


default search action
4th CCSW 2012: Raleigh, NC, USA
- Ting Yu, Srdjan Capkun, Seny Kamara:
Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1
Virtualization
- Adam Bates
, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
Detecting co-residency with active traffic analysis techniques. 1-12 - Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser:
Fast dynamic extracted honeypots in cloud computing. 13-18 - Keaton Mowery, Sriram Keelveedhi, Hovav Shacham:
Are AES x86 cache timing attacks still feasible? 19-24 - Abhinav Srivastava, Vinod Ganapathy:
Towards a richer model of cloud app markets. 25-30
Cloud-assisted security
- Beom Heyn Kim
, Wei Huang, David Lie:
Unity: secure and durable personal cloud storage. 31-36 - Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis
, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. 37-42 - John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek:
Babel: a secure computer is a polyglot. 43-54 - Howard E. Shrobe:
What if we got a do-over? 55-56 - Kristin E. Lauter:
Practical applications of homomorphic encryption. 57-58
Cryptographic protocols
- Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shivaramakrishnan Narayan:
LoSt: location based storage. 59-70 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
:
Efficient query integrity for outsourced dynamic databases. 71-82 - Christopher W. Fletcher, Marten van Dijk
, Srinivas Devadas:
Towards an interpreter for efficient encrypted computation. 83-94 - Burton Stephen Kaliski Jr.:
Revisiting DNS and WHOIS in the cloud era. 95-96
Increasing trust
- Ioannis Papagiannis, Peter R. Pietzuch
:
CloudFilter: practical control of sensitive data propagation to the cloud. 97-102 - Jesus Luna Garcia, Robert Langenberg, Neeraj Suri
:
Benchmarking cloud security level agreements using quantitative policy trees. 103-112 - Apurva Kumar:
Managing trust and secrecy in identity management clouds. 113-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.