Skip to main content

Security in cloud computing

Edited by: Martin Gilje Jaatun, Costas Lambrinoudakis and Chunming Rong

  1. This special issue presents extended and revised versions of distinguished papers presented at the security & privacy track of the 3rd IEEE International Conference on Cloud Computing Technology and Science (I...

    Authors: Martin Gilje Jaatun, Costas Lambrinoudakis and Chunming Rong
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:17
  2. This article presents an approach to handle compromised components in the OpenStack Infrastructure-as-a-Service cloud environment. We present two specific use cases; a compromised service process and the intro...

    Authors: Aryan TaheriMonfared and Martin Gilje Jaatun
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:16
  3. With looming patent cliffs, resulting in no patent protections for several block buster drugs, several Life sciences organizations are looking at ways to reduce the costs of drug discovery. They are looking to...

    Authors: Vikas Saxena, Shyam Kumar Doddavula and Akansha Jain
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:14
  4. This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segme...

    Authors: Martin Gilje Jaatun, Gansen Zhao, Athanasios V Vasilakos, Ã…smund Ahlmann Nyre, Stian Alapnes and Yong Tang
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:13
  5. A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permission...

    Authors: Roland Schwarzkopf, Matthias Schmidt, Christian Strack, Simon Martin and Bernd Freisleben
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:12
  6. The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cl...

    Authors: Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:11
  7. Classic intrusion detection mechanisms are not flexible enough to cope with cloud specific characteristics such as frequent infrastructure changes. This makes them unable to address new cloud specific security...

    Authors: Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfall and Nathan Clarke
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:9
  8. Recommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that a user will give to an item given the ratings of other items provided by other users. While r...

    Authors: Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos and Srijith K Nair
    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:8