Skip to content

Advertisement

Security in Cloud Computing

Mr Martin Gilje Jaatun, Costas Lambrinoudakis, Prof Chunming Rong

  1. Content type: Research

    This article presents an approach to handle compromised components in the OpenStack Infrastructure-as-a-Service cloud environment. We present two specific use cases; a compromised service process and the intro...

    Authors: Aryan TaheriMonfared and Martin Gilje Jaatun

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:16

    Published on:

  2. Content type: Editorial

    This special issue presents extended and revised versions of distinguished papers presented at the security & privacy track of the 3rd IEEE International Conference on Cloud Computing Technology and Science (I...

    Authors: Martin Gilje Jaatun, Costas Lambrinoudakis and Chunming Rong

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:17

    Published on:

  3. Content type: Research

    With looming patent cliffs, resulting in no patent protections for several block buster drugs, several Life sciences organizations are looking at ways to reduce the costs of drug discovery. They are looking to...

    Authors: Vikas Saxena, Shyam Kumar Doddavula and Akansha Jain

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:14

    Published on:

  4. Content type: Research

    This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segme...

    Authors: Martin Gilje Jaatun, Gansen Zhao, Athanasios V Vasilakos, Åsmund Ahlmann Nyre, Stian Alapnes and Yong Tang

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:13

    Published on:

  5. Content type: Research

    A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permission...

    Authors: Roland Schwarzkopf, Matthias Schmidt, Christian Strack, Simon Martin and Bernd Freisleben

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:12

    Published on:

  6. Content type: Research

    Classic intrusion detection mechanisms are not flexible enough to cope with cloud specific characteristics such as frequent infrastructure changes. This makes them unable to address new cloud specific security...

    Authors: Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfall and Nathan Clarke

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:9

    Published on:

  7. Content type: Research

    The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cl...

    Authors: Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:11

    Published on:

  8. Content type: Research

    Recommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that a user will give to an item given the ratings of other items provided by other users. While r...

    Authors: Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos and Srijith K Nair

    Citation: Journal of Cloud Computing: Advances, Systems and Applications 2012 1:8

    Published on: