From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Cloud computing security risks with authorization access for secure multi-tenancy based on AAAS protocol

SK Abd, RT Salih, SAR Al-Haddad… - TENCON 2015-2015 …, 2015 - ieeexplore.ieee.org
Many cloud security complexities can be concerned as a result of its open system
architecture. One of these complexities is multi-tenancy security issue. This paper discusses …

[PDF][PDF] Trusted cloud computing frame work in critical industrial application

MA Bamiah - 2015 - eprints.utm.my
Cloud computing facilitates instant online unlimited access to data and computing
resources, ubiquitously and pervasively through its various service delivery and deployment …

[PDF][PDF] Framework using Multitenancy Architecture in Cloud Computing

A Wadhwa, S Gupta - International Journal of Computer Applications, 2015 - Citeseer
As we all know Cloud computing is an emerging field in the world of computation and
security of the data must be confined over the network. There are some security issues …

[PDF][PDF] Requirements capture and comparative analysis of cloud security techniques

M Medhioub, M Hamdi, TH Kim - International Journal of Grid and …, 2015 - researchgate.net
Convergence and ubiquity are the key characteristics of tomorrow's service provision
infrastructures. Today, Cloud architectures offer cost-efficient backbones that support …

Security of Cloud Computing

M Medhioub, M Abdelkader, M Hamdi - Encyclopedia of Information …, 2015 - igi-global.com
Cloud computing is clearly one of today's most enticing technology areas due, at least in
part, to its costefficiency and flexibility. This technology holds the potential to eliminate the …

OAuthHub-A Service for Consolidating Authentication Services

X Chen, G Sime, C Lutteroth… - 2015 IEEE 19th …, 2015 - ieeexplore.ieee.org
OAuth has become a widespread authorization protocol to allow inter-enterprise sharing of
user preferences and data: a Consumer that wants access to a user's protected resources …