


default search action
3rd CCSW 2011: Chicago, Illinois, USA
- Christian Cachin, Thomas Ristenpart:

Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1004-8
Keynote address
- John Manferdelli:

Clouds and their discontents. 1-2
Resource management
- Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:

All your clouds are belong to us: security analysis of cloud management interfaces. 3-14 - Andrew Brown, Jeffrey S. Chase:

Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications. 15-20 - Vyas Sekar, Petros Maniatis:

Verifiable resource accounting for cloud computing services. 21-26
Keynote address
- Charlie Kaufman:

What's different about security in a public cloud? 27-28
Virtualization
- Yunjing Xu, Michael D. Bailey, Farnam Jahanian, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting:

An exploration of L2 cache covert channels in virtualized environments. 29-40 - Bhanu Chandra Vattikonda, Sambit Das, Hovav Shacham:

Eliminating fine grained timers in Xen. 41-46 - Sören Bleikertz, Thomas Groß

, Sebastian Mödersheim
:
Automated verification of virtualized infrastructures. 47-58
Keynote address
- Timothy G. Brown:

Cloud security: myth or reality? 59-60
Verification and legal matters
- Joseph Idziorek, Mark Tannian, Douglas Jacobson

:
Detecting fraudulent use of cloud resources. 61-72 - Karyn Benson, Rafael Dowsley

, Hovav Shacham:
Do you know where your cloud files are? 73-82 - David G. Gordon, Travis D. Breaux

:
Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape. 83-94
Cryptographic protocols
- Michael T. Goodrich

, Michael Mitzenmacher, Olga Ohrimenko
, Roberto Tamassia:
Oblivious RAM simulation with efficient worst-case access overhead. 95-100 - Ghassan Karame, Srdjan Capkun, Ueli Maurer:

Privacy-preserving outsourcing of brute-force key searches. 101-112 - Michael Naehrig, Kristin E. Lauter, Vinod Vaikuntanathan:

Can homomorphic encryption be practical? 113-124 - George Danezis, Benjamin Livshits:

Towards ensuring client-side computational integrity. 125-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














