


default search action
6th CCSW 2014: Scottsdale, Arizona, USA
- Gail-Joon Ahn, Alina Oprea, Reihaneh Safavi-Naini:

Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3239-2
Invited Talks
- Joanne Martin, Koos Lodewijkx:

Securing Cloud Environments for Enterprise Computing. 1 - David A. McGrew:

Privacy vs. Efficacy in Cloud-based Threat Detection. 3-4 - Bryan D. Payne:

Reducing the Cost of Security in the Cloud. 5-6
Memorial
- Elaine Shi:

Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security. 7-8
Technical Presentations
- Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, F. Bruce Shepherd:

Co-Location-Resistant Clouds. 9-20 - Nathalie Baracaldo

, Elli Androulaki, Joseph S. Glider, Alessandro Sorniotti:
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage. 21-32 - Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi:

Swap and Play: Live Updating Hypervisors and Its Application to Xen. 33-44 - Daniel Demmler, Amir Herzberg, Thomas Schneider

:
RAID-PIR: Practical Multi-Server PIR. 45-56 - Yitao Duan:

Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy. 57-68 - Thomas Groß:

Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs. 69-80 - Thomas P. Jakobsen, Jesper Buus Nielsen

, Claudio Orlandi
:
A Framework for Outsourcing of Secure Computation. 81-92 - Christian Mainka

, Vladislav Mladenov, Florian Feldmann, Julian Krautwald, Jörg Schwenk:
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. 93-104 - Andreas Mayer

, Marcus Niemietz, Vladislav Mladenov, Jörg Schwenk:
Guardians of the Clouds: When Identity Providers Fail. 105-116 - Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch:

CloudSafetyNet: Detecting Data Leakage between Cloud Tenants. 117-128 - Yi Qian, Yupeng Zhang, Xi Chen, Charalampos Papamanthou:

Streaming Authenticated Data Structures: Abstraction and Implementation. 129-139 - Yuqiong Sun, Giuseppe Petracca, Trent Jaeger:

Inevitable Failure: The Flawed Trust Assumption in the Cloud. 141-150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














