From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Information flow control for secure cloud computing

J Bacon, D Eyers, TFJM Pasquier… - … on Network and …, 2014 - ieeexplore.ieee.org
Security concerns are widely seen as an obstacle to the adoption of cloud computing
solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control …

Evaluation of single event upset mitigation schemes for SRAM based FPGAs using the FLIPPER fault injection platform

M Alderighi, F Casini, S D'Angelo… - … on Defect and Fault …, 2007 - ieeexplore.ieee.org
SRAM based reprogrammable FPGAs are sensitive to radiation-induced single event upsets
(SEU), not only in their user flip-flops and memory, but also in the configuration memory …

Verifying cloud services: present and future

S Bouchenak, G Chockler, H Chockler… - ACM SIGOPS operating …, 2013 - dl.acm.org
As cloud-based services gain popularity in both private and enterprise domains, cloud
consumers are still lacking in tools to verify that these services work as expected. Such tools …

Mycloud: supporting user-configured privacy protection in cloud computing

M Li, W Zang, K Bai, M Yu, P Liu - … of the 29th Annual Computer Security …, 2013 - dl.acm.org
Privacy concern is still one of the major issues that prevent users from moving to public
clouds. The root cause of the privacy problem is that the cloud provider has more privileges …

[PDF][PDF] Securing the cloud: Threats, attacks and mitigation techniques

MM Alani - Journal of Advanced Computer Science & Technology, 2014 - researchgate.net
This paper is aimed to present information about the most current threats and attacks on
cloud computing, as well as security measures. The paper discusses threats and attacks that …

Information flow audit for PaaS clouds

TFJM Pasquier, J Singh, J Bacon… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
With the rapid increase in uptake of cloud services, issues of data management are
becoming increasingly prominent. There is a clear, outstanding need for the ability for …

[PDF][PDF] Constraints specification in attribute based access control

KZ Bijon, R Krishman, R Sandhu - Science, 2013 - profsandhu.com
Recently, attribute based access control (ABAC) has received considerable attention from
the security community for its policy flexibility and dynamic decision making capabilities. In …