Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_12
Georgios Kontaxis, M. Polychronakis, A. Keromytis
{"title":"Computational Decoys for Cloud Security","authors":"Georgios Kontaxis, M. Polychronakis, A. Keromytis","doi":"10.1007/978-1-4614-9278-8_12","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_12","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_9
Wenhai Sun, Wenhai Sun, W. Lou, Y. Hou, Hui Li
{"title":"Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing","authors":"Wenhai Sun, Wenhai Sun, W. Lou, Y. Hou, Hui Li","doi":"10.1007/978-1-4614-9278-8_9","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_9","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_15
H. Çam
{"title":"Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems","authors":"H. Çam","doi":"10.1007/978-1-4614-9278-8_15","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_15","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_7
Meixing Le, K. Kant, S. Jajodia
{"title":"Enabling Collaborative Data Authorization Between Enterprise Clouds","authors":"Meixing Le, K. Kant, S. Jajodia","doi":"10.1007/978-1-4614-9278-8_7","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_7","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_5
Zhan Wang, Kun Sun, S. Jajodia, Jiwu Jing
{"title":"Proof of Isolation for Cloud Storage","authors":"Zhan Wang, Kun Sun, S. Jajodia, Jiwu Jing","doi":"10.1007/978-1-4614-9278-8_5","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_5","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129626868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_8
Ken Smith, M. David Allen, Hongying Lan, Andrew Sillers
{"title":"Making Query Execution Over Encrypted Data Practical","authors":"Ken Smith, M. David Allen, Hongying Lan, Andrew Sillers","doi":"10.1007/978-1-4614-9278-8_8","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_8","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_4
Maurício O. Tsugawa, Andréa M. Matsunaga, J. Fortes
{"title":"Cloud Computing Security: What Changes with Software-Defined Networking?","authors":"Maurício O. Tsugawa, Andréa M. Matsunaga, J. Fortes","doi":"10.1007/978-1-4614-9278-8_4","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_4","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126995783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4614-9278-8_2
Yao Chen, R. Sion
{"title":"Costs and Security in Clouds","authors":"Yao Chen, R. Sion","doi":"10.1007/978-1-4614-9278-8_2","DOIUrl":"https://doi.org/10.1007/978-1-4614-9278-8_2","url":null,"abstract":"","PeriodicalId":330112,"journal":{"name":"Secure Cloud Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121054839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}