M. Nidd, M. Ivanova, Christian W. Probst, A. Tanner
{"title":"Tool-based risk assessment of cloud infrastructures as socio-technical systems","authors":"M. Nidd, M. Ivanova, Christian W. Probst, A. Tanner","doi":"10.1016/B978-0-12-801595-7.00022-7","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00022-7","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recovering residual forensic data from smartphone interactions with cloud storage providers","authors":"George Grispos, W. Glisson, Tim Storer","doi":"10.1016/B978-0-12-801595-7.00016-1","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00016-1","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection through isolation: Virtues and pitfalls","authors":"Johanna Ullrich, E. Weippl","doi":"10.1016/B978-0-12-801595-7.00006-9","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00006-9","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud security and forensic readiness: The current state of an IaaS provider","authors":"Chaz Vidal, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-801595-7.00018-5","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00018-5","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting digital identity in the cloud","authors":"Clare Sullivan","doi":"10.1016/B978-0-12-801595-7.00007-0","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00007-0","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"77 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governance in the Cloud","authors":"S. Honig","doi":"10.1016/B978-0-12-801595-7.00020-3","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00020-3","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keeping users empowered in a cloudy Internet of Things","authors":"Stefanie Gerdes, C. Bormann, O. Bergmann","doi":"10.1016/B978-0-12-801595-7.00011-2","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00011-2","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud as infrastructure for managing complex scalable business networks, privacy perspective","authors":"Abdussalam Ali, I. Hawryszkiewycz","doi":"10.1016/B978-0-12-801595-7.00012-4","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00012-4","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}