130 c barron h yu and j zhan cloud computing sec

This preview shows page 106 - 109 out of 110 pages.

[130] C. Barron, H. Yu, and J. Zhan, “Cloud Computing Sec urity Case Studies and Research, World Congress on Engineering , vol 2, London U.K, 2013. [131] J. Ryoo, S. Rizvi, W. Aiken, and J. Kissell, “Cloud Security Auditing: Challenges and Emerging Approa ches,” IEEE Secur. Priv. , vol. 12 (6), Nov. 2014, pp. 68 74. [132] Q. Liu, G. Wang, and J. Wu, “Time -based proxy re-encryption scheme for secure data sharing in a cloud environment,” Inf. Sci. (Ny). , vol. 258, Feb. 2014, pp. 355 370. [133] What is Two Factor Authentication?, SecurEnvoy. [Online]. Available:
97 . [Accessed: 15 Mar. 2017]. [134] SAML 101: What It Is, How It Works, Why It’s Important - YouTube.” [Online]. Available: . [135] How do companies like Okta provide Single Sign On SSO to so many different cloud services? - Quora. [Online]. Available: - Sign-On-SSO-to-so-many-different-cloud-services. [136] T. Gross, “Security analysis of the SAML single sign - on browser/artifact profile,” in 19th Annual Computer Security Applications Conf. , 2003, pp. 298 307. [137] P.A. Cabarcos, F. Almenares, R. Sanchez Guerrero, A. Marin, and D. Diaz- Sanchez, “Multi -device Single Sign-on fo r cloud service continuity,” IEEE Intl. Conf. on Consumer Electronics (ICCE) , 2012, pp. 644 645. [138] V.O. Safonov, Using aspect-oriented programming for trustworthy software development . Wiley- Interscience, 2008. [139] L. Coppolino, S. D’Antonio, G. Mazzeo, and L. Romano, “Cloud security: Emerging threats and current solutions,” Comput. Electr. Eng. , Mar. 2016. [140] R. Sood and S. Garg, “A Novel Approach to Data Filtration against Packet Flooded Attacks in Cl oud Service,” J. Netw. Commun. Emerg. Technol. , vol. 6 (5), 2016. [141] L. Yang, T. Zhang, J. Song, J. S. Wang, and P. Chen, “Defense of DDoS attack for cloud computing,” IEEE Intl. Conf. on Computer Science and Automation Engineering (CSAE) , pp. 626 629, 2012. [142] Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou, and W. Powell, “Catch Me If You Can: A Cloud- Enabled DDoS Defense," 44 th Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks , 2014, pp. 264 275.
98 [143] J. B. Hong and D. S. Kim, “Assessi ng the Effectiveness of Moving Target Defenses Using Security Models,” IEEE Trans. Dependable Secur. Comput. , vol. 13 (2), Mar. 2016, pp. 163 177. [144] V. Heydari . and S.-M. Yoo, “Securing Critical Infrastructure by Moving Target Defense,” 11 th Intl. Conf. on Cyber Warfare & Security (ICCWS) , 2016. [145] G. Cai, B. Wang, Y. Luo, S. Li, and X. Wang, “Characterizing the running patterns of Moving Target Defense mechanisms,” 18 th Intl. Conf. on Advanced Communication Technology (ICACT) , 2016, pp. 1 2. [146] J. Shao, Z. Cao, X. Liang, and H. Lin, “Proxy re - encryption with keyword search,” Inf. Sci. (Ny). , vol. 180 (13), July 2010, pp. 2576 2587. [147] Y. Yang, H. Zhu, H. Lu, J. Weng, Y. Zhang, and K.- K. R. Choo, “Cloud -based data sharing with fine-grained proxy re- encryption,” Pervasive Mob. Comput. , vol. 28, Jun. 2016, pp. 122 134.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture