Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds (English)
- New search for: Paladi, Nicolae
- New search for: Gehrmann, Christian
- New search for: Morenius, Fredric
- New search for: Paladi, Nicolae
- New search for: Gehrmann, Christian
- New search for: Morenius, Fredric
In:
NordSec, Nordic Conference on Secure IT Systems, 18
;
279-296
;
2013
-
ISSN:
- Conference paper / Print
-
Title:Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 8208 ; 279-296
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNsMauro, Alessio Di / Fafoutis, Xenofon / Mödersheim, Sebastian / Dragoni, Nicola et al. | 2013
- 1
-
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy WSNsDi Mauro, A. / Fafoutis, X. / Modersheim, S. / Dragoni, N. et al. | 2013
- 17
-
Security Games for Cyber-Physical SystemsVigo, R. / Bruni, A. / Yuksel, E. et al. | 2013
- 33
-
Prevent Session Hijacking by Binding the Session to the Cryptographic Network CredentialsBrugers, W. / Verdult, R. / van Eekelen, M. et al. | 2013
- 51
-
Inferring Required Permissions for Statically Composed ProgramsHasu, T. / Bagge, A.H. / Haveraaen, M. et al. | 2013
- 67
-
SafeScript: JavaScript Transformation for Policy EnforcementLouw, M.T. / Phung, P.H. / Krishnamurti, R. / Venkatakrishnan, V.N. et al. | 2013
- 84
-
A Logic for Information Flow Analysis of Distributed ProgramsBalliu, M. et al. | 2013
- 100
-
Dynamics and Secure Information Flow for a Higher-Order Pi-CalculusPettai, M. / Laud, P. et al. | 2013
- 116
-
Lazy Programs Leak SecretsBuiras, P. / Russo, A. et al. | 2013
- 123
-
High-Performance Qualified Digital Signatures for X-RoadAnsper, A. / Buldas, A. / Freudenthal, M. / Willemson, J. et al. | 2013
- 139
-
Identification and Evaluation of Security Activities in Agile ProjectsAyalew, T. / Kidane, T. / Carlsson, B. et al. | 2013
- 154
-
PeerShare: A System Secure Distribution of Sensitive Data among Social ContactsNagy, M. / Asokan, N. / Ott, J. et al. | 2013
- 166
-
Resilience of Process Control Systems to Cyber-Physical AttacksKrotofil, M. / Cardenas, A.A. et al. | 2013
- 183
-
Femtocell Security in Theory and Practicevan den Broek, F. / Schreur, R.W. et al. | 2013
- 199
-
Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation TechniquesAntonini, A. / Barenghi, A. / Pelosi, G. et al. | 2013
- 215
-
Controlling Data Flow with a Policy-Based Programming Language for the WebSans, T. / Cervesato, I. / Hussein, S. et al. | 2013
- 231
-
A Survey on Control-Flow Integrity Means in Web Application FrameworksBraun, B. / Pollak, C.v. / Posegga, J. et al. | 2013
- 247
-
Incremental Hyperproperty Model Checking via GamesMilushev, D. / Clarke, D. et al. | 2013
- 263
-
Graph k-Anonymity through k-Means and as Modular DecompositionStokes, K. et al. | 2013
- 279
-
Domain-Based Storage Protection (DBSP) in Public Infrastructure CloudsPaladi, N. / Gehrmann, C. / Morenius, F. et al. | 2013
- 297
-
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS PoliciesHachem, N. / Garcia-Alfaro, J. / Debar, H. et al. | 2013
- 313
-
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-TreesBuldas, A. / Kroonmaa, A. / Laanoja, R. et al. | 2013