Abstract is missing.
- Securing Cloud Environments for Enterprise ComputingJoanne Martin, Koos Lodewijkx. 1 [doi]
- Privacy vs. Efficacy in Cloud-based Threat DetectionDavid A. McGrew. 3-4 [doi]
- Reducing the Cost of Security in the CloudBryan D. Payne. 5-6 [doi]
- Emil Stefanov: Bridging the Theory and Practice of Cloud Computing SecurityElaine Shi. 7-8 [doi]
- Co-Location-Resistant CloudsYossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova 0001, Bruce Shepard. 9-20 [doi]
- Reconciling End-to-End Confidentiality and Data Reduction In Cloud StorageNathalie Baracaldo, Elli Androulaki, Joseph S. Glider, Alessandro Sorniotti. 21-32 [doi]
- Swap and Play: Live Updating Hypervisors and Its Application to XenFranz Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi. 33-44 [doi]
- RAID-PIR: Practical Multi-Server PIRDaniel Demmler, Amir Herzberg, Thomas Schneider 0003. 45-56 [doi]
- Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest PrivacyYitao Duan. 57-68 [doi]
- Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology GraphsThomas R. Groß. 69-80 [doi]
- A Framework for Outsourcing of Secure ComputationThomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi. 81-92 [doi]
- Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the CloudChristian Mainka, Vladislav Mladenov, Florian Feldmann, Julian Krautwald, Jörg Schwenk. 93-104 [doi]
- Guardians of the Clouds: When Identity Providers FailAndreas Mayer, Marcus Niemietz, Vladislav Mladenov, Jörg Schwenk. 105-116 [doi]
- CloudSafetyNet: Detecting Data Leakage between Cloud TenantsChristian Priebe, Divya Muthukumaran, Dan O'Keeffe, David M. Eyers, Brian Shand, Rüdiger Kapitza, Peter R. Pietzuch. 117-128 [doi]
- Streaming Authenticated Data Structures: Abstraction and ImplementationYi Qian, Yupeng Zhang, Xi Chen, Charalampos Papamanthou. 129-139 [doi]
- Inevitable Failure: The Flawed Trust Assumption in the CloudYuqiong Sun, Giuseppe Petracca, Trent Jaeger. 141-150 [doi]