-
1
-
-
81055138877
-
Cloud computing security considerations
-
Xi’an, China, 14–16 September 2011
-
Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xi’an, China, 14–16 September 2011; pp. 1–5.
-
Proceedings of the 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
, pp. 1-5
-
-
Tripathi, A.1
Mishra, A.2
-
2
-
-
80155136769
-
Security issues and countermeasures in cloud computing
-
Nanjing, China, 15–18 September 2011
-
Wang, J.-J.; Mu, S. Security issues and countermeasures in cloud computing. In Proceedings of the 2011 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), Nanjing, China, 15–18 September 2011; pp. 843–846.
-
Proceedings of the 2011 IEEE International Conference on Grey Systems and Intelligent Services (GSIS)
, pp. 843-846
-
-
Wang, J.-J.1
Mu, S.2
-
4
-
-
80052973478
-
Analysis and research about cloud computing security protect policy
-
Wuhan, China, 20–21 August 2011
-
Lv, H.; Hu, Y. Analysis and research about cloud computing security protect policy. In Proceedings of the 2011 International Conference on Intelligence Science and Information Engineering (ISIE), Wuhan, China, 20–21 August 2011; pp. 214–216.
-
Proceedings of the 2011 International Conference on Intelligence Science and Information Engineering (ISIE)
, pp. 214-216
-
-
Lv, H.1
Hu, Y.2
-
5
-
-
77954051808
-
-
USA
-
Mell, P and Grance, T. The NIST Definition of Cloud Computing, NIST, USA. available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, USA, 2009.
-
(2009)
The NIST Definition of Cloud Computing, NIST, USA
-
-
Mell, P.1
Grance, T.2
-
6
-
-
84857184370
-
Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment
-
Mumbai, India, 11– 14 December 2011
-
Jain, P.; Rane, D.; Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11– 14 December 2011; pp. 456–461.
-
Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT)
, pp. 456-461
-
-
Jain, P.1
Rane, D.2
-
7
-
-
79952743231
-
Design and auditing of cloud computing security
-
Colombo, Sri Lanka, 17–19 December 2010
-
Gowrigolla, B.; Sivaji, S.; Masillamani, M.R. Design and auditing of cloud computing security. In Proceedings of the 2010 5th International Conference on Information and Automation for Sustainability (ICIAFs), Colombo, Sri Lanka, 17–19 December 2010; pp. 292–297.
-
Proceedings of the 2010 5Th International Conference on Information and Automation for Sustainability (Iciafs)
, pp. 292-297
-
-
Gowrigolla, B.1
Sivaji, S.2
Masillamani, M.R.3
-
8
-
-
80052184968
-
Berthier, R. A cloud-based intrusion detection and response system for mobile phones
-
Hong Kong, China, 27–30 June 2011
-
Houmansadr, A.; Zonouz, S.A.; Berthier, R. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, 27–30 June 2011; pp. 31–32.
-
Proceedings of the 2011 IEEE/IFIP 41St International Conference on Dependable Systems and Networks Workshops (DSN-W)
, pp. 31-32
-
-
Houmansadr, A.1
Zonouz, S.A.2
-
11
-
-
84861957968
-
Towards secure and dependable storage services in cloud computing
-
Wang, C.; Wang, Q.; Ren, K.; Lou, W. Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 2012, 5, 220–232.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
12
-
-
84862933095
-
Towards scalable, fine-grained, intrusion-tolerant data protection models for healthcare cloud
-
Changsha, China, 16–18 November 2011
-
Lingfeng, C.; Hoang, D.B. Towards scalable, fine-grained, intrusion-tolerant data protection models for healthcare cloud. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, China, 16–18 November 2011; pp. 126–133.
-
Proceedings of the 2011 IEEE 10Th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom)
, pp. 126-133
-
-
Lingfeng, C.1
Hoang, D.B.2
-
13
-
-
84857962677
-
Towards cloud computing SLA risk management: Issues and challenges
-
Maui, HI, USA, 4–7 January 2012
-
Morin, J.; Aubert, J.; Gateau, B. Towards cloud computing SLA risk management: Issues and challenges. In Proceedings of the 2012 45th Hawaii International Conference on System Science (HICSS), Maui, HI, USA, 4–7 January 2012; pp. 5509–5514.
-
Proceedings of the 2012 45Th Hawaii International Conference on System Science (HICSS)
, pp. 5509-5514
-
-
Morin, J.1
Aubert, J.2
Gateau, B.3
-
14
-
-
79957590723
-
ELMO: Energy aware local monitoring in sensor networks
-
Khalil, I.M. ELMO: Energy aware local monitoring in sensor networks. IEEE Trans. Dependable Secur. Comput. 2011, 8, 523–536.
-
(2011)
IEEE Trans. Dependable Secur. Comput.
, vol.8
, pp. 523-536
-
-
Khalil, I.M.1
-
15
-
-
70249120421
-
MISPAR: Mitigating stealthy packet dropping in locally-monitored multi-hop wireless Ad Hoc networks
-
Istanbul, Turkey, 22–25 September 2008; ACM: New York, NY, USA, 2008
-
Khalil, I.; Bagchi, S. MISPAR: Mitigating stealthy packet dropping in locally-monitored multi-hop wireless Ad Hoc networks. In Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm ’08), Istanbul, Turkey, 22–25 September 2008; ACM: New York, NY, USA, 2008; article 28, pp. 1–10.
-
Proceedings of the 4Th International Conference on Security and Privacy in Communication Netowrks (Securecomm ’08)
, pp. 1-10
-
-
Khalil, I.1
Bagchi, S.2
-
16
-
-
79551638042
-
MCC: Mitigating colluding collision attacks in wireless sensor networks
-
Miami, FL, USA, 6–10 December 2010
-
Khalil, I. MCC: Mitigating colluding collision attacks in wireless sensor networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), Miami, FL, USA, 6–10 December 2010; pp. 1–5.
-
Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-5
-
-
Khalil, I.1
-
17
-
-
70450257746
-
An OFDMA-based MAC protocol for under water acoustic wireless sensor network
-
Leipzig, Germany, June 21 – 24 2009
-
M. Hayajneh, I. Khalil and Y. Gadallah, “An OFDMA-based MAC protocol for under water acoustic wireless sensor network,” Proceedings of the 2009 ACM International Conference on Wireless Communications and Mobile Computing (IWCMC’09), Leipzig, Germany, June 21 – 24 2009, pp. 810-814.
-
Proceedings of the 2009 ACM International Conference on Wireless Communications and Mobile Computing (IWCMC’09)
, pp. 810-814
-
-
Hayajneh, M.1
Khalil, I.2
Gadallah, Y.3
-
18
-
-
70449512359
-
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
-
2009, ISCC 2009, Sousse, 5–8 July 2009
-
Khalil, I.; Hayajneh, M.; Awad, M. SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks. In Proceedings of the IEEE Symposium on Computers and Communications, 2009, ISCC 2009, Sousse, 5–8 July 2009; pp. 368–373.
-
Proceedings of the IEEE Symposium on Computers and Communications
, pp. 368-373
-
-
Khalil, I.1
Hayajneh, M.2
Awad, M.3
-
19
-
-
80053414558
-
Cloud computing security—Trends and research directions
-
DC, USA, 4–9 July 2011
-
Sengupta, S.; Kaulgud, V.; Sharma, V.S. Cloud computing security—Trends and research directions. In Proceedings of the 2011 IEEE World Congress on Services (SERVICES), Washington, DC, USA, 4–9 July 2011; pp. 524–531.
-
Proceedings of the 2011 IEEE World Congress on Services (SERVICES), Washington
, pp. 524-531
-
-
Sengupta, S.1
Kaulgud, V.2
Sharma, V.S.3
-
20
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chicago, IL, USA, 13 November 2009; ACM Press: New York, NY, USA
-
Chow, R.; Golle, P.; Jakobsson, M.; Shi, E.; Staddon, J.; Masuoka, R.; Molina, J. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, USA, 13 November 2009; ACM Press: New York, NY, USA, 2009; pp. 85–90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
21
-
-
77954461010
-
Data protection in outsourcing scenarios: Issues and directions
-
Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA
-
Samarati, P.; di Vimercati, S.D.C. Data protection in outsourcing scenarios: Issues and directions. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA, 2010; pp. 1–14.
-
(2010)
Proceedings of the 5Th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10)
, pp. 1-14
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
22
-
-
84880122071
-
A comparison and security analysis of the cloud computing software platforms
-
Nis, Serbia, 5–8 October 2011
-
Popovic, O.; Jovanovic, Z.; Jovanovic, N.; Popovic, R. A comparison and security analysis of the cloud computing software platforms. In Proceedings of the 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS), Nis, Serbia, 5–8 October 2011; Volume 2, pp. 632–634.
-
Proceedings of the 2011 10Th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS)
, vol.2
, pp. 632-634
-
-
Popovic, O.1
Jovanovic, Z.2
Jovanovic, N.3
Popovic, R.4
-
23
-
-
80052136229
-
Cloud computing security auditing
-
Gyeongju, Korea, 21–23 June 2011
-
Gul, I.; ur Rehman, A.; Islam, M.H. Cloud computing security auditing. In Proceedings of the 2011 The 2nd International Conference on Next Generation Information Technology (ICNIT), Gyeongju, Korea, 21–23 June 2011; pp. 143–148.
-
Proceedings of the 2011 the 2Nd International Conference on Next Generation Information Technology (ICNIT)
, pp. 143-148
-
-
Gul, I.1
Ur Rehman, A.2
Islam, M.H.3
-
24
-
-
74049112206
-
-
Cloud security issues, Bangalore, India, 21–25 September
-
Kandukuri, B.R.; Paturi, V.R.; Rakshit, A. Cloud security issues. In Proceedings of the IEEE International Conference on Services Computing, 2009 (SCC ’09), Bangalore, India, 21–25 September 2009; pp. 517–520.
-
(2009)
Proceedings of the IEEE International Conference on Services Computing, 2009 (SCC ’09)
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturi, V.R.2
Rakshit, A.3
-
25
-
-
78049340512
-
IT auditing to assure a secure cloud computing
-
Miami, FL, USA, 5–10 July 2010
-
Chen, Z.; Yoon, J. IT auditing to assure a secure cloud computing. In Proceedings of the 2010 6th World Congress on Services (SERVICES-1), Miami, FL, USA, 5–10 July 2010; pp. 253–259.
-
Proceedings of the 2010 6Th World Congress on Services (SERVICES-1)
, pp. 253-259
-
-
Chen, Z.1
Yoon, J.2
-
27
-
-
33644848799
-
The status of method: Flexibility, consistency and coherence
-
Holloway, I.; Todres, L. The status of method: Flexibility, consistency and coherence. Qual. Res. 2003, 3, 345–357.
-
(2003)
Qual. Res.
, vol.3
, pp. 345-357
-
-
Holloway, I.1
Todres, L.2
-
28
-
-
84887724123
-
An analysis of security issues for cloud computing
-
Hashizume, K.; Rosado, D.G.; Fernández-Medina, E.; Fernandez, E.B. An analysis of security issues for cloud computing. J. Internet Serv. Appl. 2013, 4, 5.
-
(2013)
J. Internet Serv. Appl.
, vol.4
, pp. 5
-
-
Hashizume, K.1
Rosado, D.G.2
Fernández-Medina, E.3
Fernandez, E.B.4
-
29
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D.; Lekkas, D. Addressing cloud computing security issues. Future Gener. Comput. Syst. 2012, 28, 583–592.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
31
-
-
33750505977
-
Using thematic analysis in psychology
-
Braun, V.; Clarke, V. Using thematic analysis in psychology. Qual. Res. Psychol. 2006, 3, 77–101.
-
(2006)
Qual. Res. Psychol.
, vol.3
, pp. 77-101
-
-
Braun, V.1
Clarke, V.2
-
32
-
-
85063832415
-
-
accessed on 18 March 2012
-
A Survey on Cloud Computing Security, Challenges and Threats|Whitepapers|TechRepublic. Available online: http://www.techrepublic.com/whitepapers/a-survey-on-cloud-computing-security-challenges-and-threats/3483757 (accessed on 18 March 2012).
-
-
-
-
33
-
-
84857973702
-
Challenges in cross-organizational security management
-
January 2012
-
Thalmann, S.; Bachlechner, D.; Demetz, L.; Maier, R. Challenges in cross-organizational security management. In Proceedings of the 2012 45th Hawaii International Conference on System Science (HICSS), Maui, HI, USA, 4–7 January 2012; pp. 5480–5489.
-
(2012)
Proceedings of the 2012 45Th Hawaii International Conference on System Science (HICSS), Maui, HI, USA, 4–
, pp. 5480-5489
-
-
Thalmann, S.1
Bachlechner, D.2
Demetz, L.3
Maier, R.4
-
34
-
-
84867718176
-
Large-scale coordinated attacks: Impact on the cloud security
-
Palermo, Italy, 4–6 July 2012
-
Riquet, D.; Grimaud, G.; Hauspie, M. Large-scale coordinated attacks: Impact on the cloud security. In Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Palermo, Italy, 4–6 July 2012; pp. 558–563.
-
Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
, pp. 558-563
-
-
Riquet, D.1
Grimaud, G.2
Hauspie, M.3
-
35
-
-
84857150325
-
Pourzandi, M. A quantitative analysis of current security concerns and solutions for cloud computing
-
Athens, Greece, 29 November–1 December 2011
-
Gonzalez, N.; Miers, C.; Redigolo, F.; Carvalho, T.; Simplicio, M.; Naslund, M.; Pourzandi, M. A quantitative analysis of current security concerns and solutions for cloud computing. In Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, 29 November–1 December 2011; pp. 231–238.
-
Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (Cloudcom)
, pp. 231-238
-
-
Gonzalez, N.1
Miers, C.2
Redigolo, F.3
Carvalho, T.4
Simplicio, M.5
Naslund, M.6
-
36
-
-
84857463459
-
Security concerns for cloud computing in aircraft data networks
-
Abu Dhabi, United Arab Emirates, 11–14 December 2011
-
Rachel Suresh, N.; Mathew, S.V. Security concerns for cloud computing in aircraft data networks. In Proceedings of the 2011 International Conference for Internet Technology and Secured Transactions (ICITST), Abu Dhabi, United Arab Emirates, 11–14 December 2011; pp. 132–136.
-
Proceedings of the 2011 International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 132-136
-
-
Rachel Suresh, N.1
Mathew, S.V.2
-
37
-
-
80054989565
-
Scheduler vulnerabilities and coordinated attacks in cloud computing
-
Cambridge, MA, USA, 25–27 August 2011
-
Fangfei, Z.; Goel, M.; Desnoyers, P.; Sundaram, R. Scheduler vulnerabilities and coordinated attacks in cloud computing. In Proceedings of the 2011 10th IEEE International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 25–27 August 2011; pp. 123–130.
-
Proceedings of the 2011 10Th IEEE International Symposium on Network Computing and Applications (NCA)
, pp. 123-130
-
-
Fangfei, Z.1
Goel, M.2
Desnoyers, P.3
Sundaram, R.4
-
38
-
-
85063816891
-
-
accessed on 18 March 2012
-
Who Can You Trust in the Cloud? A Review of Security Issues within Cloud Computing. Available online: http://www.drjeffdaniels.com/1/post/2011/10/who-can-you-trust-in-the-cloud-a-review-of-security-issues-within-cloud-computing.html (accessed on 18 March 2012).
-
A Review of Security Issues within Cloud Computing
-
-
-
40
-
-
84857170570
-
Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation
-
Mumbai, India, 11–14 December 2011
-
Behl, A. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11–14 December 2011; pp. 217–222.
-
Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT)
, pp. 217-222
-
-
Behl, A.1
-
42
-
-
84859993194
-
Cloud security assessment and identity management
-
Dhaka, Bangladesh, 22–24 December 2011
-
Bhardwaj, A.; Kumar, V. Cloud security assessment and identity management. In Proceedings of the 2011 14th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 22–24 December 2011; pp. 387–392.
