Verifying cloud services: present and future
As cloud-based services gain popularity in both private and enterprise domains, cloud
consumers are still lacking in tools to verify that these services work as expected. Such tools …
consumers are still lacking in tools to verify that these services work as expected. Such tools …
Data computation in a multi-domain cloud environment
R Jain, V Levy, U Mattsson, Y Rozenberg - US Patent 9,973,475, 2018 - Google Patents
A gateway device for implementing data security is described herein. The gateway device is
coupled between a client device and a server device, and is configured to receive encoded …
coupled between a client device and a server device, and is configured to receive encoded …
Secure the cloud: From the perspective of a service-oriented organization
In response to the revival of virtualized technology by Rosenblum and Garfinkel [2005], NIST
defined cloud computing, a new paradigm in service computing infrastructures. In cloud …
defined cloud computing, a new paradigm in service computing infrastructures. In cloud …
Offering security diagnosis as a service for cloud SaaS applications
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …
technologies, web services have become critical components of Software as a Service …
Assured deletion in the cloud: requirements, challenges and future directions
Inadvertent exposure of sensitive data is a major concern for potential cloud customers.
Much focus has been on other data leakage vectors, such as side channel attacks, while …
Much focus has been on other data leakage vectors, such as side channel attacks, while …
Data usage control for distributed systems
F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …
used after they have been released and accessed. We address distributed aspects of this …
PivotWall: SDN-based information flow control
Advanced Persistent Threats (APTs) commonly use step** stone attacks that allow the
adversary to move laterally undetected within an enterprise network towards a target …
adversary to move laterally undetected within an enterprise network towards a target …
End-to-end privacy policy enforcement in cloud infrastructure
S Betge-Brezetz, GB Kamga… - 2013 IEEE 2nd …, 2013 - ieeexplore.ieee.org
Privacy in the cloud is still a strong issue for the large adoption of cloud technologies by
enterprises which fear to actually put their sensitive data in the cloud. There is indeed a …
enterprises which fear to actually put their sensitive data in the cloud. There is indeed a …
Complying with data handling requirements in cloud storage systems
In past years, cloud storage systems saw an enormous rise in usage. However, despite their
popularity and importance as underlying infrastructure for more complex cloud services …
popularity and importance as underlying infrastructure for more complex cloud services …
Cloud Security Using Fine-Grained Efficient Information Flow Tracking
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …