{"title":"Security as a service (SecaaS) - An overview","authors":"Baden Delamore, R. Ko","doi":"10.1016/B978-0-12-801595-7.00009-4","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00009-4","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model","authors":"N. H. A. Rahman, Kim-Kwang Raymond Choo","doi":"10.1016/B978-0-12-801595-7.00017-3","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00017-3","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheikh Mahbub Habib, Florian Volk, S. Hauke, M. Mühlhäuser
{"title":"Computational trust methods for security quantification in the cloud ecosystem","authors":"Sheikh Mahbub Habib, Florian Volk, S. Hauke, M. Mühlhäuser","doi":"10.1016/B978-0-12-801595-7.00021-5","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00021-5","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure migration to the cloud - In and out","authors":"Thomas Kemmerich, V. Agrawal, C. Momsen","doi":"10.1016/B978-0-12-801595-7.00010-0","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00010-0","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provenance for cloud data accountability","authors":"Yu Shyang Tan, R. Ko, G. Holmes, Bill Rogers","doi":"10.1016/B978-0-12-801595-7.00008-2","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00008-2","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviors","authors":"G. Kirwan","doi":"10.1016/B978-0-12-801595-7.00013-6","DOIUrl":"https://doi.org/10.1016/B978-0-12-801595-7.00013-6","url":null,"abstract":"","PeriodicalId":310973,"journal":{"name":"The Cloud Security Ecosystem","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}