


default search action
4th CCSW 2012: Raleigh, NC, USA
- Ting Yu, Srdjan Capkun, Seny Kamara:

Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1
Virtualization
- Adam Bates

, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
Detecting co-residency with active traffic analysis techniques. 1-12 - Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser:

Fast dynamic extracted honeypots in cloud computing. 13-18 - Keaton Mowery, Sriram Keelveedhi, Hovav Shacham:

Are AES x86 cache timing attacks still feasible? 19-24 - Abhinav Srivastava, Vinod Ganapathy:

Towards a richer model of cloud app markets. 25-30
Cloud-assisted security
- Beom Heyn Kim

, Wei Huang, David Lie:
Unity: secure and durable personal cloud storage. 31-36 - Angeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis

, Angelos D. Keromytis:
Exploiting split browsers for efficiently protecting user data. 37-42 - John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek:

Babel: a secure computer is a polyglot. 43-54 - Howard E. Shrobe:

What if we got a do-over? 55-56 - Kristin E. Lauter:

Practical applications of homomorphic encryption. 57-58
Cryptographic protocols
- Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shivaramakrishnan Narayan:

LoSt: location based storage. 59-70 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese

:
Efficient query integrity for outsourced dynamic databases. 71-82 - Christopher W. Fletcher, Marten van Dijk

, Srinivas Devadas:
Towards an interpreter for efficient encrypted computation. 83-94 - Burton Stephen Kaliski Jr.:

Revisiting DNS and WHOIS in the cloud era. 95-96
Increasing trust
- Ioannis Papagiannis, Peter R. Pietzuch

:
CloudFilter: practical control of sensitive data propagation to the cloud. 97-102 - Jesus Luna Garcia, Robert Langenberg, Neeraj Suri

:
Benchmarking cloud security level agreements using quantitative policy trees. 103-112 - Apurva Kumar:

Managing trust and secrecy in identity management clouds. 113-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














