Software execution protection in the cloud
Proceedings of the 1st European Workshop on Dependable Cloud Computing
An Approach to Data Confidentiality Protection in Cloud Environments
International Journal of Web Services Research
The TClouds platform: concept, architecture and instantiations
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
A platform for secure monitoring and sharing of generic health data in the Cloud
Future Generation Computer Systems
Hi-index | 4.10 |
The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications and data are no longer onsite, fundamentally changing the definition of a malicious insider.