default search action
6th CCSW 2014: Scottsdale, Arizona, USA
- Gail-Joon Ahn, Alina Oprea, Reihaneh Safavi-Naini:
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3239-2
Invited Talks
- Joanne Martin, Koos Lodewijkx:
Securing Cloud Environments for Enterprise Computing. 1 - David A. McGrew:
Privacy vs. Efficacy in Cloud-based Threat Detection. 3-4 - Bryan D. Payne:
Reducing the Cost of Security in the Cloud. 5-6
Memorial
- Elaine Shi:
Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security. 7-8
Technical Presentations
- Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:
Co-Location-Resistant Clouds. 9-20 - Nathalie Baracaldo, Elli Androulaki, Joseph S. Glider, Alessandro Sorniotti:
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage. 21-32 - Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi:
Swap and Play: Live Updating Hypervisors and Its Application to Xen. 33-44 - Daniel Demmler, Amir Herzberg, Thomas Schneider:
RAID-PIR: Practical Multi-Server PIR. 45-56 - Yitao Duan:
Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy. 57-68 - Thomas Groß:
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs. 69-80 - Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation. 81-92 - Christian Mainka, Vladislav Mladenov, Florian Feldmann, Julian Krautwald, Jörg Schwenk:
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. 93-104 - Andreas Mayer, Marcus Niemietz, Vladislav Mladenov, Jörg Schwenk:
Guardians of the Clouds: When Identity Providers Fail. 105-116 - Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch:
CloudSafetyNet: Detecting Data Leakage between Cloud Tenants. 117-128 - Yi Qian, Yupeng Zhang, Xi Chen, Charalampos Papamanthou:
Streaming Authenticated Data Structures: Abstraction and Implementation. 129-139 - Yuqiong Sun, Giuseppe Petracca, Trent Jaeger:
Inevitable Failure: The Flawed Trust Assumption in the Cloud. 141-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.