A survey on security issues in service delivery models of cloud computing

S Subashini, V Kavitha - Journal of network and computer applications, 2011 - Elsevier
Cloud computing is a way to increase the capacity or add capabilities dynamically without
investing in new infrastructure, training new personnel, or licensing new software. It extends …

Cloud computing features, issues, and challenges: a big picture

D Puthal, BPS Sahoo, S Mishra… - 2015 International …, 2015 - ieeexplore.ieee.org
Since the phenomenon of cloud computing was proposed, there is an unceasing interest for
research across the globe. Cloud computing has been seen as unitary of the technology that …

On technical security issues in cloud computing

M Jensen, J Schwenk, N Gruschka… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
The Cloud Computing concept offers dynamically scalable resources provisioned as a
service over the Internet. Economic benefits are the main driver for the Cloud, since it …

All your clouds are belong to us: security analysis of cloud management interfaces

J Somorovsky, M Heiderich, M Jensen… - Proceedings of the 3rd …, 2011 - dl.acm.org
Cloud Computing resources are handled through control interfaces. It is through these
interfaces that the new machine images can be added, existing ones can be modified, and …

Vulnerable cloud: Soap message security validation revisited

N Gruschka, LL Iacono - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
The service-oriented architecture paradigm is influencing modern software systems
remarkably and Web services are a common technology to implement such systems …

On breaking {SAML}: Be whoever you want to be

J Somorovsky, A Mayer, J Schwenk… - 21st USENIX Security …, 2012 - usenix.org
The Security Assertion Markup Language (SAML) is a widely adopted language for making
security statements about subjects. It is a critical component for the development of …

Analysis of signature wrapping attacks and countermeasures

S Gajek, M Jensen, L Liao… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
In recent research it turned out that Boolean verification of digital signatures in the context of
WS-Security is likely to fail: If parts of a SOAP message are signed and the signature …

New approach for ensuring cloud computing security: using data hiding methods

M Yesilyurt, Y Yalman - Sādhanā, 2016 - Springer
Cloud computing is one of the largest developments occurred in the field of information
technology during recent years. This model has become more desirable for all institutions …

[PDF][PDF] Security challenges in cloud computing with more emphasis on trust and privacy

FS Gharehchopogh, S Hashemi - International Journal of Scientific & …, 2012 - Citeseer
Cloud computing is known as the newest technologies in IT field which causes some worries
for consumers and its producers due to its novelty. Looking at its literature, we can see the …

On the effectiveness of xml schema validation for countering xml signature wrapping attacks

M Jensen, C Meyer, J Somorovsky… - 2011 1st International …, 2011 - ieeexplore.ieee.org
In the context of security of Web Services, the XML Signature Wrapping attack technique has
lately received increasing attention. Following a broad range of real-world exploits, general …