Privacy: What Developers and IT Professionals Should Know
Privacy: What Developers and IT Professionals Should Know
Eliciting security requirements with misuse cases
Requirements Engineering
Addressing privacy requirements in system design: the PriS method
Requirements Engineering
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Managing security of virtual machine images in a cloud environment
Proceedings of the 2009 ACM workshop on Cloud computing security
Methods for Designing Privacy Aware Information Systems: A Review
PCI '09 Proceedings of the 2009 13th Panhellenic Conference on Informatics
Evaluating existing security and privacy requirements for legal compliance
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
Towards incident handling in the cloud: challenges and approaches
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
The Characteristics of Cloud Computing
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
Security and Privacy in Cloud Computing: A Survey
SKG '10 Proceedings of the 2010 Sixth International Conference on Semantics, Knowledge and Grids
Privacy, Security and Trust Issues Arising from Cloud Computing
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing
ICDCSW '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
Decision Support Tools for Cloud Migration in the Enterprise
CLOUD '11 Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
Model Based Process to Support Security and Privacy Requirements Engineering
International Journal of Secure Software Engineering
Hi-index | 0.00 |
One of the major research challenges for the successful deployment of cloud services is a clear understanding of security and privacy issues on a cloud environment, since cloud architecture has dissimilarities compared to traditional distributed systems. Such differences might introduce new threats and require a different treatment of security and privacy issues. It is therefore important to understand security and privacy within the context of cloud computing and identify relevant security and privacy properties and threats that will support techniques and methodologies aimed to analyze and design secure cloud based systems.