4.7 Article

Security and Privacy in Cloud Computing

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A survey of accountability in computer networks and distributed systems

Zhifeng Xiao et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

GlobalView: building global view with log files in a distributed/networked system for accountability

Yang Xiao et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

Cyber Security and Privacy Issues in Smart Grids

Jing Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Information Systems

Accountability using flow-net: design, implementation, and performance evaluation

Yang Xiao et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

Understanding Cloud Computing Vulnerabilities

Bernd Grobauer et al.

IEEE SECURITY & PRIVACY (2011)

Review Computer Science, Hardware & Architecture

A survey on security issues in service delivery models of cloud computing

S. Subashini et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

Temporal Accountability and Anonymity in Medical Sensor Networks

Jing Liu et al.

MOBILE NETWORKS & APPLICATIONS (2011)

Proceedings Paper Computer Science, Information Systems

HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis

Yinqian Zhang et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)

Article Computer Science, Hardware & Architecture

Flow-Net Methodology for Accountability in Wireless Networks

Yang Xiao

IEEE NETWORK (2009)

Article Computer Science, Information Systems

A survey of anonymity in wireless communication systems

Hui Chen et al.

SECURITY AND COMMUNICATION NETWORKS (2009)

Article Computer Science, Hardware & Architecture

Mapreduce: Simplified data processing on large clusters

Jeffrey Dean et al.

COMMUNICATIONS OF THE ACM (2008)

Article Computer Science, Hardware & Architecture

Non deterministic caches: a simple and effective defense against side channel attacks

G. Keramidas et al.

DESIGN AUTOMATION FOR EMBEDDED SYSTEMS (2008)

Proceedings Paper Computer Science, Information Systems

Lurking in the shadows: Identifying systemic threats to kernel data (Short paper)

Arati Baliga et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)

Article Engineering, Electrical & Electronic

Security and privacy in RFID and applications in telemedicine

Y Xiao et al.

IEEE COMMUNICATIONS MAGAZINE (2006)