Best practices in network security
Network Computing
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
Why do internet services fail, and what can be done about it?
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
The ghost in the browser analysis of web-based malware
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
I/O for Virtual Machine Monitors: Security and Performance Issues
IEEE Security and Privacy
IEEE Security and Privacy
A break in the clouds: towards a cloud definition
ACM SIGCOMM Computer Communication Review
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Cybercrime 2.0: when the cloud turns dark
Communications of the ACM - A Direct Path to Dependable Software
Taking account of privacy when designing cloud computing services
CLOUD '09 Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
Analysis of Signature Wrapping Attacks and Countermeasures
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Vulnerable Cloud: SOAP Message Security Validation Revisited
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
SCC '09 Proceedings of the 2009 IEEE International Conference on Services Computing
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
Managing security of virtual machine images in a cloud environment
Proceedings of the 2009 ACM workshop on Cloud computing security
Communications of the ACM
The Information Assurance Practices of Cloud Computing Vendors
IT Professional
Towards incident handling in the cloud: challenges and approaches
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
On the impossibility of cryptography alone for privacy-preserving cloud computing
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
All your clouds are belong to us: security analysis of cloud management interfaces
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
SP 800-124. Guidelines on Cell Phone and PDA Security
SP 800-124. Guidelines on Cell Phone and PDA Security
SP 800-125. Guide to Security for Full Virtualization Technologies
SP 800-125. Guide to Security for Full Virtualization Technologies
SP 800-137. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
SP 800-18 Rev. 1. Guide for Developing Security Plans for Federal Information Systems
SP 800-18 Rev. 1. Guide for Developing Security Plans for Federal Information Systems
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-21 Second edition. Guideline for Implementing Cryptography in the Federal Government
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-35. Guide to Information Technology Security Services
SP 800-35. Guide to Information Technology Security Services
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Proceedings of the 1st International Workshop on Cloud Intelligence
Supporting security and consistency for cloud database
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Proposing an Intelligent Cloud-Based Electronic Health Record System
International Journal of Business Data Communications and Networking
Modeling and performance analysis of large scale IaaS Clouds
Future Generation Computer Systems
Hi-index | 0.00 |
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress. This publication provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment.