The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (vol. 8)
ISSN: 1540-7993
From the Editors

Sailing Away! (HTML)

Carl E. Landwehr , University of Maryland
pp. 3-4
In Memoriam

In Memoriam: Paul Karger (HTML)

Roger Schell , AESEC
Steve Lipner , Microsoft
Carl E. Landwehr , University of Maryland
pp. 5
News Briefs

News Briefs (HTML)

pp. 7-8
Cloud Computing

Cloud Computing Roundtable (Abstract)

Eric Grosse , Google
John Howie , Microsoft
Jim Reavis , Cloud Security Alliance
Steve Schmidt , Amazon Web Services
pp. 17-23

Security and Privacy Challenges in Cloud Computing Environments (Abstract)

Hassan Takabi , University of Pittsburgh
James B.D. Joshi , University of Pittsburgh
Gail-Joon Ahn , Arizona State University
pp. 24-31

Cloud Provider Transparency: An Empirical Evaluation (Abstract)

Wayne Pauley , EMC Corporation, Hopkinton
pp. 32-39

Side Channels in Cloud Services: Deduplication in Cloud Storage (Abstract)

Danny Harnik , IBM Haifa Research Lab
Benny Pinkas , Bar Ilan University
Alexandra Shulman-Peleg , IBM Haifa Research Lab
pp. 40-47

Toward a Multi-Tenancy Authorization System for Cloud Services (Abstract)

Jose M. Alcaraz Calero , Hewlett-Packard Labs and the University of Murcia
Nigel Edwards , Hewlett-Packard Labs
Johannes Kirschnick , Hewlett-Packard Labs
Lawrence Wilcock , Hewlett-Packard Labs
Mike Wray , Hewlett-Packard Labs
pp. 48-55

New Pathways in Identity Management (Abstract)

Paul C. Clark , Naval Postgraduate School
Glenn R. Cook , Naval Postgraduate School
Edward L. Fisher , Naval Postgraduate School
John D. Fulp , Naval Postgraduate School
Valerie Linhoff , Naval Postgraduate School
Cynthia E. Irvine , Naval Postgraduate School
pp. 64-67
Privacy Interests

Government Access to Private-Sector Data (Abstract)

Fred H. Cate , Indiana University
pp. 68-71
Crypto Corner

The First 10 Years of Advanced Encryption (Abstract)

Joan Daemen , STMicroelectronics
Vincent Rijmen , Katholieke Universiteit Leuven
pp. 72-74
Basic Training

Secure Multimedia Communications (Abstract)

Liam M. Mayron , Harris Corporation
pp. 76-79
Attack Trends

Splitting the HTTPS Stream to Attack Secure Web Connections (Abstract)

Marco Prandini , University of Bologna
Marco Ramilli , University of Bologna
Walter Cerroni , University of Bologna
Franco Callegati , University of Bologna
pp. 80-84
Secure Systems

Logical Methods in Security and Privacy (Abstract)

Anupam Datta , Carnegie Mellon University
pp. 86-89
Security & Privacy Economics

Identity Management's Misaligned Incentives (Abstract)

Jean Camp , Indiana University
pp. 90-94
For Good Measure

An Index of Cybersecurity (Abstract)

pp. 96, 95
87 ms
(Ver 3.3 (11022016))