-
Proceedings of the 2011 14Th International Conference on Computer and Information Technology (ICCIT)
, pp. 387-392
-
-
Bhardwaj, A.1
Kumar, V.2
-
44
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
(CLOUD), Miami, FL, USA, 5–10 July 2010
-
Gruschka, N.; Jensen, M. Attack surfaces: A taxonomy for attacks on cloud services. In Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, FL, USA, 5–10 July 2010; pp. 276–279.
-
Proceedings of the 2010 IEEE 3Rd International Conference on Cloud Computing
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
45
-
-
51849158526
-
Comparison of the three CPU schedulers in Xen
-
Cherkasova, L.; Gupta, D.; Vahdat, A. Comparison of the three CPU schedulers in Xen. ACM SIGMETERICS Perform. Eval. Rev. 2007, 35, 42–51.
-
(2007)
ACM SIGMETERICS Perform. Eval. Rev.
, vol.35
, pp. 42-51
-
-
Cherkasova, L.1
Gupta, D.2
Vahdat, A.3
-
46
-
-
84863037213
-
The study on data security in cloud computing based on virtualization
-
Cuangzhou, China, 9–11 December 2011
-
Fu, W.; Li, X. The study on data security in cloud computing based on virtualization. In Proceedings of the 2011 International Symposium on IT in Medicine and Education (ITME), Cuangzhou, China, 9–11 December 2011; Volume 2, pp. 257–261.
-
Proceedings of the 2011 International Symposium on IT in Medicine and Education (ITME)
, vol.2
, pp. 257-261
-
-
Fu, W.1
Li, X.2
-
47
-
-
67650046427
-
Task-aware virtual machine scheduling for I/O Performance
-
Washington, DC, March 11-13, 2009
-
Kim, H.; Lim, H.; Jeong, J.; Jo, H.; Lee, J. Task-aware virtual machine scheduling for I/O Performance. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Washington, DC, March 11-13, 2009; pp. 101–110.
-
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 101-110
-
-
Kim, H.1
Lim, H.2
Jeong, J.3
Jo, H.4
Lee, J.5
-
48
-
-
51849119022
-
-
Technical Report HPL-2007-25, HP Laboratories Palo. Alto, Feb. 2007
-
Cherkasova, L.; Gupta, D.; Vahdat, A. When virtual is harder than real: Resource allocation challenges in virtual machine based IT environments. Technical Report HPL-2007-25, HP Laboratories Palo. Alto, Feb. 2007.
-
When Virtual is Harder than Real: Resource Allocation Challenges in Virtual Machine Based IT Environments
-
-
Cherkasova, L.1
Gupta, D.2
Vahdat, A.3
-
49
-
-
84861164227
-
A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack
-
Bhopal, India, 1–2 March 2012
-
Karnwal, T.; Sivakumar, T.; Aghila, G. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack. In Proceedings of the 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 1–2 March 2012; pp. 1– 5.
-
Proceedings of the 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS)
, pp. 1-5
-
-
Karnwal, T.1
Sivakumar, T.2
Aghila, G.3
-
50
-
-
78649883241
-
Retrospective detection of malware attacks by cloud computing
-
Huangshan, China, 10–12 October 2010
-
Liu, S.-T.; Chen, Y.-M. Retrospective detection of malware attacks by cloud computing. In Proceedings of the 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Huangshan, China, 10–12 October 2010; pp. 510–517.
-
Proceedings of the 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (Cyberc)
, pp. 510-517
-
-
Liu, S.-T.1
Chen, Y.-M.2
-
51
-
-
85077723796
-
CloudAV: N-version antivirus in the network cloud
-
Berkeley, CA, USA
-
Oberheide, J.; Cooke, E.; Jahanian, F. CloudAV: N-version antivirus in the network cloud. In Proceedings of the 17th Conference on Security Symposium (SS ’08); USENIX Association: Berkeley, CA, USA, 2008; pp. 91–106.
-
(2008)
Proceedings of the 17Th Conference on Security Symposium (SS ’08); USENIX Association
, pp. 91-106
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
52
-
-
71549142277
-
A framework for behavior-based malware analysis in the cloud
-
Kolkata, India, 14–18 December 2009; Springer-Verlag: Berlin, Heidelberg
-
Martignoni, L.; Paleari, R.; Bruschi, D. A framework for behavior-based malware analysis in the cloud. In Proceedings of the 5th International Conference on Information Systems Security (ICISS ’09), Kolkata, India, 14–18 December 2009; Springer-Verlag: Berlin, Heidelberg, 2009; pp. 178–192.
-
(2009)
Proceedings of the 5Th International Conference on Information Systems Security (ICISS ’09)
, pp. 178-192
-
-
Martignoni, L.1
Paleari, R.2
Bruschi, D.3
-
53
-
-
84858158707
-
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
-
Khorshed, M.T.; Ali, A.B.M.S.; Wasimi, S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 2012, 28, 833–851.
-
(2012)
Future Gener. Comput. Syst.
, vol.28
, pp. 833-851
-
-
Khorshed, M.T.1
Ali, A.B.M.S.2
Wasimi, S.A.3
-
54
-
-
78650158728
-
Determinating timing channels in compute clouds
-
ACM: New York, NY, USA
-
Aviram, A.; Hu, S.; Ford, B.; Gummadi, R. Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW ’10); ACM: New York, NY, USA, 2010; pp. 103–108.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW ’10)
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
55
-
-
84856079448
-
Energy consumption side-channel attack at virtual machines in a cloud
-
Sydney, NSW, Australia, 12–14 December 2011
-
Hlavacs, H.; Treutner, T.; Gelas, J.; Lefevre, L.; Orgerie, A. Energy consumption side-channel attack at virtual machines in a cloud. In Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), Sydney, NSW, Australia, 12–14 December 2011; pp. 605–612.
