-
1
-
-
84863174772
-
Virtualization security for cloud computing service
-
Luo, S., Lin, Z., Chen, X., Yang, Z., Chen, J.: Virtualization security for cloud computing service. In IEEE International Conference for Cloud and Service Computing (CSC), (2011).
-
(2011)
IEEE International Conference for Cloud and Service Computing (CSC)
-
-
Luo, S.1
Lin, Z.2
Chen, X.3
Yang, Z.4
Chen, J.5
-
4
-
-
84978770937
-
-
Google
-
Google, GoogleApps, http://www.google.com/apps/intl/en/business/index.html.
-
GoogleApps
-
-
-
5
-
-
84888494424
-
-
Force.com
-
Salesforce.com, Force.com, http://www.salesforce.com/platform/.
-
Salesforce.com
-
-
-
7
-
-
84866350168
-
-
arXiv:1109.5388
-
Bhadauria, R., Chaki, R., Chaki, N., Sanyal, S.: A Survey on Security Issues in Cloud Computing. arXiv:1109.5388, (2011).
-
(2011)
A Survey on Security Issues in Cloud Computing
-
-
Bhadauria, R.1
Chaki, R.2
Chaki, N.3
Sanyal, S.4
-
8
-
-
74349113474
-
On technical security issues in cloud computing
-
Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In IEEE International Conference on Cloud Computing (CLOUD'09), (2009).
-
(2009)
IEEE International Conference on Cloud Computing (CLOUD'09)
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
9
-
-
84978771338
-
Security of cloud computing users: A study of practitioners in the US & Europe
-
Ponemon, L.: Security of Cloud Computing Users: A Study of Practitioners in the US & Europe. Ponemon Institute Research Report, (2010).
-
(2010)
Ponemon Institute Research Report
-
-
Ponemon, L.1
-
10
-
-
84866636848
-
Secure virtualization for cloud environment using hypervisor-based technology
-
Sabahi, F.: Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. Int. Journal of Machine Learning and Computing, 2(1), (2012).
-
(2012)
Int. Journal of Machine Learning and Computing
, vol.2
, Issue.1
-
-
Sabahi, F.1
-
12
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-degree Compared. In Grid Computing Environments Workshop, GCE'08, (2008).
-
(2008)
Grid Computing Environments Workshop, GCE'08
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
13
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control. In Proceedings of the 2009 ACM workshop on Cloud Computing Security, (2009).
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
16
-
-
85080549077
-
Secure cloud computing with a virtualized network infrastructure
-
Hao, F., Lakshman, T., Mukherjee, S., Song, H.: Secure Cloud Computing with a Virtualized Network Infrastructure. In Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), (2010).
-
(2010)
Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10)
-
-
Hao, F.1
Lakshman, T.2
Mukherjee, S.3
Song, H.4
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart T, Tromert E, Shacham H, Savage S.: Hey, You, Get Off of my Cloud: Exploring Information Leakage in Third-party Compute Clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromert, E.2
Shacham, H.3
Savage, S.4
|