Friday 26 October 2012

[1]
Amazon EC2 Crosses the Atlantic. http://aws.amazon.com/about-aws/whats-new/2008/12/10/amazon-ec2-crosses-the-atlantic/.
[2]
Amazon S3 Availability Event: July 20, 2008. http://status.aws.amazon.com/s3-20080720.html.
[3]
Amazon's terms of use. http://aws.amazon.com/agreement.
[4]
An Information-Centric Approach to Information Security. http://virtualization.sys-con.com/node/171199.
[5]
AOL apologizes for release of user search data. http://news.cnet.com/2100-1030_3-6102793.html.
[6]
Armbrust, M., Fox, A., Griffith, R. et al. Above the Clouds: A Berkeley View of Cloud Computing. UCB/EECS-2009-28, EECS Department, University of California, Berkeley, 2009.
[7]
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Z., Peterson, and Song, D. Provable Data Possession at Untrusted Stores. In CCS. 2007.
[8]
Blue Cloud. http://www-03.ibm.com/press/us/en/pressrelease/26642.wss.
[9]
Boneh, B., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. Public Key Encryption with Keyword Search. In EUROCRYPT. 2004.

[10]
Boneh, D and Waters, B. Conjunctive, Subset, and Range Queries on Encrypted Data. In The Fourth Theory of Cryptography Conference (TCC 2007), 2007.
[11]
Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M. Private Information Retrieval. J. ACM, 45, 6 (1998), 965-981.
[12]
CLOIDIFIN. http://community.zdnet.co.uk/blog/0,1000000567,2000625196b,00.htm?new_comment.
[13]
Cloud Bursts as Coghead Calls It Quits. http://blogs.zdnet.com/collaboration/?p=349.
[14]
Cloud computing: Don't get caught without an exit strategy. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9128665&source=NLT_AM.
[15]
Disaster-Proofing The Cloud. http://www.forbes.com/2008/11/24/cio-cloud-disaster-tech-cio-cx_dw_1125cloud.html.
[16]
Don’t cloud your vision. http://www.ft.com/cms/s/0/303680a6-bf51-11dd-ae63-0000779fd18c.html?nclick_check=1.
[17]
EMC, Information-Centric Security. http://www.idc.pt/resources/PPTs/2007/IT&Internet_Security/12.EMC.pdf.
[18]
End-User Privacy in Human–Computer Interaction. http://www.cs.cmu.edu/~jasonh/publications/fnt-end-user-privacy-in-human-computer-interaction-final.pdf.
[19]
ESG White Paper, The Information-Centric Security Architecture. http://japan.emc.com/collateral/analyst-reports/emc-white-paper-v4-4-21-2006.pdf.
[20]
Extended Gmail outage hits Apps admins. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9117322.
[21]
Facebook users suffer viral surge. http://news.bbc.co.uk/2/hi/technology/7918839.stm.
[22]
FlexiScale Suffers 18-Hour Outage. http://www.thewhir.com/web-hosting-news/103108_FlexiScale_Suffers_18_Hour_Outage.
[23]
FTC questions cloud-computing security. http://news.cnet.com/8301-13578_3-10198577-38.html?part=rss&subj=news&tag=2547-1_3-0-20.
[24]
Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In STOC. 2009.
[25]
GoGrid API. http://www.gogrid.com/company/press-releases/gogrid-moves-api-specification-to-creativecommons.php.
[26]
Google Docs Glitch Exposes Private Files. http://www.pcworld.com/article/160927/google_docs_glitch_exposes_private_files.html.
[27]
Google's response to Google Docs concerns. http://googledocs.blogspot.com/2009/03/just-to-clarify.html.
[28]
How to Secure Cloud Computing. http://searchsecurity.techtarget.com/magOnline/0,sid14_gci1349550,00.html.
[29]
IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. http://blogs.idc.com/ie/?p=210.
[30]
Latest cloud storage hiccups prompts data security questions.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130682&source=NLT_PM.
[31]
Lithuania Weathers Cyber Attack, Braces for Round 2. http://blog.washingtonpost.com/securityfix/2008/07/lithuania_weathers_cyber_attac_1.html.
[32]
Loss of customer data spurs closure of online storage service 'The Linkup'. http://www.networkworld.com/news/2008/081108-linkup-failure.html?page=1.
[33]
Narayanan, A. and Shmatikov, V. Robust De-anonymization of Large Sparse Datasets. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 2008.
[34]
Netflix Prize. http://www.netflixprize.com/.
[35]
Organizations urge Google to suspend GMail. http://www.privacyrights.org/ar/GmailLetter.htm.
[36]
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf.
[37]
Salesforce.com Warns Customers of Phishing Scam. http://www.pcworld.com/businesscenter/article/139353/salesforcecom_warns_customers_of_phishing_scam.html.
[38]
Security Evaluation of Grid Environments. https://hpcrd.lbl.gov/HEPCybersecurity/HEP-Sec-Miller-Mar2005.ppt.
[39]
Security Guidance for Critical Areas of Focus in Cloud Computing. http://www.cloudsecurityalliance.org/guidance/csaguide.pdf.
[40]
Security issues with Google Docs. http://peekay.org/2009/03/26/security-issues-with-google-docs/.
[41]
Shen, E., Shi, E., and Waters, B. Predicate Privacy in Encryption Systems. In TCC. 2009.
[42]
Shi, E. Bethencourt, J., Chan, H., Song, D., and Perrig, A. Multi-Dimensional Range Query over Encrypted Data. In IEEE Symposium on Security and Privacy. 2007.
[43]
Song, D., Wagner, D., and Perrig, A. Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Research in Security and Privacy. 2000.
[44]
Storm clouds ahead. http://www.networkworld.com/news/2009/030209-soa-cloud.html?page=1.
[45]
Sweeney, L. Weaving technology and policy together. J. of Law, Medicine and Ethics, 25, 2-3 (1997).
[46]
Third Brigade. http://www.thirdbrigade.com.
[47]
VirtualPC vulnerability. http://www.microsoft.com/technet/security/bulletin/ms07-049.mspx.
[48]
VMWare vulnerability. http://securitytracker.com/alerts/2008/Feb/1019493.html.
[49]
Waters, B. and Shacham, H. Compact Proofs of Retrievability. In ASIACRYPT. 2008.
[50]
Why Google Apps is not being adopted. http://money.cnn.com/2008/08/19/technology/google_apps.fortune/index.htm.
[51]
Xen vulnerability. http://secunia.com/advisories/26986/.

No comments:

Post a Comment