-
Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC)
, pp. 605-612
-
-
Hlavacs, H.1
Treutner, T.2
Gelas, J.3
Lefevre, L.4
Orgerie, A.5
-
56
-
-
80052161321
-
Lucy in the sky without diamonds: Stealing confidential data in the cloud
-
Hong Kong, China, 27–30 June 2011; IEEE Computer Society: Washington, DC, USA, 2011
-
Rocha, F.; Correia, M. Lucy in the sky without diamonds: Stealing confidential data in the cloud. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSNW ’11), Hong Kong, China, 27–30 June 2011; IEEE Computer Society: Washington, DC, USA, 2011; pp. 129–134.
-
Proceedings of the 2011 IEEE/IFIP 41St International Conference on Dependable Systems and Networks Workshops (DSNW ’11)
, pp. 129-134
-
-
Rocha, F.1
Correia, M.2
-
57
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA
-
Ristenpart, T.; Tromer, E.; Shacham, H.; Savage, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS ’09), Chicago, IL, USA, 9–13 November 2009; ACM: New York, NY, USA, 2009; pp. 199–212.
-
(2009)
Proceedings of the 16Th ACM Conference on Computer and Communications Security (CCS ’09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
58
-
-
85063835809
-
-
Top Threats to Cloud Computing V1.0; Cloud Security Alliance: March 2010
-
Top Threats to Cloud Computing V1.0; Cloud Security Alliance: March 2010.
-
-
-
-
59
-
-
78650039008
-
Cloud computing roundtable
-
Grosse, E.; Howie, J.; Ransome, J.; Reavis, J.; Schmidt, S. Cloud computing roundtable. IEEE Secur. Priv. 2010, 8, 17–23.
-
(2010)
IEEE Secur. Priv.
, vol.8
, pp. 17-23
-
-
Grosse, E.1
Howie, J.2
Ransome, J.3
Reavis, J.4
Schmidt, S.5
-
60
-
-
84866403148
-
Traceback attacks in cloud—Pebbletrace botnet
-
Macau, China, 18–21 June 2012
-
Lin, W.; Lee, D. Traceback attacks in cloud—Pebbletrace botnet. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Macau, China, 18–21 June 2012; pp. 417–426.
-
Proceedings of the 2012 32Nd International Conference on Distributed Computing Systems Workshops (ICDCSW)
, pp. 417-426
-
-
Lin, W.1
Lee, D.2
-
61
-
-
84869744639
-
A self-protection mechanism against stepping-stone attacks for IaaS clouds
-
Kourai, K.; Azumi, T.; Chiba, S. A self-protection mechanism against stepping-stone attacks for IaaS clouds. In Proceedings of the UIC/ATC, 2012; pp. 539–546.
-
(2012)
In Proceedings of the UIC/ATC
, pp. 539-546
-
-
Kourai, K.1
Azumi, T.2
Chiba, S.3
-
62
-
-
84863177084
-
Thwarting audio steganography attacks in cloud storage systems
-
Hong Kong, China, 12–14 December 2011
-
Liu, B.; Xu, E.; Wang, J.; Wei, Z.; Xu, L.; Zhao, B.; Su, J. Thwarting audio steganography attacks in cloud storage systems. In Proceedings of the 2011 International Conference on Cloud and Service Computing (CSC), Hong Kong, China, 12–14 December 2011; pp. 259–265.
-
Proceedings of the 2011 International Conference on Cloud and Service Computing (CSC)
, pp. 259-265
-
-
Liu, B.1
Xu, E.2
Wang, J.3
Wei, Z.4
Xu, L.5
Zhao, B.6
Su, J.7
-
63
-
-
84855655983
-
Szczypiorski, K. Is cloud computing steganography-proof?
-
Shanghai, China, 4–6 November 2011; IEEE Computer Society: Washington, DC, USA
-
Mazurczyk, W.; Szczypiorski, K. Is cloud computing steganography-proof? In Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security (MINES ’11), Shanghai, China, 4–6 November 2011; IEEE Computer Society: Washington, DC, USA, 2011; pp. 441–442.
-
(2011)
Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security (MINES ’11)
, pp. 441-442
-
-
Mazurczyk, W.1
-
64
-
-
84871986666
-
Defending against web application vulnerabilities
-
Antunes, N.; Vieira, M. Defending against web application vulnerabilities. Computer 2012, 45, 66–72.
-
(2012)
Computer
, vol.45
, pp. 66-72
-
-
Antunes, N.1
Vieira, M.2
-
65
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
Oakland, CA, USA, 22–25 May 2011; IEEE Computer Society: Washington, DC, USA
-
Parno, B.; Lorch, J.R.; Douceur, J.R.; Mickens, J.; McCune, J.M. Memoir: Practical state continuity for protected modules. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP ’11), Oakland, CA, USA, 22–25 May 2011; IEEE Computer Society: Washington, DC, USA, 2011; pp. 379–394.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP ’11)
, pp. 379-394
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
66
-
-
85063839265
-
-
accessed on: Feb 1, 2014
-
Zeus Bot Found Using Amazon’s EC2 as C&C Server. Available online: http://www.theregister.co.uk/2009/12/09/amazon ec2 bot control channel/(accessed on: Feb 1, 2014).
