Privacy and Security for Cloud Computing

@inproceedings{Pearson2013PrivacyAS,
  title={Privacy and Security for Cloud Computing},
  author={Siani Pearson and George Yee},
  booktitle={Computer Communications and Networks},
  year={2013}
}

Citations

Publications citing this paper.
Showing 1-10 of 13 extracted citations

Privacy proof in the cloud

2017 11th International Conference on Research Challenges in Information Science (RCIS) • 2017
View 6 Excerpts
Highly Influenced

A multi-cloud approach for secure data storage on smart device

2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP) • 2016
View 1 Excerpt

Anonymous authentication scheme in e-Health Cloud environment

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) • 2016

Network Function Virtualization: State-of-the-Art and Research Challenges

IEEE Communications Surveys & Tutorials • 2016
View 1 Excerpt

An adaptive anonymous authentication for cloud environment

2015 International Conference on Cloud Technologies and Applications (CloudTech) • 2015
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 39 references

Migration to Cloud as Real Option: Investment Decision under Uncertainty

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications • 2011
View 20 Excerpts
Highly Influenced

Audit in the cloud

M. Chung
http://www.slideshare.net/eburon/audit-in-the-cloud-kpmg . KPMG • 2010
View 20 Excerpts
Highly Influenced

Security guidance for critical areas of focus in Cloud Computing V2

G. Brunette, R. Mogull
1. CSA (Cloud Security Alliance), USA. Online: http://www.cloudsecurityalliance.org/ guidance/csaguide.v2 • 2009
View 20 Excerpts
Highly Influenced

Intrusion detection using autonomous agents

Computer Networks • 2000
View 20 Excerpts
Highly Influenced

An Introduction to Software Agents

View 20 Excerpts
Highly Influenced

A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures

2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum • 2011
View 9 Excerpts
Highly Influenced

Cloud Compliance Auditing

J. Sinclair
Closer • 2011
View 4 Excerpts
Highly Influenced

Cloud Penetrator

Secpoint
http://www.secpoint.com/cloud-penetrator-web-vulnerabilityscanner.html • 2011
View 4 Excerpts
Highly Influenced

Retina Cloud

eEye
http://www.eeye.com/products/retina/cloud • 2011
View 20 Excerpts
Highly Influenced

Cloud Auditing

J. Sinclair
SAP Research. http://www.slideshare.net/jonathansinclair86/ cloud-auditing (2010, • 2010
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…