default search action
3rd CCSW 2011: Chicago, Illinois, USA
- Christian Cachin, Thomas Ristenpart:
Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1004-8
Keynote address
- John Manferdelli:
Clouds and their discontents. 1-2
Resource management
- Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
All your clouds are belong to us: security analysis of cloud management interfaces. 3-14 - Andrew Brown, Jeffrey S. Chase:
Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications. 15-20 - Vyas Sekar, Petros Maniatis:
Verifiable resource accounting for cloud computing services. 21-26
Keynote address
- Charlie Kaufman:
What's different about security in a public cloud? 27-28
Virtualization
- Yunjing Xu, Michael D. Bailey, Farnam Jahanian, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting:
An exploration of L2 cache covert channels in virtualized environments. 29-40 - Bhanu Chandra Vattikonda, Sambit Das, Hovav Shacham:
Eliminating fine grained timers in Xen. 41-46 - Sören Bleikertz, Thomas Groß, Sebastian Mödersheim:
Automated verification of virtualized infrastructures. 47-58
Keynote address
- Timothy G. Brown:
Cloud security: myth or reality? 59-60
Verification and legal matters
- Joseph Idziorek, Mark Tannian, Douglas Jacobson:
Detecting fraudulent use of cloud resources. 61-72 - Karyn Benson, Rafael Dowsley, Hovav Shacham:
Do you know where your cloud files are? 73-82 - David G. Gordon, Travis D. Breaux:
Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape. 83-94
Cryptographic protocols
- Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Oblivious RAM simulation with efficient worst-case access overhead. 95-100 - Ghassan Karame, Srdjan Capkun, Ueli Maurer:
Privacy-preserving outsourcing of brute-force key searches. 101-112 - Michael Naehrig, Kristin E. Lauter, Vinod Vaikuntanathan:
Can homomorphic encryption be practical? 113-124 - George Danezis, Benjamin Livshits:
Towards ensuring client-side computational integrity. 125-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.