Abstract is missing.
- Clouds and their discontentsJohn Manferdelli. 1-2 [doi]
- All your clouds are belong to us: security analysis of cloud management interfacesJuraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono. 3-14 [doi]
- Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applicationsAndrew Brown, Jeffrey S. Chase. 15-20 [doi]
- Verifiable resource accounting for cloud computing servicesVyas Sekar, Petros Maniatis. 21-26 [doi]
- What's different about security in a public cloud?Charlie Kaufman. 27-28 [doi]
- An exploration of L2 cache covert channels in virtualized environmentsYunjing Xu, Michael Bailey, Farnam Jahanian, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting. 29-40 [doi]
- Eliminating fine grained timers in XenBhanu C. Vattikonda, Sambit Das, Hovav Shacham. 41-46 [doi]
- Automated verification of virtualized infrastructuresSören Bleikertz, Thomas Groß, Sebastian Mödersheim. 47-58 [doi]
- Cloud security: myth or reality?Timothy G. Brown. 59-60 [doi]
- Detecting fraudulent use of cloud resourcesJoseph Idziorek, Mark Tannian, Douglas Jacobson. 61-72 [doi]
- Do you know where your cloud files are?Karyn Benson, Rafael Dowsley, Hovav Shacham. 73-82 [doi]
- Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscapeDavid G. Gordon, Travis D. Breaux. 83-94 [doi]
- Oblivious RAM simulation with efficient worst-case access overheadMichael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia. 95-100 [doi]
- Privacy-preserving outsourcing of brute-force key searchesGhassan Karame, Srdjan Capkun, Ueli Maurer. 101-112 [doi]
- Can homomorphic encryption be practical?Michael Naehrig, Kristin Lauter, Vinod Vaikuntanathan. 113-124 [doi]
- Towards ensuring client-side computational integrityGeorge Danezis, Benjamin Livshits. 125-130 [doi]