Browse > Article

Security Technology Trend in Cloud Computing  

Kim, Tae-Hyoung (성균관대학교)
Kim, In-Hyuk (성균관대학교)
Min, Chang-Woo (성균관대학교)
Eom, Young-Ik (성균관대학교)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December, 2009
2 W. Jansen, and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, January, 2011
3 김태형, 김인혁, 김정한, 민창우, 김지홍, 엄영익, 클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행기술, 정보보호학회논문지, 제20권, 제5호, 2010, 10월
4 Cloud Computing Use Case Discussion Group, Cloud Computing Use Case White Paper Version 4.0, July, 2010
5 D. Zissis, and D. Lekkas, Addressing cloud computing security issues, Future Generation Computer Systems, Vol. 28(3), March, 2012
6 Cloud Security Alliance, Top Threats to Cloud Computing V1.0, March, 2010
7 M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, Proc. of the USENIX Security Symposium, August, 2011
8 S. T. King, Y. M. Wang, C. Verbowski, H. J. Wang, J. R. Lorch, Subvirt: Implementing malware with virtual machines, Proc. of the 2006 IEEE Symposium on Security and Privacy, 2006
9 J. Rutkowska, Subverting Vista Kernel For Fun And Profit, Black Hat Briefings, August, 2006
10 K. Kortchinsky, CLOUDBURST: A VMware Guest to Host Escape Story, BlackHat USA, 2009
11 C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-pre-serving public auditing for data storage security in cloud computing, Proc. of the 29th conference on Information communications, pp.525-533, 2010
12 G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possesion, Proc. of SecureComm, 2008
13 G. Ateniese, R. Bums, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, D. Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security, Vol. 14(1), May, 2011
14 M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest Proc. of HotOS, 2007
15 T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You, Get Off My Cloud! Exploring Information Leakage in Third- Party Compute Clouds, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
16 K. D. Bowers, A. Juels, and A. Oprea, HAIL: A High-Availability and Integrity Layer for Cloud Storage, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
17 K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
18 C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, Dynamic Provable Data Possession, Proc. of the 16th ACM conference on Computer and Communications Security, 2009
19 K. D. Bower, M. V. Dijk, A. Juels, A. Oprea, and R. L. Rivest, How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes, Proc. ofthe 18th ACM conference on Computer and Communications Security, 2011
20 L. Alvisi, A. Clement, M. Dahlin, S. Lee, P. Mahajan, S. Setty, and M. Walfish, Depot: Cloud storage with minimal trust, USENIX Symposium on Operating Systems Design and Implementation, October 2010
21 A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds, Proc. of the 6th ACM SIGOPS/EuroSysEuropean Systems Conference, April, 2011
22 B. parno, J. M. McCune, and A. Perrig, Bootstrapping Trust in Commodity Computers, Proc. of IEEE Symposium on Security and Privacy, 2010
23 M. Mannan, B. H. Kim, A. Ganjali, and D. Lie, Unicorn:Two-Factor Attestation for Data Security, Proc. of the 18th ACM conference on Computer and Communications Security, 2011
24 E. G. Sier, W. Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider, Logical Attestation: An Authorization Architecture for Trustworthy Computing, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011
25 J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, Flicker: An execution infrastructure for TCB Minimization, Proc. of the European Conference on Computer Systems, April, 2008
26 J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrigo TrustVisor: Efficient TCB reduction and attestation, Proc of IEEE Symposium on Security and Privacy, May, 2010
27 X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports, Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems, Proc. of the 13th international conference on Architectural support for programming languages and operating systems, 2008
28 S. B. Suh, Secure architecture and implementation ofxen on arm for mobile devices, 4th Xen Summit, 2007
29 F. Zhang, J. Chen, H. chen, and B. Zang, CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization, Proc. of 23rd ACM Symposium on Operating Systems Principles, 2011