Cloud Security Baselines
暂无分享,去创建一个
[1] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[2] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[3] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[4] Christoph Reich,et al. Supporting Cloud Accountability by Collecting Evidence Using Audit Agents , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[5] Siani Pearson,et al. Toward Accountability in the Cloud , 2011, IEEE Internet Computing.
[6] Bu-Sung Lee,et al. TrustCloud: A Framework for Accountability and Trust in Cloud Computing , 2011, 2011 IEEE World Congress on Services.
[7] Elisa Bertino,et al. Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.
[8] J. Reuben,et al. A Survey on Virtual Machine Security , 2007 .
[9] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[10] Kyung-Suk Lhee,et al. Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..
[11] Dustin Owens,et al. Securing Elasticity in the Cloud , 2010, ACM Queue.
[12] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[13] Asim Kadav,et al. Understanding modern device drivers , 2012, ASPLOS XVII.
[14] Hassan Salmani,et al. Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection , 2013 .
[15] Paul T. Jaeger,et al. Cloud Computing and Information Policy: Computing in a Policy Cloud? , 2008 .
[16] Haibo Chen,et al. PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.
[17] Yier Jin,et al. Hardware-software collaboration for secure coexistence with kernel extensions , 2014, SIAP.
[18] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[19] Elisa Bertino,et al. A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[20] Bruno Crispo,et al. Securing Data Provenance in the Cloud , 2011, iNetSeC.
[21] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[22] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Armando Eduardo De Giusti,et al. Cloud Computing. Concepts, Technology & Architecture , 2013 .
[24] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[25] A. Muthukumaravel,et al. Ensuring Distributed Accountability for Data Sharing in Cloud , 2014 .
[26] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[27] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[28] Pei Li,et al. Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding , 2010, IEEE Journal on Selected Areas in Communications.
[29] Jaideep Vaidya,et al. Privacy-preserving indexing of documents on the network , 2003, The VLDB Journal.
[30] Dan Lin,et al. Preventing Information Leakage from Indexing in the Cloud , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[31] Jingwei Li,et al. STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds , 2014, SecureComm.
[32] Dan Lin,et al. Data protection models for service provisioning in the cloud , 2010, SACMAT '10.
[33] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[34] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[35] Abhinav Srivastava,et al. Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.
[36] Reza Curtmola,et al. Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.
[37] Elisa Bertino,et al. Towards privacy preserving access control in the cloud , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[38] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[39] Levent Ertaul,et al. Security Challenges in Cloud Computing , 2010, Security and Management.