Abstract is missing.
- Authentication in the clouds: a framework and its application to mobile usersRichard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song. 1-6 [doi]
- Content oriented virtual domains for secure information sharing across organizationsTakayuki Sasaki, Masayuki Nakae, Ryuichi Ogawa. 7-12 [doi]
- Towards a discipline of mission-aware cloud computingRavi S. Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, Josh Zachry. 13-18 [doi]
- Venus: verification for untrusted cloud storageAlexander Shraer, Christian Cachin, Asaf Cidon, Idit Keidar, Yan Michalevsky, Dani Shaket. 19-30 [doi]
- Remote data checking for network coding-based distributed storage systemsBo Chen, Reza Curtmola, Giuseppe Ateniese, Randal C. Burns. 31-42 [doi]
- Seeding clouds with trust anchorsJoshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick McDaniel. 43-46 [doi]
- Privacy preserving EHR system using attribute-based infrastructureShivaramakrishnan Narayan, Martin Gagné, Reihaneh Safavi-Naini. 47-52 [doi]
- Privacy preserving mapping schemes supporting comparisonQiang Tang. 53-58 [doi]
- HengHa: data harvesting detection on hidden databasesShiyuan Wang, Divyakant Agrawal, Amr El Abbadi. 59-64 [doi]
- A new form of DOS attack in a cloud and its avoidance mechanismHuan Liu. 65-76 [doi]
- Towards incident handling in the cloud: challenges and approachesBernd Grobauer, Thomas Schreck. 77-86 [doi]
- First principles vulnerability assessmentJames A. Kupsch, Barton P. Miller, Elisa Heymann, Eduardo César. 87-92 [doi]
- Security audits of multi-tier virtual infrastructures in public infrastructure cloudsSören Bleikertz, Matthias Schunter, Christian W. Probst, Dimitrios Pendarakis, Konrad Eriksson. 93-102 [doi]
- Determinating timing channels in compute cloudsAmittai Aviram, Sen Hu, Bryan Ford, Ramakrishna Gummadi. 103-108 [doi]