default search action
The Cloud Security Ecosystem, 2015
- Ryan Kok Leong Ko, Kim-Kwang Raymond Choo:
The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues. Elsevier 2015, ISBN 978-0-12-801595-7 - Ryan K. L. Ko, Kim-Kwang Raymond Choo:
Cloud security ecosystem. 1-14 - Yiu Chung Laurie Lau:
Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. 17-35 - Nina Viktoria Juliadotter, Kim-Kwang Raymond Choo:
CATRA: Conceptual cloud attack taxonomy and risk assessment framework. 37-81 - Hing-Yan Lee, Yao-Sing Tao:
Multitiered cloud security model. 83-97 - Mark A. Will, Ryan K. L. Ko:
A guide to homomorphic encryption. 101-127 - Johanna Ullrich, Edgar R. Weippl:
Protection through isolation: Virtues and pitfalls. 129-147 - Clare Sullivan:
Protecting digital identity in the cloud. 149-170 - Alan Yu Shyang Tan, Ryan K. L. Ko, Geoff Holmes, Bill Rogers:
Provenance for cloud data accountability. 171-185 - Baden Delamore, Ryan K. L. Ko:
Security as a service (SecaaS) - An overview. 187-203 - Thomas Kemmerich, Vivek Agrawal, Carsten Momsen:
Secure migration to the cloud - In and out. 205-230 - Stefanie Gerdes, Carsten Bormann, Olaf Bergmann:
Keeping users empowered in a cloudy Internet of Things. 231-247 - Abdussalam Ali, Igor T. Hawryszkiewycz:
Cloud as infrastructure for managing complex scalable business networks, privacy perspective. 249-267 - Grainne Kirwan:
Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviors. 269-281 - Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Conceptual evidence collection and analysis methodology for Android devices. 285-307 - Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Mobile cloud forensics: An analysis of seven popular Android apps. 309-345 - George Grispos, William Bradley Glisson, Tim Storer:
Recovering residual forensic data from smartphone interactions with cloud storage providers. 347-382 - Nurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo:
Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model. 383-400 - Chaz Vidal, Kim-Kwang Raymond Choo:
Cloud security and forensic readiness: The current state of an IaaS provider. 401-428 - Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One investigation: Detecting evidences on client machines. 429-446 - Sai Honig:
Governance in the Cloud. 449-462 - Sheikh Mahbub Habib, Florian Volk, Sascha Hauke, Max Mühlhäuser:
Computational trust methods for security quantification in the cloud ecosystem. 463-493 - Michael Nidd, Marieta Georgieva Ivanova, Christian W. Probst, Axel Tanner:
Tool-based risk assessment of cloud infrastructures as socio-technical systems. 495-517
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.