Abstract is missing.
- Cryptographic Key Management Issues and Challenges in Cloud ServicesRamaswamy Chandramouli, Michaela Iorga, Santosh Chokhani. 1-30 [doi]
- Costs and Security in CloudsYao Chen, Radu Sion. 31-56 [doi]
- Hardware-Enhanced Security for Cloud ComputingJakub Szefer, Ruby B. Lee. 57-76 [doi]
- Cloud Computing Security: What Changes with Software-Defined Networking?Maurício O. Tsugawa, Andréa M. Matsunaga, José A. B. Fortes. 77-93 [doi]
- Proof of Isolation for Cloud StorageZhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing. 95-121 [doi]
- Selective and Fine-Grained Access to Data in the CloudSabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 123-148 [doi]
- Enabling Collaborative Data Authorization Between Enterprise CloudsMeixing Le, Krishna Kant, Sushil Jajodia. 149-169 [doi]
- Making Query Execution Over Encrypted Data PracticalKenneth P. Smith, M. David Allen, Hongying Lan, Andrew Sillers. 171-188 [doi]
- Privacy-Preserving Keyword Search Over Encrypted Data in Cloud ComputingWenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li. 189-212 [doi]
- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud ComputingKerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal. 213-238 [doi]
- Securing Mission-Centric Operations in the CloudMassimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri. 239-259 [doi]
- Computational Decoys for Cloud SecurityGeorgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis. 261-270 [doi]
- Towards a Data-Centric Approach to Attribution in the CloudWenchao Zhou. 271-301 [doi]
- Software Cruising: A New Technology for Building Concurrent Software MonitorDinghao Wu, Peng Liu 0005, Qiang Zeng, Donghai Tian. 303-324 [doi]
- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud SystemsHasan Çam. 325-343 [doi]