Service specific anomaly detection for network intrusion detection
Proceedings of the 2002 ACM symposium on Applied computing
MobiDesk: mobile virtual desktop computing
Proceedings of the 10th annual international conference on Mobile computing and networking
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
Towards concurrency refactoring for x10
Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming
The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Toward cloud-agnostic middlewares
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Towards best practices in designing for the cloud
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Cloud computing beyond objects: seeding the cloud
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Cloud technologies for bioinformatics applications
Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers
Managing security of virtual machine images in a cloud environment
Proceedings of the 2009 ACM workshop on Cloud computing security
Cloud security is not (just) virtualization security: a short paper
Proceedings of the 2009 ACM workshop on Cloud computing security
Towards secure dataflow processing in open distributed systems
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Provenance as first class cloud data
ACM SIGOPS Operating Systems Review
Communications of the ACM
A business driven cloud optimization architecture
Proceedings of the 2010 ACM Symposium on Applied Computing
Multiscale not multicore: efficient heterogeneous cloud computing
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
Hi-index | 0.00 |
Next-generation networking is moving out of the LAN and adopting cloud computing increasingly. Virtual machines and clouds mask the hardware infrastructure from the LAN administrator as well. Cloud architecture will be ubiquitous and in the future clouds will drop the unnecessary distinction of platform as a service, leaving a slightly larger infrastructure as a service (IaaS) level and an application level (SaaS). Provisioning costs will get lower but the costs of data breaches will continue to climb. This paper explores the security ramifications of cloud-adoption by reviewing the literature and presenting a collection of best-practices for security in the cloud.