


default search action
Secure Cloud Computing 2014
- Sushil Jajodia
, Krishna Kant, Pierangela Samarati
, Anoop Singhal, Vipin Swarup, Cliff Wang:
Secure Cloud Computing. Springer 2014, ISBN 978-1-4614-9277-1 - Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani:
Cryptographic Key Management Issues and Challenges in Cloud Services. 1-30 - Yao Chen, Radu Sion:
Costs and Security in Clouds. 31-56 - Jakub Szefer, Ruby B. Lee:
Hardware-Enhanced Security for Cloud Computing. 57-76 - Maurício O. Tsugawa, Andréa M. Matsunaga, José A. B. Fortes:
Cloud Computing Security: What Changes with Software-Defined Networking? 77-93 - Zhan Wang, Kun Sun, Sushil Jajodia
, Jiwu Jing:
Proof of Isolation for Cloud Storage. 95-121 - Sabrina De Capitani di Vimercati, Sara Foresti
, Pierangela Samarati
:
Selective and Fine-Grained Access to Data in the Cloud. 123-148 - Meixing Le, Krishna Kant, Sushil Jajodia
:
Enabling Collaborative Data Authorization Between Enterprise Clouds. 149-169 - Kenneth P. Smith, M. David Allen, Hongying Lan, Andrew Sillers:
Making Query Execution Over Encrypted Data Practical. 171-188 - Wenhai Sun
, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. 189-212 - Kerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal:
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. 213-238 - Massimiliano Albanese
, Sushil Jajodia
, Ravi Jhawar, Vincenzo Piuri:
Securing Mission-Centric Operations in the Cloud. 239-259 - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis:
Computational Decoys for Cloud Security. 261-270 - Wenchao Zhou:
Towards a Data-Centric Approach to Attribution in the Cloud. 271-301 - Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian:
Software Cruising: A New Technology for Building Concurrent Software Monitor. 303-324 - Hasan Çam:
Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems. 325-343

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.