Cloud computing security (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Cloud computing security" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
1st place
1st place
low place
low place
low place
low place
105th place
79th place
low place
low place
low place
low place
153rd place
151st place
low place
low place
low place
low place
low place
low place
low place
low place
3,696th place
2,428th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
207th place
136th place
102nd place
76th place
4th place
4th place
low place
low place
1,031st place
879th place
low place
8,900th place
low place
low place
6,805th place
4,220th place
6,278th place
3,907th place

amazon.com (Global: 105th place; English: 79th place)

docs.aws.amazon.com

apu.edu.my (Global: low place; English: low place)

archives-ouvertes.fr (Global: 1,031st place; English: 879th place)

hal.archives-ouvertes.fr

certmike.com (Global: low place; English: low place)

ciphercloud.com (Global: low place; English: low place)

cloudsecurityalliance.org (Global: low place; English: low place)

darkreading.com (Global: low place; English: low place)

dell.com (Global: 6,805th place; English: 4,220th place)

content.dell.com

doi.org (Global: 2nd place; English: 2nd place)

f5.com (Global: low place; English: low place)

gcn.com (Global: low place; English: low place)

guidepointsecurity.com (Global: low place; English: low place)

handle.net (Global: 102nd place; English: 76th place)

hdl.handle.net

infoworld.com (Global: 3,696th place; English: 2,428th place)

itsecure.hu (Global: low place; English: low place)

lifars.com (Global: low place; English: low place)

microsoft.com (Global: 153rd place; English: 151st place)

technet.microsoft.com

murdoch.edu.au (Global: 6,278th place; English: 3,907th place)

researchrepository.murdoch.edu.au

nih.gov (Global: 4th place; English: 4th place)

ncbi.nlm.nih.gov

paloaltonetworks.com (Global: low place; English: low place)

psu.edu (Global: 207th place; English: 136th place)

