


default search action
1st CCSW 2009: Chicago, Illinois, USA
- Radu Sion, Dawn Song:

Proceedings of the first ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, IL, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-784-4
Connecting to the web 2.0
- Elie Bursztein, Peifung E. Lam, John C. Mitchell:

TrackBack spam: abuse and prevention. 3-10 - Francis Hsu, Hao Chen

:
Secure file system services for web 2.0 applications. 11-18 - Robert Biddle, Paul C. van Oorschot

, Andrew S. Patrick, Jennifer Sobey, Tara Whalen:
Browser interfaces and extended validation SSL certificates: an empirical study. 19-30 - Dominik Herrmann, Rolf Wendolsky, Hannes Federrath:

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. 31-42
Clouds and data outsourcing
- Kevin D. Bowers, Ari Juels, Alina Oprea:

Proofs of retrievability: theory and implementation. 43-54 - Weichao Wang, Zhiwei Li, Rodney Owens, Bharat K. Bhargava:

Secure and efficient access to outsourced data. 55-66 - Aaram Yun, Chunhui Shi, Yongdae Kim

:
On protecting integrity and confidentiality of cryptographic file system for outsourced storage. 67-76
New challenges
- Himanshu Raj, Ripal Nathuji, Abhishek Singh, Paul England:

Resource management for isolation enhanced cloud services. 77-84 - Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina:

Controlling data in the cloud: outsourcing computation without outsourcing control. 85-90 - Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning:

Managing security of virtual machine images in a cloud environment. 91-96 - Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni

:
Cloud security is not (just) virtualization security: a short paper. 97-102
Applications
- Josh Benaloh, Melissa Chase, Eric Horvitz, Kristin E. Lauter:

Patient controlled encryption: ensuring privacy of electronic medical records. 103-114 - Mariana Raykova, Binh Vo, Steven M. Bellovin, Tal Malkin:

Secure anonymous database search. 115-126 - Xinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, Sangoh Jeong:

Securing elastic applications on mobile devices for cloud computing. 127-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