-
Zeus Bot Found Using Amazon’s EC2 as C&C Server
-
-
-
67
-
-
85063846905
-
-
Google Cloud Platform Used for Botnet Control. Available online: http://www.infosecurity-magazine.com/view/5115/google-cloud-platform-used-for-botnet-control/(accessed on: Feb 1, 2014).
-
-
-
-
68
-
-
85063848090
-
-
(accessed on: Feb 1, 2014)
-
Raytheon UK Targeted in Cloud-Based Attack. Available online: http://www.zdnet.co.uk/news/security-threats/2011/10/12/raytheon-uk-targeted-in-cloud-based-attack-40094173/(accessed on: Feb 1, 2014).
-
-
-
-
69
-
-
56549109177
-
Tamper-resistant, application-aware blocking of malicious network connections
-
Cambridge, MA, USA, 15–17 September 2008
-
Srivastava, A.; Giffin, J. Tamper-resistant, application-aware blocking of malicious network connections. In Proceedings of the 11th International Symposium, RAID 2008, Cambridge, MA, USA, 15–17 September 2008; pp. 39–58.
-
Proceedings of the 11Th International Symposium, RAID 2008
, pp. 39-58
-
-
Srivastava, A.1
Giffin, J.2
-
70
-
-
84856085485
-
Intrusion detection techniques for infrastructure as a service cloud
-
Sydney, Australia, 12–14 Dec. 2011
-
Tupakula, U.; Varadharajan, V.; Akku, N. Intrusion detection techniques for infrastructure as a service cloud. In Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), Sydney, Australia, 12–14 Dec. 2011; pp. 744–751.
-
Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC)
, pp. 744-751
-
-
Tupakula, U.1
Varadharajan, V.2
Akku, N.3
-
71
-
-
84858773328
-
Architectural support for hypervisor-secure virtualization
-
Szefer, J.; Lee, R.B. Architectural support for hypervisor-secure virtualization. SIGARCH Comput. Arch. News 2012, 40, 437–450.
-
(2012)
SIGARCH Comput. Arch. News
, vol.40
, pp. 437-450
-
-
Szefer, J.1
Lee, R.B.2
-
72
-
-
78649815408
-
A cooperative intrusion detection system framework for cloud computing networks
-
San Diego, CA, USA, 13–16 September 2010
-
Lo, C.-C.; Huang, C.-C.; Ku, J. A cooperative intrusion detection system framework for cloud computing networks. In Proceedings of the 2010 39th International Conference on Parallel Processing Workshops (ICPPW), San Diego, CA, USA, 13–16 September 2010; pp. 280–284.
-
Proceedings of the 2010 39Th International Conference on Parallel Processing Workshops (ICPPW)
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
73
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
Vieira, K.; Schulter, A.; Westphall, C.B.; Westphall, C.M. Intrusion detection for grid and cloud computing. IT Prof. 2010, 12, 38–43.
-
(2010)
IT Prof
, vol.12
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
74
-
-
77954381644
-
Application of cloud model in intrusion detection
-
Wuhan, China, 22–23 May 2010
-
Wang, D.; Zhou, Z. Application of cloud model in intrusion detection. In Proceedings of the 2010 2nd International Conference on e-Business and Information System Security (EBISS), Wuhan, China, 22–23 May 2010; pp. 1–4.
-
Proceedings of the 2010 2Nd International Conference on E-Business and Information System Security (EBISS)
, pp. 1-4
-
-
Wang, D.1
Zhou, Z.2
-
75
-
-
84858723509
-
Comparison of network intrusion detection systems in cloud computing environment
-
Coimbatore, India, 10–12 January 2012
-
Van athi, R.; Gunasekaran, S. Comparison of network intrusion detection systems in cloud computing environment. In Proceedings of the 2012 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 10–12 January 2012; pp. 1–6.
-
Proceedings of the 2012 International Conference on Computer Communication and Informatics (ICCCI)
, pp. 1-6
-
-
van athi, R.1
Gunasekaran, S.2
-
76
-
-
77950559014
-
Intrusion detection in the cloud
-
Chengdu, China, 12–14 December 2009
-
Roschke, S.; Cheng, F.; Meinel, C. Intrusion detection in the cloud. In Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009 (DASC ’09), Chengdu, China, 12–14 December 2009; pp. 729–734.
-
Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009 (DASC ’09)
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
77
-
-
84857574309
-
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
-
Orlando, FL, USA, 15–18 October 2011
-
Zargar, S.T.; Takabi, H.; Joshi, J.B.D. DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In Proceedings of the 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, USA, 15–18 October 2011; pp. 332–341.
-
Proceedings of the 2011 7Th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom)
, pp. 332-341
-
-
Zargar, S.T.1
Takabi, H.2
Joshi, J.B.D.3
-
78
-
-
77949590054
-
Distributed intrusion detection in clouds using mobile agents
-
(ADVCOMP ’09), Sliema, Malta, 11–16 October 2009
-
Dastjerdi, A.V.; Bakar, K.A.; Tabatabaei, S.G.H. Distributed intrusion detection in clouds using mobile agents. In Proceedings of the Third International Conference on Advanced Engineering Computing and Applications in Sciences, 2009 (ADVCOMP ’09), Sliema, Malta, 11–16 October 2009; pp. 175–180.
