{"title":"Session details: New challenges","authors":"Bogdan Carbunar","doi":"10.1145/3257715","DOIUrl":"https://doi.org/10.1145/3257715","url":null,"abstract":"","PeriodicalId":106606,"journal":{"name":"Proceedings of the 2009 ACM workshop on Cloud computing security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114681750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Clouds and data outsourcing","authors":"Peter Williams","doi":"10.1145/3257714","DOIUrl":"https://doi.org/10.1145/3257714","url":null,"abstract":"","PeriodicalId":106606,"journal":{"name":"Proceedings of the 2009 ACM workshop on Cloud computing security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Connecting to the web 2.0","authors":"D. Song","doi":"10.1145/3257713","DOIUrl":"https://doi.org/10.1145/3257713","url":null,"abstract":"","PeriodicalId":106606,"journal":{"name":"Proceedings of the 2009 ACM workshop on Cloud computing security","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Applications","authors":"C. Nita-Rotaru","doi":"10.1145/3257716","DOIUrl":"https://doi.org/10.1145/3257716","url":null,"abstract":"","PeriodicalId":106606,"journal":{"name":"Proceedings of the 2009 ACM workshop on Cloud computing security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}