The Cloud Security Ecosystem最新文献

筛选
英文 中文
Conceptual evidence collection and analysis methodology for Android devices Android设备的概念证据收集和分析方法
The Cloud Security Ecosystem Pub Date : 2015-06-18 DOI: 10.1016/B978-0-12-801595-7.00014-8
Ben Martini, Quang Do, Kim-Kwang Raymond Choo
{"title":"Conceptual evidence collection and analysis methodology for Android devices","authors":"Ben Martini, Quang Do, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-801595-7.00014-8","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00014-8","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Tool-based risk assessment of cloud infrastructures as socio-technical systems 云基础设施作为社会技术系统的基于工具的风险评估
The Cloud Security Ecosystem Pub Date : 2015-06-03 DOI: 10.1016/B978-0-12-801595-7.00022-7
M. Nidd, M. Ivanova, Christian W. Probst, A. Tanner
{"title":"Tool-based risk assessment of cloud infrastructures as socio-technical systems","authors":"M. Nidd, M. Ivanova, Christian W. Probst, A. Tanner","doi":"10.1016/B978-0-12-801595-7.00022-7","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00022-7","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recovering residual forensic data from smartphone interactions with cloud storage providers 从智能手机与云存储提供商的交互中恢复残留的取证数据
The Cloud Security Ecosystem Pub Date : 2015-06-01 DOI: 10.1016/B978-0-12-801595-7.00016-1
George Grispos, W. Glisson, Tim Storer
{"title":"Recovering residual forensic data from smartphone interactions with cloud storage providers","authors":"George Grispos, W. Glisson, Tim Storer","doi":"10.1016/B978-0-12-801595-7.00016-1","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00016-1","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Protection through isolation: Virtues and pitfalls 隔离保护:优点和缺点
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00006-9
Johanna Ullrich, E. Weippl
{"title":"Protection through isolation: Virtues and pitfalls","authors":"Johanna Ullrich, E. Weippl","doi":"10.1016/B978-0-12-801595-7.00006-9","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00006-9","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud security and forensic readiness: The current state of an IaaS provider 云安全和取证准备:IaaS提供商的当前状态
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00018-5
Chaz Vidal, Kim-Kwang Raymond Choo
{"title":"Cloud security and forensic readiness: The current state of an IaaS provider","authors":"Chaz Vidal, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-801595-7.00018-5","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00018-5","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting digital identity in the cloud 保护云中的数字身份
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00007-0
Clare Sullivan
{"title":"Protecting digital identity in the cloud","authors":"Clare Sullivan","doi":"10.1016/B978-0-12-801595-7.00007-0","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00007-0","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"77 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Governance in the Cloud 云中的治理
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00020-3
S. Honig
{"title":"Governance in the Cloud","authors":"S. Honig","doi":"10.1016/B978-0-12-801595-7.00020-3","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00020-3","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keeping users empowered in a cloudy Internet of Things 让用户在多云的物联网中保持活力
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00011-2
Stefanie Gerdes, C. Bormann, O. Bergmann
{"title":"Keeping users empowered in a cloudy Internet of Things","authors":"Stefanie Gerdes, C. Bormann, O. Bergmann","doi":"10.1016/B978-0-12-801595-7.00011-2","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00011-2","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud as infrastructure for managing complex scalable business networks, privacy perspective 云作为管理复杂可扩展业务网络的基础设施,从隐私的角度来看
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00012-4
Abdussalam Ali, I. Hawryszkiewycz
{"title":"Cloud as infrastructure for managing complex scalable business networks, privacy perspective","authors":"Abdussalam Ali, I. Hawryszkiewycz","doi":"10.1016/B978-0-12-801595-7.00012-4","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00012-4","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitiered cloud security model 多层云安全模型
The Cloud Security Ecosystem Pub Date : 1900-01-01 DOI: 10.1016/B978-0-12-801595-7.00004-5
Hing-Yan Lee, Yao-Sing Tao
{"title":"Multitiered cloud security model","authors":"Hing-Yan Lee, Yao-Sing Tao","doi":"10.1016/B978-0-12-801595-7.00004-5","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00004-5","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115765141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信