Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/books/collections/KC2015.bht:"
@incollection{DBLP:books/el/15/AliH15, author = {Abdussalam Ali and Igor T. Hawryszkiewycz}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Cloud as infrastructure for managing complex scalable business networks, privacy perspective}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {249--267}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00012-4}, doi = {10.1016/B978-0-12-801595-7.00012-4}, timestamp = {Sat, 31 Jul 2021 17:24:19 +0200}, biburl = {https://dblp.org/rec/books/el/15/AliH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/DelamoreK15, author = {Baden Delamore and Ryan K. L. Ko}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Security as a service (SecaaS) - An overview}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {187--203}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00009-4}, doi = {10.1016/B978-0-12-801595-7.00009-4}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/DelamoreK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/GerdesBB15, author = {Stefanie Gerdes and Carsten Bormann and Olaf Bergmann}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Keeping users empowered in a cloudy Internet of Things}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {231--247}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00011-2}, doi = {10.1016/B978-0-12-801595-7.00011-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/GerdesBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/GrisposGS15, author = {George Grispos and William Bradley Glisson and Tim Storer}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Recovering residual forensic data from smartphone interactions with cloud storage providers}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {347--382}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00016-1}, doi = {10.1016/B978-0-12-801595-7.00016-1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/GrisposGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/HabibVHM15, author = {Sheikh Mahbub Habib and Florian Volk and Sascha Hauke and Max M{\"{u}}hlh{\"{a}}user}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Computational trust methods for security quantification in the cloud ecosystem}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {463--493}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00021-5}, doi = {10.1016/B978-0-12-801595-7.00021-5}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/HabibVHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/Honig15, author = {Sai Honig}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Governance in the Cloud}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {449--462}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00020-3}, doi = {10.1016/B978-0-12-801595-7.00020-3}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/Honig15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/JuliadotterC15, author = {Nina Viktoria Juliadotter and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {{CATRA:} Conceptual cloud attack taxonomy and risk assessment framework}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {37--81}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00003-3}, doi = {10.1016/B978-0-12-801595-7.00003-3}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/JuliadotterC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/KemmerichAM15, author = {Thomas Kemmerich and Vivek Agrawal and Carsten Momsen}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Secure migration to the cloud - In and out}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {205--230}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00010-0}, doi = {10.1016/B978-0-12-801595-7.00010-0}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/KemmerichAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/Kirwan15, author = {Grainne Kirwan}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviors}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {269--281}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00013-6}, doi = {10.1016/B978-0-12-801595-7.00013-6}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/Kirwan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/KoC15, author = {Ryan K. L. Ko and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Cloud security ecosystem}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {1--14}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00001-X}, doi = {10.1016/B978-0-12-801595-7.00001-X}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/KoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/Lau15, author = {Yiu Chung Laurie Lau}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Cybercrime in cloud: Risks and responses in Hong Kong, Singapore}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {17--35}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00002-1}, doi = {10.1016/B978-0-12-801595-7.00002-1}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/Lau15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/LeeT15, author = {Hing{-}Yan Lee and Yao{-}Sing Tao}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Multitiered cloud security model}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {83--97}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00004-5}, doi = {10.1016/B978-0-12-801595-7.00004-5}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/LeeT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/MartiniDC15, author = {Ben Martini and Quang Do and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Conceptual evidence collection and analysis methodology for Android devices}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {285--307}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00014-8}, doi = {10.1016/B978-0-12-801595-7.00014-8}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/MartiniDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/MartiniDC15a, author = {Ben Martini and Quang Do and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Mobile cloud forensics: An analysis of seven popular Android apps}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {309--345}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00015-X}, doi = {10.1016/B978-0-12-801595-7.00015-X}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/MartiniDC15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/NiddIPT15, author = {Michael Nidd and Marieta Georgieva Ivanova and Christian W. Probst and Axel Tanner}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Tool-based risk assessment of cloud infrastructures as socio-technical systems}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {495--517}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00022-7}, doi = {10.1016/B978-0-12-801595-7.00022-7}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/NiddIPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/RahmanC15, author = {Nurul Hidayah Ab Rahman and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Integrating digital forensic practices in cloud incident handling: {A} conceptual Cloud Incident Handling Model}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {383--400}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00017-3}, doi = {10.1016/B978-0-12-801595-7.00017-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/RahmanC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/ShariatiDMC15, author = {Mohammad Shariati and Ali Dehghantanha and Ben Martini and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Ubuntu One investigation: Detecting evidences on client machines}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {429--446}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00019-7}, doi = {10.1016/B978-0-12-801595-7.00019-7}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/ShariatiDMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/Sullivan15, author = {Clare Sullivan}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Protecting digital identity in the cloud}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {149--170}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00007-0}, doi = {10.1016/B978-0-12-801595-7.00007-0}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/Sullivan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/TanKHR15, author = {Alan Yu Shyang Tan and Ryan K. L. Ko and Geoff Holmes and Bill Rogers}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Provenance for cloud data accountability}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {171--185}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00008-2}, doi = {10.1016/B978-0-12-801595-7.00008-2}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/el/15/TanKHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/UllrichW15, author = {Johanna Ullrich and Edgar R. Weippl}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Protection through isolation: Virtues and pitfalls}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {129--147}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00006-9}, doi = {10.1016/B978-0-12-801595-7.00006-9}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/UllrichW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/VidalC15, author = {Chaz Vidal and Kim{-}Kwang Raymond Choo}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Cloud security and forensic readiness: The current state of an IaaS provider}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {401--428}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00018-5}, doi = {10.1016/B978-0-12-801595-7.00018-5}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/VidalC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/WillK15, author = {Mark A. Will and Ryan K. L. Ko}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {A guide to homomorphic encryption}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {101--127}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00005-7}, doi = {10.1016/B978-0-12-801595-7.00005-7}, timestamp = {Mon, 19 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/WillK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/el/KC2015, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, publisher = {Elsevier}, year = {2015}, url = {https://www.sciencedirect.com/science/book/9780128015957}, isbn = {978-0-12-801595-7}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/KC2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.