Towards a data-centric view of cloud security
CloudDB '10 Proceedings of the second international workshop on Cloud data management
Intrusion detection system in cloud computing environment
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A survey of risks, threats and vulnerabilities in cloud computing
Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications
Toward trustworthy clouds' internet scale critical infrastructure
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Who can you trust in the cloud?: a review of security issues within cloud computing
Proceedings of the 2011 Information Security Curriculum Development Conference
A way of key management in cloud storage based on trusted computing
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
SECaaS: security as a service for cloud-based applications
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
Wukong: A cloud-oriented file service for mobile Internet devices
Journal of Parallel and Distributed Computing
Information Security Tech. Report
Considerations for mobile authentication in the Cloud
Information Security Tech. Report
Delusional boot: securing hypervisors without massive re-engineering
Proceedings of the 7th ACM european conference on Computer Systems
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
On cloud computing security issues
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS
Proceedings of the 1st International Workshop on Cloud Intelligence
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
Specification and quantitative analysis of probabilistic cloud deployment patterns
HVC'11 Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing
A survey on security issues and solutions at different layers of Cloud computing
The Journal of Supercomputing
Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
International Journal of Cloud Applications and Computing
Towards a Generic Security Framework for Cloud Data Management Environments
International Journal of Distributed Systems and Technologies
Designing a Secure Cloud Architecture: The SeCA Model
International Journal of Information Security and Privacy
The Effect of Firewall Testing Types on Cloud Security Policies
International Journal of Strategic Information Technology and Applications
log2cloud: log-based prediction of cost-performance trade-offs for cloud deployments
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organizational means. This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.