
Soap-based secure conversation and collaboration
-
Rahaman, M. A., And Schaad, A., "Soap-Based Secure Conversation and Collaboration", IEEE 13th conf. on Web Services, 2007, pp. 471-480.
-
(2007)
IEEE 13th Conf. on Web Services
, pp. 471-480
-
-
Rahaman, M.A.1
Schaad, A.2
-
8
-
-
66249128606
-
How to test dos defenses
-
Mirkovic, J., Fahmy, S., Reiher, P., and Thomas, R. K., "How to Test DoS Defenses", Conf. on Cybersecurity Applications & Technology, 2009, pp. 103-117.
-
(2009)
Conf. on Cybersecurity Applications & Technology
, pp. 103-117
-
-
Mirkovic, J.1
Fahmy, S.2
Reiher, P.3
Thomas, R.K.4
-
9
-
-
70349687721
-
The accountability problem of flooding attacks in service-oriented architectures
-
Jensen, M., and Schwenk, J., "The Accountability Problem of Flooding Attacks in Service-Oriented Architectures", Int'l Conf. on Availability, Reliability and Security, 2009, pp. 25-32.
-
(2009)
Int'l Conf. on Availability, Reliability and Security
, pp. 25-32
-
-
Jensen, M.1
Schwenk, J.2
-
10
-
-
78650317639
-
Validating dos vulnerabilities in web services
-
Suriadi, S., Clark, A., and Schmidt, D., "Validating DoS Vulnerabilities in Web Services", 4th Int'l Conf. on Network and System Security, 2010, pp. 175-182.
-
(2010)
4th Int'l Conf. on Network and System Security
, pp. 175-182
-
-
Suriadi, S.1
Clark, A.2
Schmidt, D.3
-
11
-
-
81255200367
-
Intrusion tolerant approach for denial of service attacks to web services
-
Ficco, M., and Rak, M., "Intrusion Tolerant Approach for Denial of Service Attacks to Web Services", 1st Int'l Conf. on Data Compression, Communications and Processing, 2011, pp. 285-292.
-
(2011)
1st Int'l Conf. on Data Compression, Communications and Processing
, pp. 285-292
-
-
Ficco, M.1
Rak, M.2
-
13
-
-
35248848345
-
A service architecture for countering distributed denial of service attacks
-
Zaffar, F., and Kedem,G., "A Service Architecture for Countering Distributed Denial of Service Attacks", 21st Int'l Conf. on Advanced Information Networking and Applications, 2007, pp. 36-42.
-
(2007)
21st Int'l Conf. on Advanced Information Networking and Applications
, pp. 36-42
-
-
Zaffar, F.1
Kedem, G.2
-
14
-
-
33845531695
-
Protecting web services from dos attacks by soap message validation
-
Gruschka, N., and Luttenberger, N., "Protecting Web Services from DoS Attacks by Soap Message Validation", The IFIP TC-11 21st Int'l Conf. on Information Security, 2006, pp. 171-182.
-
(2006)
The IFIP TC-11 21st Int'l Conf. on Information Security
, pp. 171-182
-
-
Gruschka, N.1
Luttenberger, N.2
-
15
-
-
38949087920
-
Design and implementation of an xml firewall
-
Loh, Y., Yau, W., Wong, C., and Ho, W., "Design and Implementation of an Xml Firewall", Int'l Conf. on Computational Intelligence and Security, 2006, pp. 1147-1150.
-
(2006)
Int'l Conf. on Computational Intelligence and Security
, pp. 1147-1150
-
-
Loh, Y.1
Yau, W.2
Wong, C.3
Ho, W.4
-
16
-
-
38949108959
-
Preventing service oriented denial of service (presodos): A proposed approach
-
Padmanabhuni, S., Singh, V., Kumar, K M. S., and Chatterjee, A., "Preventing Service Oriented Denial of Service (Presodos): A Proposed Approach", IEEE Int'l Conf. on Web Services, 2006, pp. 577-584.
-
(2006)
IEEE Int'l Conf. on Web Services
, pp. 577-584
-
-
Padmanabhuni, S.1
Singh, V.2
Kumar, S.K.M.3
Chatterjee, A.4
-
17
-
-
80053139318
-
Defending web services against denial of service attacks using client puzzles
-
Suriadi, S., Stebila, D., Clark, A., and Liu, H., "Defending Web Services against Denial of Service Attacks Using Client Puzzles", IEEE Int'l Conf. on Web Services, 2011, pp. 25-32.
-
(2011)
IEEE Int'l Conf. on Web Services
, pp. 25-32
-
-
Suriadi, S.1
Stebila, D.2
Clark, A.3
Liu, H.4
-
18
-
-
77955035143
-
A multiagent solution to adaptively classify soap message and protect against dos attack
-
Pinz, C. I., De Paz, J. F., Bajo, J., and Corchado,J. M., "A Multiagent Solution to Adaptively Classify Soap Message and Protect against DoS Attack", 13th Conf. on the Current Topics in Artificial Intelligence, 2010, pp. 181-190.
-
(2010)
13th Conf. on the Current Topics in Artificial Intelligence
, pp. 181-190
-
-
Pinz, C.I.1
De Paz, J.F.2
Bajo, J.3
Corchado, J.M.4
-
19
-
-
49049101669
-
An adaptive intrusion detection and prevention (id/IP) framework for web services
-
Yee, C., Shin, W., and Rao, G., "An Adaptive Intrusion Detection and Prevention (Id/Ip) Framework for Web Services", Int'l Conf. on Convergence Information Technology, 2007, pp. 528-534.
