- Home
- Publications
- Publication Search
- Publication Details
Title
Security issues in cloud environments: a survey
Authors
Keywords
Clouds, Cloud computing, Issues, Security, Survey
Journal
International Journal of Information Security
Volume 13, Issue 2, Pages 113-170
Publisher
Springer Nature
Online
2013-09-27
DOI
10.1007/s10207-013-0208-7
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
- (2014) Edward G. Amoroso IEEE SECURITY & PRIVACY
- The Threat in the Cloud
- (2014) Matthew Green IEEE SECURITY & PRIVACY
- Mobile Security: A Look Ahead
- (2014) Qing Li et al. IEEE SECURITY & PRIVACY
- Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise
- (2014) Dave Martin IEEE SECURITY & PRIVACY
- Help! Is There a Trustworthy-Systems Doctor in the House?
- (2014) Alec Yasinsac et al. IEEE SECURITY & PRIVACY
- The Human Element of Information Security
- (2014) Hugh Thompson IEEE SECURITY & PRIVACY
- Security Event Monitoring in a Distributed Systems Environment
- (2014) Lukasz Kufel IEEE SECURITY & PRIVACY
- Authentication at Scale
- (2014) Eric Grosse et al. IEEE SECURITY & PRIVACY
- Virtualization
- (2013) Michael Pearce et al. ACM COMPUTING SURVEYS
- Multitasking without compromise
- (2013) Grzegorz Czajkowski et al. ACM SIGPLAN NOTICES
- Condos and clouds
- (2013) Pat Helland COMMUNICATIONS OF THE ACM
- One-time cookies
- (2012) Italo Dacosta et al. ACM Transactions on Internet Technology
- Beyond lightning: A survey on security challenges in cloud computing
- (2012) Chunming Rong et al. COMPUTERS & ELECTRICAL ENGINEERING
- Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
- (2012) Josiah Dykstra et al. Digital Investigation
- Digital forensic investigation of cloud storage services
- (2012) Hyunji Chung et al. Digital Investigation
- A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
- (2012) Md. Tanzim Khorshed et al. Future Generation Computer Systems-The International Journal of eScience
- Security and Privacy in Cloud Computing
- (2012) Zhifeng Xiao et al. IEEE Communications Surveys and Tutorials
- SOAP-Based vs. RESTful Web Services: A Case Study for Multimedia Conferencing
- (2012) Fatna Belqasmi et al. IEEE INTERNET COMPUTING
- A combined approach to ensure data security in cloud computing
- (2012) Sandeep K. Sood JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An intrusion detection and prevention system in cloud computing: A systematic review
- (2012) Ahmed Patel et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey of intrusion detection techniques in Cloud
- (2012) Chirag Modi et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- The Final Frontier: Confidentiality and Privacy in the Cloud
- (2011) Francisco Rocha et al. COMPUTER
- Everything as a Service: Powering the New Information Economy
- (2011) Prith Banerjee et al. COMPUTER
- Building safe PaaS clouds: A survey on security in multitenant software platforms
- (2011) Luis Rodero-Merino et al. COMPUTERS & SECURITY
- Obfuscation: The Hidden Malware
- (2011) Philip OKane et al. IEEE SECURITY & PRIVACY
- Digital randomness
- (2011) Greg Taylor et al. IEEE SPECTRUM
- Threat as a Service?: Virtualization's Impact on Cloud Security
- (2011) Hsin-Yi Tsai et al. IT Professional
- A view of cloud computing
- (2010) Michael Armbrust et al. COMMUNICATIONS OF THE ACM
- Locking the sky: a survey on IaaS cloud security
- (2010) Luis M. Vaquero et al. COMPUTING
- Addressing cloud computing security issues
- (2010) Dimitrios Zissis et al. Future Generation Computer Systems-The International Journal of eScience
- Toward publicly auditable secure cloud data storage services
- (2010) Cong Wang et al. IEEE NETWORK
- Splitting the HTTPS Stream to Attack Secure Web Connections
- (2010) Marco Prandini et al. IEEE SECURITY & PRIVACY
- Security and Privacy Challenges in Cloud Computing Environments
- (2010) Hassan Takabi et al. IEEE SECURITY & PRIVACY
- Understanding Cloud Computing Vulnerabilities
- (2010) Bernd Grobauer et al. IEEE SECURITY & PRIVACY
- Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach
- (2010) Bhaskar Prasad Rimal et al. Journal of Grid Computing
- Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
- (2010) Ashley Chonka et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Establishing Trust in Cloud Computing
- (2010) Khaled M. Khan et al. IT Professional
- 07 2009 3 3 5165513 10.1109/MC.2009.206 http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5165513 Computer Computer 0018-9162 08 2009 42 8
- (2009) John Viega COMPUTER
- Data center evolution
- (2009) Krishna Kant Computer Networks
- Data Security in the World of Cloud Computing
- (2009) Lori M. Kaufman IEEE SECURITY & PRIVACY
- Cloud computing
- (2008) Brian Hayes COMMUNICATIONS OF THE ACM
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now