citeseerx.ist.psu.edu

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Haghighat, Mohammad; Zonouz, Saman; Abdel-Mottaleb, Mohamed (November 2015). "CloudID: Trustworthy cloud-based and cross-enterprise biometric identification". Expert Systems with Applications. 42 (21): 7905–7916. doi:10.1016/j.eswa.2015.06.025. S2CID 30476498.
  • Srinivasan, Madhan Kumar; Sarukesi, K.; Rodrigues, Paul; Manoj, M. Sai; Revathy, P. (2012). "State-of-the-art cloud computing security taxonomies". Proceedings of the International Conference on Advances in Computing, Communications and Informatics - ICACCI '12. pp. 470–476. doi:10.1145/2345396.2345474. ISBN 978-1-4503-1196-0. S2CID 18507025.
  • Guarda, Teresa; Orozco, Walter; Augusto, Maria Fernanda; Morillo, Giovanna; Navarrete, Silvia Arévalo; Pinto, Filipe Mota (2016). "Penetration Testing on Virtual Environments". Proceedings of the 4th International Conference on Information and Network Security - ICINS '16. pp. 9–12. doi:10.1145/3026724.3026728. ISBN 978-1-4503-4796-9. S2CID 14414621.
  • Tang, Jun; Cui, Yong; Li, Qi; Ren, Kui; Liu, Jiangchuan; Buyya, Rajkumar (28 July 2016). "Ensuring Security and Privacy Preservation for Cloud Data Services". ACM Computing Surveys. 49 (1): 1–39. doi:10.1145/2906153. S2CID 11126705.
  • Tabrizchi, Hamed; Kuchaki Rafsanjani, Marjan (December 2020). "A survey on security challenges in cloud computing: issues, threats, and solutions". The Journal of Supercomputing. 76 (12): 9493–9532. doi:10.1007/s11227-020-03213-1. S2CID 255070071.
  • Carroll, Mariana; van der Merwe, Alta; Kotzé, Paula (August 2011). "Secure cloud computing: Benefits, risks and controls". 2011 Information Security for South Africa. pp. 1–9. CiteSeerX 10.1.1.232.2868. doi:10.1109/ISSA.2011.6027519. ISBN 978-1-4577-1481-8. S2CID 6208118.
  • Svantesson, Dan; Clarke, Roger (July 2010). "Privacy and consumer risks in cloud computing". Computer Law & Security Review. 26 (4): 391–397. doi:10.1016/j.clsr.2010.05.005. hdl:1885/57037. S2CID 62515390.
  • Grobauer, Bernd; Walloschek, Tobias; Stocker, Elmar (March 2011). "Understanding Cloud Computing Vulnerabilities". IEEE Security & Privacy. 9 (2): 50–57. doi:10.1109/MSP.2010.115. S2CID 1156866.
  • Rukavitsyn, Andrey N.; Borisenko, Konstantin A.; Holod, Ivan I.; Shorov, Andrey V. (2017). "The method of ensuring confidentiality and integrity data in cloud computing". 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM). pp. 272–274. doi:10.1109/SCM.2017.7970558. ISBN 978-1-5386-1810-3. S2CID 40593182.
  • Yao, Huiping; Shin, Dongwan (2013). "Towards preventing QR code based attacks on android phone using security warnings". Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13. p. 341. doi:10.1145/2484313.2484357. ISBN 978-1-4503-1767-2. S2CID 1851039.
  • Iqbal, Salman; Mat Kiah, Miss Laiha; Dhaghighi, Babak; Hussain, Muzammil; Khan, Suleman; Khan, Muhammad Khurram; Raymond Choo, Kim-Kwang (October 2016). "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service". Journal of Network and Computer Applications. 74: 98–120. doi:10.1016/j.jnca.2016.08.016. S2CID 9060910.
  • Xu, Shengmin; Yuan, Jiaming; Xu, Guowen; Li, Yingjiu; Liu, Ximeng; Zhang, Yinghui; Ying, Zuobin (October 2020). "Efficient ciphertext-policy attribute-based encryption with blackbox traceability". Information Sciences. 538: 19–38. doi:10.1016/j.ins.2020.05.115. S2CID 224845384.
  • Bethencourt, John; Sahai, Amit; Waters, Brent (May 2007). "Ciphertext-Policy Attribute-Based Encryption" (PDF). 2007 IEEE Symposium on Security and Privacy (SP '07). pp. 321–334. doi:10.1109/SP.2007.11. ISBN 978-0-7695-2848-9. S2CID 6282684.
  • Wang, Changji; Luo, Jianfa (2013). "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length". Mathematical Problems in Engineering. 2013: 1–7. doi:10.1155/2013/810969. S2CID 55470802.
  • Wang, Chang-Ji; Luo, Jian-Fa (November 2012). "A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext". 2012 Eighth International Conference on Computational Intelligence and Security. pp. 447–451. doi:10.1109/CIS.2012.106. ISBN 978-1-4673-4725-9. S2CID 1116590.
  • Zhao, Feng; Li, Chao; Liu, Chun Feng (2014). "A cloud computing security solution based on fully homomorphic encryption". 16th International Conference on Advanced Communication Technology. pp. 485–488. doi:10.1109/icact.2014.6779008. ISBN 978-89-968650-3-2. S2CID 20678842.
  • Wang, Qian; He, Meiqi; Du, Minxin; Chow, Sherman S. M.; Lai, Russell W. F.; Zou, Qin (1 May 2018). "Searchable Encryption over Feature-Rich Data". IEEE Transactions on Dependable and Secure Computing. 15 (3): 496–510. doi:10.1109/TDSC.2016.2593444. S2CID 13708908.
  • Naveed, Muhammad; Prabhakaran, Manoj; Gunter, Carl A. (2014). "Dynamic Searchable Encryption via Blind Storage". 2014 IEEE Symposium on Security and Privacy. pp. 639–654. doi:10.1109/SP.2014.47. ISBN 978-1-4799-4686-0. S2CID 10910918.

smu.edu.sg (Global: low place; English: low place)

ink.library.smu.edu.sg

sys-con.com (Global: low place; English: low place)

security.sys-con.com

technologyslegaledge.com (Global: low place; English: low place)

tntu.edu.ua (Global: low place; English: low place)

elartu.tntu.edu.ua

utwente.nl (Global: low place; English: 8,900th place)

ris.utwente.nl

web.archive.org (Global: 1st place; English: 1st place)