-
(2007)
Int'l Conf. on Convergence Information Technology
, pp. 528-534
-
-
Yee, C.1
Shin, W.2
Rao, G.3
-
21
-
-
74349113474
-
On technical security issues in cloud computing
-
Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L., "On Technical Security Issues in Cloud Computing", IEEE Int'l Conf. on Cloud Computing, 2009, pp. 109-116.
-
(2009)
IEEE Int'l Conf. on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
22
-
-
84929538540
-
Diagnosing vulnerability patterns in cloud audit logs
-
Springer New York
-
Xie, R., Gamble, R., and Ahmed, N., "Diagnosing Vulnerability Patterns in Cloud Audit Logs": High Performance Cloud Auditing and Applications, Springer New York, 2014, pp. 119-146.
-
(2014)
High Performance Cloud Auditing and Applications
, pp. 119-146
-
-
Xie, R.1
Gamble, R.2
Ahmed, N.3
-
23
-
-
84944260932
-
-
accessed 01/21/2014
-
https://downloads. cloudsecurityalliance. org/ initiatives/ top-threats/The-Notorious-Nine-Cloud-Computing -Top-Threats-in-2013. pdf, accessed 01/21/2014, 2014.
-
(2014)
-
-
-
24
-
-
84868097806
-
Triangle-area-based multivariate correlation analysis for effective dos attack detection
-
Tan, Z., Jamdagni, A., He, X., Nanda, P., and Liu, R., "Triangle-Area-Based Multivariate Correlation Analysis for Effective DoS Attack Detection", 11th Int'l Conf. on Trust, Security and Privacy in Computing and Communications, 2012, pp. 33-40.
-
(2012)
11th Int'l Conf. on Trust, Security and Privacy in Computing and Communications
, pp. 33-40
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.5
-
25
-
-
84856113439
-
Cbf: A packet filtering method for ddos attack defense in cloud environment
-
Chen, Q., Lin, W., Dou, W., and Yu, S., "Cbf: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment", IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing, 2011, pp. 427-434.
-
(2011)
IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing
, pp. 427-434
-
-
Chen, Q.1
Lin, W.2
Dou, W.3
Yu, S.4
-
26
-
-
84862973274
-
Study of multistage anomaly detection for secured cloud computing resources in future internet
-
Cha, B., and Kim, J., "Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet", IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing, 2011, pp. 1046-1050.
-
(2011)
IEEE 9th Int'l Conf. on Dependable, Autonomic and Secure Computing
, pp. 1046-1050
-
-
Cha, B.1
Kim, J.2
-
27
-
-
84856328279
-
Edosshield-a two-steps mitigation technique against edos attacks in cloud computing
-
Sqalli, M. H., Al-Haidari, F., and Salah, K., "EDoSShield-a Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing", 4th IEEE Int'l Conf. on Utility and Cloud Computing, 2011, pp. 49-56.
-
(2011)
4th IEEE Int'l Conf. on Utility and Cloud Computing
, pp. 49-56
-
-
Sqalli, M.H.1
Al-Haidari, F.2
Salah, K.3
-
29
-
-
80455144626
-
Parametric differences between a real-world distributed denial-of-service attack and a flash event
-
Bhatia, S., Mohay, G., Tickle, A., and Ahmad, E., "Parametric Differences between a Real-World Distributed Denial-of-Service Attack and a Flash Event", Int'l Conf. on Availability, Reliability and Security (ARES), 2011, pp. 210-217.
-
(2011)
Int'l Conf. on Availability, Reliability and Security (ARES)
, pp. 210-217
-
-
Bhatia, S.1
Mohay, G.2
Tickle, A.3
Ahmad, E.4
-
30
-
-
34548812317
-
Methods of distinguishing flash crowds from spoofed dos attacks
-
Le, Q., Zhanikeev, M., and Tanaka, Y., "Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks", 3rd EuroNGI Conf. on Next Generation Internet Networks, 2007, pp. 167-173.
-
(2007)
3rd EuroNGI Conf. on Next Generation Internet Networks
, pp. 167-173
-
-
Le, Q.1
Zhanikeev, M.2
Tanaka, Y.3
-
31
-
-
0009874629
-
On the stop-loss and total variation distances between random sums
-
Denuit, M., And Bellegem,S. V., "On the Stop-Loss and Total Variation Distances between Random Sums", Statistics and Probability Letters, 53(2), 2001, pp. 153-165.
-
(2001)
Statistics and Probability Letters
, vol.53
, Issue.2
, pp. 153-165
-
-
Denuit, M.1
Bellegem, S.V.2
-
32
-
-
34547321146
-
Qos-aware middleware for web services composition-a qualitative approach
-
Issa, H., Assi, C., And Debbabi, M., "QoS-Aware Middleware for Web Services Composition-a Qualitative Approach", 11th IEEE Symposium on Computers and Communications (ISCC'06), 2006, pp. 359-364.
-
(2006)
11th IEEE Symposium on Computers and Communications (ISCC'06)
, pp. 359-364
-
-
Issa, H.1
Assi, C.2
Debbabi, M.3
|