-
(2009)
Proceedings of the Third International Conference on Advanced Engineering Computing and Applications in Sciences
, pp. 175-180
-
-
Dastjerdi, A.V.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
79
-
-
51349119727
-
P2P distributed intrusion detections by using mobile agents
-
Portland, OR, USA, 14–16 May 2008
-
Ye, D.; Bai, Q.; Zhang, M.; Ye, Z. P2P distributed intrusion detections by using mobile agents. In Proceedings of the Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008 (ICIS 08), Portland, OR, USA, 14–16 May 2008; pp. 259–265.
-
Proceedings of the Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008 (ICIS 08)
, pp. 259-265
-
-
Ye, D.1
Bai, Q.2
Zhang, M.3
Ye, Z.4
-
80
-
-
33749404535
-
DIDMA: A distributed intrusion detection system using mobile agents
-
23–25 May 2005
-
Kannadiga, P.; Zulkernine, M. DIDMA: A distributed intrusion detection system using mobile agents. In Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, and First ACIS International Workshop on Self-Assembling Wireless Networks, 23–25 May 2005; pp. 238–245.
-
Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, and First ACIS International Workshop on Self-Assembling Wireless Networks
, pp. 238-245
-
-
Kannadiga, P.1
Zulkernine, M.2
-
82
-
-
84857161828
-
An autonomous agent based incident detection system for cloud environments
-
Athens, Greece, 29 November–1 December 2011
-
Doelitzscher, F.; Reich, C.; Knahl, M.; Clarke, N. An autonomous agent based incident detection system for cloud environments. In Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, 29 November–1 December 2011; pp. 197–204.
-
Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (Cloudcom)
, pp. 197-204
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
83
-
-
84871134570
-
Experimental assessment of routing for grid and cloud
-
St. Maarten, The Netherlands Antilles, January 23-28, 2011
-
Balen, D.; Westphall, C.; Westphall, C. Experimental assessment of routing for grid and cloud. In Proceedings of the Tenth International Conference on Networks (ICN 2011); St. Maarten, The Netherlands Antilles, January 23-28, 2011, pp. 341–346.
-
Proceedings of the Tenth International Conference on Networks (ICN 2011)
, pp. 341-346
-
-
Balen, D.1
Westphall, C.2
Westphall, C.3
-
84
-
-
84856547262
-
A cloud architecture using smart nodes
-
Jeju Island, Korea, 12–15 December 2011
-
Sodhi, B.; Prabhakar, T.V. A cloud architecture using smart nodes. In Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC), Jeju Island, Korea, 12–15 December 2011; pp. 116–123.
-
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC)
, pp. 116-123
-
-
Sodhi, B.1
Prabhakar, T.V.2
-
85
-
-
77957945966
-
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
-
Miami, FL, USA, 5–10 July 2010
-
Yazir, Y.O.; Matthews, C.; Farahbod, R.; Neville, S.; Guitouni, A.; Ganti, S.; Coady, Y. Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis. In Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), Miami, FL, USA, 5–10 July 2010; pp. 91–98.
-
Proceedings of the 2010 IEEE 3Rd International Conference on Cloud Computing (CLOUD)
, pp. 91-98
-
-
Yazir, Y.O.1
Matthews, C.2
Farahbod, R.3
Neville, S.4
Guitouni, A.5
Ganti, S.6
Coady, Y.7
-
87
-
-
84870813505
-
Proposal of overlay cloud computing system by virtual autonomous network configuration
-
Barcelona, Spain, 26–28 October 2011
-
Uchida, N.; Takahata, K.; Shibata, Y. Proposal of overlay cloud computing system by virtual autonomous network configuration. In Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Barcelona, Spain, 26–28 October 2011; pp. 307–310.
-
Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
, pp. 307-310
-
-
Uchida, N.1
Takahata, K.2
Shibata, Y.3
-
89
-
-
84891065445
-
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth
-
Leandro, M.A.P.; Nascimento, T.J.; dos Santos, D.R.; Westphall, C.M.; Westphall, C.B. Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth. In Proceedings of the Eleventh International Conference on Networks, 2012; pp. 88–93.
-
(2012)
Proceedings of the Eleventh International Conference on Networks
, pp. 88-93
-
-
Leandro, M.A.P.1
Nascimento, T.J.2
Dos Santos, D.R.3
Westphall, C.M.4
Westphall, C.B.5
-
90
-
-
84859045783
-
Enhancing privacy and dynamic federation in IdM for consumer cloud computing
-
Sanchez, R.; Almenares, F.; Arias, P.; Diaz-Sanchez, D.; Marin, A. Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans. Consum. Electron. 2012, 58, 95–103.
-
(2012)
IEEE Trans. Consum. Electron.
, vol.58
, pp. 95-103
-
-
Sanchez, R.1
Almenares, F.2
Arias, P.3
Diaz-Sanchez, D.4
Marin, A.5
-
91
-
-
85063842989
-
-
accessed on 13 January 2013
-
Revealed: Why Android Beats iPhone for Organized Crime. Available online: http://blogs.computerworld.com/16392/security_android_beats_iphone_for_crime(accessed on 13 January 2013).
-
Revealed: Why Android Beats Iphone for Organized Crime
-
-
-
92
-
-
85063840186
-
-
In Shibboleth
-
Oxford English Dictionary; In Shibboleth; 1989.
