Narrow your search

Library

KU Leuven (2)

KBC (1)


Resource type

book (3)


Language

English (3)


Year
From To Submit

2022 (1)

2021 (1)

2020 (1)

Listing 1 - 3 of 3
Sort by

Book
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop : November 9, 2020, Virtual Event, USA
Authors: ---
Year: 2020 Publisher: New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the 11th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacksPractical cryptographic protocols for cloud securitySecure cloud resource virtualization mechanismsSecure data management outsourcing (e.g., database as a service)Practical privacy and integrity mechanisms for outsourcingFoundations of cloud-centric threat modelsSecure computation outsourcingRemote attestation mechanisms in cloudsSandboxing and VM-based enforcementsTrust and policy management in cloudsSecure identity management mechanismsNew cloud-aware web service security paradigms and mechanismsCloud-centric regulatory compliance issues and mechanismsBusiness and security risk models and cloudsCost and usability models and their interaction with security in cloudsScalability of security in global-size cloudsTrusted computing technology and cloudsBinary analysis of software for remote attestation and cloud protectionNetwork security (DOS, IDS etc.) mechanisms for cloud contextsSecurity for emerging cloud programming modelsEnergy/cost/efficiency of security in cloudsMachine learning for cloud protection CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.


Book
CCSW '21 : proceedings of the 2021 Cloud Computing Security Workshop : November 15, 2021, virtual event, Republic of Korea
Authors: ---
Year: 2021 Publisher: New York : The Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the 12th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacks, Practical cryptographic protocols for cloud security, Secure cloud resource virtualization mechanisms, Secure data management outsourcing (e.g., database as a service), Practical privacy and integrity mechanisms for outsourcing, Foundations of cloud-centric threat models, Secure computation outsourcing, Remote attestation mechanisms in clouds, Sandboxing and VM-based enforcements, Trust and policy management in clouds, Secure identity management mechanisms, New cloud-aware web service security paradigms and mechanisms, Cloud-centric regulatory compliance issues and mechanisms, Business and security risk models and clouds, Cost and usability models and their interaction with security in clouds, Scalability of security in global-size clouds, Trusted computing technology and clouds, Binary analysis of software for remote attestation and cloud protection, Network security (DOS, IDS etc.) mechanisms for cloud contexts, Security for emerging cloud programming models, Energy/cost/efficiency of security in clouds, Machine learning for cloud protection.


Book
Cloud Computing Security.
Authors: --- --- --- --- --- et al.
ISBN: 1680839594 Year: 2022 Publisher: Norwell, MA : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cloud services have revolutionized modern computing, with the most obvious benefits including scalability, increased availability, and the potential for reduced costs. However, the benefits of outsourcing data and computation come with security and privacy concerns.

Keywords

Listing 1 - 3 of 3
Sort by