Abstract is missing.
- Detecting co-residency with active traffic analysis techniquesAdam M. Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler. 1-12 [doi]
- Fast dynamic extracted honeypots in cloud computingSebastian Biedermann, Martin Mink, Stefan Katzenbeisser. 13-18 [doi]
- Are AES x86 cache timing attacks still feasible?Keaton Mowery, Sriram Keelveedhi, Hovav Shacham. 19-24 [doi]
- Towards a richer model of cloud app marketsAbhinav Srivastava, Vinod Ganapathy. 25-30 [doi]
- Unity: secure and durable personal cloud storageBeom Heyn Kim, Wei Huang, David Lie. 31-36 [doi]
- Exploiting split browsers for efficiently protecting user dataAngeliki Zavou, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis. 37-42 [doi]
- Babel: a secure computer is a polyglotJohn Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek. 43-54 [doi]
- What if we got a do-over?Howard E. Shrobe. 55-56 [doi]
- Practical applications of homomorphic encryptionKristin E. Lauter. 57-58 [doi]
- LoSt: location based storageGaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shivaramakrishnan Narayan. 59-70 [doi]
- Efficient query integrity for outsourced dynamic databasesQingji Zheng, Shouhuai Xu, Giuseppe Ateniese. 71-82 [doi]
- Towards an interpreter for efficient encrypted computationChristopher W. Fletcher, Marten van Dijk, Srinivas Devadas. 83-94 [doi]
- Revisiting DNS and WHOIS in the cloud eraBurton Stephen Kaliski Jr.. 95-96 [doi]
- CloudFilter: practical control of sensitive data propagation to the cloudIoannis Papagiannis, Peter R. Pietzuch. 97-102 [doi]
- Benchmarking cloud security level agreements using quantitative policy treesJesus Luna Garcia, Robert Langenberg, Neeraj Suri. 103-112 [doi]
- Managing trust and secrecy in identity management cloudsApurva Kumar. 113-124 [doi]