Cloud computing security (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Cloud computing security" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
1st place
1st place
5th place
5th place
low place
low place
low place
low place
low place
low place
105th place
79th place
low place
low place
low place
low place
low place
low place
153rd place
151st place
low place
low place
low place
low place
low place
low place
low place
low place
3,696th place
2,428th place
low place
low place
low place
low place
102nd place
76th place
18th place
17th place
low place
low place
low place
low place
low place
low place
1,031st place
879th place
low place
8,900th place
low place
low place
low place
low place
low place
low place
low place
low place
1,041st place
733rd place
low place
low place
low place
low place
6,805th place
4,220th place
6,278th place
3,907th place

amazon.com (Global: 105th place; English: 79th place)

docs.aws.amazon.com

aws.amazon.com

apu.edu.my (Global: low place; English: low place)

archives-ouvertes.fr (Global: 1,031st place; English: 879th place)

hal.archives-ouvertes.fr

askdataentry.com (Global: low place; English: low place)

ciphercloud.com (Global: low place; English: low place)

cloudsecurityalliance.org (Global: low place; English: low place)

crowdstrike.com (Global: low place; English: low place)

dell.com (Global: 6,805th place; English: 4,220th place)

content.dell.com

doi.org (Global: 2nd place; English: 2nd place)

f5.com (Global: low place; English: low place)

fortra.com (Global: low place; English: low place)

dataclassification.fortra.com

gcn.com (Global: low place; English: low place)

guidepointsecurity.com (Global: low place; English: low place)

handle.net (Global: 102nd place; English: 76th place)

hdl.handle.net

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

infoworld.com (Global: 3,696th place; English: 2,428th place)

intertrust.com (Global: low place; English: low place)

itsecure.hu (Global: low place; English: low place)

kiteworks.com (Global: low place; English: low place)

lifars.com (Global: low place; English: low place)

microsoft.com (Global: 153rd place; English: 151st place)

technet.microsoft.com

murdoch.edu.au (Global: 6,278th place; English: 3,907th place)

researchrepository.murdoch.edu.au

nutanix.com (Global: low place; English: low place)

paloaltonetworks.com (Global: low place; English: low place)

pubnub.com (Global: low place; English: low place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Haghighat, Mohammad; Zonouz, Saman; Abdel-Mottaleb, Mohamed (November 2015). "CloudID: Trustworthy cloud-based and cross-enterprise biometric identification". Expert Systems with Applications. 42 (21): 7905–7916. doi:10.1016/j.eswa.2015.06.025. S2CID 30476498.
  • Srinivasan, Madhan Kumar; Sarukesi, K.; Rodrigues, Paul; Manoj, M. Sai; Revathy, P. (2012). "State-of-the-art cloud computing security taxonomies". Proceedings of the International Conference on Advances in Computing, Communications and Informatics - ICACCI '12. pp. 470–476. doi:10.1145/2345396.2345474. ISBN 978-1-4503-1196-0. S2CID 18507025.
  • Guarda, Teresa; Orozco, Walter; Augusto, Maria Fernanda; Morillo, Giovanna; Navarrete, Silvia Arévalo; Pinto, Filipe Mota (2016). "Penetration Testing on Virtual Environments". Proceedings of the 4th International Conference on Information and Network Security – ICINS '16. pp. 9–12. doi:10.1145/3026724.3026728. ISBN 978-1-4503-4796-9. S2CID 14414621.
  • Svantesson, Dan; Clarke, Roger (July 2010). "Privacy and consumer risks in cloud computing". Computer Law & Security Review. 26 (4): 391–397. doi:10.1016/j.clsr.2010.05.005. hdl:1885/57037. S2CID 62515390.
  • Grobauer, Bernd; Walloschek, Tobias; Stocker, Elmar (March 2011). "Understanding Cloud Computing Vulnerabilities". IEEE Security & Privacy. 9 (2): 50–57. Bibcode:2011ISPri...9b..50G. doi:10.1109/MSP.2010.115. S2CID 1156866.
  • Rukavitsyn, Andrey N.; Borisenko, Konstantin A.; Holod, Ivan I.; Shorov, Andrey V. (2017). "A cloud computing security solution based on fully homomorphic encryption". 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM). pp. 272–274. doi:10.1109/SCM.2017.7970558. ISBN 978-1-5386-1810-3. S2CID 40593182.
  • Xu, Shengmin; Yuan, Jiaming; Xu, Guowen; Li, Yingjiu; Liu, Ximeng; Zhang, Yinghui; Ying, Zuobin (October 2020). "Efficient ciphertext-policy attribute-based encryption with black-box traceability". Information Sciences. 538: 19–38. doi:10.1016/j.ins.2020.05.115. S2CID 224845384.
  • Bethencourt, John; Sahai, Amit; Waters, Brent (May 2007). "Ciphertext-Policy Attribute-Based Encryption" (PDF). 2007 IEEE Symposium on Security and Privacy (SP '07). pp. 321–334. doi:10.1109/SP.2007.11. ISBN 978-0-7695-2848-9. S2CID 6282684.
  • Wang, Chang-Ji; Luo, Jian-Fa (November 2012). "A Key-Policy Attribute-Based Encryption Scheme with Constant Size Ciphertext". 2012 Eighth International Conference on Computational Intelligence and Security. pp. 447–451. doi:10.1109/CIS.2012.106. ISBN 978-1-4673-4725-9. S2CID 1116590.
  • Naveed, Muhammad; Prabhakaran, Manoj; Gunter, Carl A. (2014). "Dynamic Searchable Encryption via Blind Storage". 2014 IEEE Symposium on Security and Privacy. pp. 639–654. doi:10.1109/SP.2014.47. ISBN 978-1-4799-4686-0. S2CID 10910918.

smu.edu.sg (Global: low place; English: low place)

ink.library.smu.edu.sg

sys-con.com (Global: low place; English: low place)

security.sys-con.com

technologyslegaledge.com (Global: low place; English: low place)

utwente.nl (Global: low place; English: 8,900th place)

ris.utwente.nl

virginia.edu (Global: 1,041st place; English: 733rd place)

security.virginia.edu

vulcan.io (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

wiz.io (Global: low place; English: low place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org