-
(1989)
-
-
-
93
-
-
78149297521
-
Mutual protection in a cloud computing environment
-
Melbourne, VIC, Australia, 1–3 September 2010
-
Albeshri, A.; Caelli, W. Mutual protection in a cloud computing environment. In Proceedings of the 2010 12th IEEE International Conference on the High Performance Computing and Communications (HPCC), Melbourne, VIC, Australia, 1–3 September 2010; pp. 641–646.
-
Proceedings of the 2010 12Th IEEE International Conference on the High Performance Computing and Communications (HPCC)
, pp. 641-646
-
-
Albeshri, A.1
Caelli, W.2
-
94
-
-
78650535610
-
An entity-centric approach for privacy and identity management in cloud computing
-
New Delhi, India, 31 October–3 November 2010
-
Angin, P.; Bhargava, B.; Ranchal, R.; Singh, N.; Linderman, M.; Othmane, L.B.; Lilien, L. An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems, New Delhi, India, 31 October–3 November 2010; pp. 177–183.
-
Proceedings of the 2010 29Th IEEE Symposium on Reliable Distributed Systems
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Othmane, L.B.6
Lilien, L.7
-
95
-
-
80455140339
-
An identity-centric internet: Identity in the cloud, identity as a service and other delights
-
Vienna, Austria, 22–26 August 2011
-
Ates, M.; Ravet, S.; Ahmat, A.M.; Fayolle, J. An identity-centric internet: Identity in the cloud, identity as a service and other delights. In Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 22–26 August 2011; pp. 555–560.
-
Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security (ARES)
, pp. 555-560
-
-
Ates, M.1
Ravet, S.2
Ahmat, A.M.3
Fayolle, J.4
-
96
-
-
85063858134
-
-
accessed on 13 January 2013
-
Kaspersky Security Bulletin. Statistics 2011. Available online: http://www.securelist.com/en/analysis/204792216/Kaspersky_Security_Bulletin_Statistics_2011 (accessed on 13 January 2013).
-
(2011)
-
-
-
97
-
-
84866348681
-
Security issues and solutions in cloud computing
-
Macau, China, 18–21 June 2012
-
You, P.; Peng, Y.; Liu, W.; Xue, S. Security issues and solutions in cloud computing. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Macau, China, 18–21 June 2012; pp. 573–577.
-
Proceedings of the 2012 32Nd International Conference on Distributed Computing Systems Workshops (ICDCSW)
, pp. 573-577
-
-
You, P.1
Peng, Y.2
Liu, W.3
Xue, S.4
-
98
-
-
84866350168
-
-
Cornell University Library, USA, Accessed on: Feb 1, 2014
-
Bhadauria, R.; Chaki, R.; Chaki, N.; Sanyal, S. A Survey on Security Issues in Cloud Computing; Cornell University Library, USA, 2013. Available at: http://arxiv.org/abs/1109.5388. (Accessed on: Feb 1, 2014).
-
(2013)
A Survey on Security Issues in Cloud Computing
-
-
Bhadauria, R.1
Chaki, R.2
Chaki, N.3
Sanyal, S.4
-
100
-
-
84880192224
-
Security and privacy in cloud computing: A survey
-
Beijing, China, 1–3 November 2010
-
Zhou, M.; Zhang, R.; Xie, W.; Qian, W.; Zhou, A. Security and privacy in cloud computing: A survey. In Proceedings of the 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), Beijing, China, 1–3 November 2010; pp. 105–112.
-
Proceedings of the 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG)
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian, W.4
Zhou, A.5
-
101
-
-
84886682232
-
Security Concerns in Cloud Computing
-
April 15-17, 2013, Las Vegas, USA
-
Khalil, I.; Khreishah, A.; Bouktif, A.; Ahmad, A. Security Concerns in Cloud Computing. In Proceedings of the 10th International Conference on Information Technology: New Generations, April 15-17, 2013, Las Vegas, USA; pp. 412-416.
-
Proceedings of the 10Th International Conference on Information Technology: New Generations
, pp. 412-416
-
-
Khalil, I.1
Khreishah, A.2
Bouktif, A.3
Ahmad, A.4
-
102
-
-
84862907810
-
Security challenges for the public cloud
-
Ren, K.; Wang, C.; Wang, Q. Security challenges for the public cloud. IEEE Internet Comput. 2012, 16, 69–73.
-
(2012)
IEEE Internet Comput
, vol.16
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
103
-
-
53549086979
-
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping
-
January
-
R. K. Panta, S. Bagchi and I. Khalil, “Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping,” Ad Hoc Networks (an Elsevier Journal), Volume 7, Issue 1, January 2009, pp. 42-62.
-
(2009)
Ad Hoc Networks (An Elsevier Journal)
, vol.7
, Issue.1
, pp. 42-62
-
-
Panta, R.K.1
Bagchi, S.2
Khalil, I.3
-
104
-
-
79551638042
-
MCC: Mitigating colluding collision attacks in wireless sensor networks
-
December 6 – 10, 2010, Miami, Florida, USA
-
I. Khalil, “MCC: Mitigating colluding collision attacks in wireless sensor networks,” Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM’10), December 6 – 10, 2010, Miami, Florida, USA, pp. 1-5..
-
Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM’10)
, pp. 1-5
-
-
Khalil, I.1
-
105
-
-
85063822302
-
-
(Accessed on: Feb 1, 2014)
-
http://blog.scalar.ca/Blog/bid/87248/Mitigating-common-cloud-computing-risks. (Accessed on: Feb 1, 2014).
-
-
-
|