Search dblp for Publications

export results for "toc:db/books/collections/KC2015.bht:"

 download as .bib file

@incollection{DBLP:books/el/15/AliH15,
  author       = {Abdussalam Ali and
                  Igor T. Hawryszkiewycz},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud as infrastructure for managing complex scalable business networks,
                  privacy perspective},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {249--267},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00012-4},
  doi          = {10.1016/B978-0-12-801595-7.00012-4},
  timestamp    = {Sat, 31 Jul 2021 17:24:19 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/AliH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/DelamoreK15,
  author       = {Baden Delamore and
                  Ryan K. L. Ko},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Security as a service (SecaaS) - An overview},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {187--203},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00009-4},
  doi          = {10.1016/B978-0-12-801595-7.00009-4},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/DelamoreK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/GerdesBB15,
  author       = {Stefanie Gerdes and
                  Carsten Bormann and
                  Olaf Bergmann},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Keeping users empowered in a cloudy Internet of Things},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {231--247},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00011-2},
  doi          = {10.1016/B978-0-12-801595-7.00011-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/GerdesBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/GrisposGS15,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Recovering residual forensic data from smartphone interactions with
                  cloud storage providers},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {347--382},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00016-1},
  doi          = {10.1016/B978-0-12-801595-7.00016-1},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/GrisposGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/HabibVHM15,
  author       = {Sheikh Mahbub Habib and
                  Florian Volk and
                  Sascha Hauke and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Computational trust methods for security quantification in the cloud
                  ecosystem},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {463--493},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00021-5},
  doi          = {10.1016/B978-0-12-801595-7.00021-5},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/HabibVHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/Honig15,
  author       = {Sai Honig},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Governance in the Cloud},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {449--462},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00020-3},
  doi          = {10.1016/B978-0-12-801595-7.00020-3},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/Honig15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/JuliadotterC15,
  author       = {Nina Viktoria Juliadotter and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {{CATRA:} Conceptual cloud attack taxonomy and risk assessment framework},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {37--81},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00003-3},
  doi          = {10.1016/B978-0-12-801595-7.00003-3},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/JuliadotterC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/KemmerichAM15,
  author       = {Thomas Kemmerich and
                  Vivek Agrawal and
                  Carsten Momsen},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Secure migration to the cloud - In and out},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {205--230},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00010-0},
  doi          = {10.1016/B978-0-12-801595-7.00010-0},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/KemmerichAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/Kirwan15,
  author       = {Grainne Kirwan},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Psychology and security: Utilizing psychological and communication
                  theories to promote safer cloud security behaviors},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {269--281},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00013-6},
  doi          = {10.1016/B978-0-12-801595-7.00013-6},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/Kirwan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/KoC15,
  author       = {Ryan K. L. Ko and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud security ecosystem},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {1--14},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00001-X},
  doi          = {10.1016/B978-0-12-801595-7.00001-X},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/KoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/Lau15,
  author       = {Yiu Chung Laurie Lau},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cybercrime in cloud: Risks and responses in Hong Kong, Singapore},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {17--35},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00002-1},
  doi          = {10.1016/B978-0-12-801595-7.00002-1},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/Lau15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/LeeT15,
  author       = {Hing{-}Yan Lee and
                  Yao{-}Sing Tao},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Multitiered cloud security model},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {83--97},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00004-5},
  doi          = {10.1016/B978-0-12-801595-7.00004-5},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/LeeT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/MartiniDC15,
  author       = {Ben Martini and
                  Quang Do and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Conceptual evidence collection and analysis methodology for Android
                  devices},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {285--307},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00014-8},
  doi          = {10.1016/B978-0-12-801595-7.00014-8},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/MartiniDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/MartiniDC15a,
  author       = {Ben Martini and
                  Quang Do and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Mobile cloud forensics: An analysis of seven popular Android apps},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {309--345},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00015-X},
  doi          = {10.1016/B978-0-12-801595-7.00015-X},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/MartiniDC15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/NiddIPT15,
  author       = {Michael Nidd and
                  Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Axel Tanner},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Tool-based risk assessment of cloud infrastructures as socio-technical
                  systems},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {495--517},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00022-7},
  doi          = {10.1016/B978-0-12-801595-7.00022-7},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/NiddIPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/RahmanC15,
  author       = {Nurul Hidayah Ab Rahman and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Integrating digital forensic practices in cloud incident handling:
                  {A} conceptual Cloud Incident Handling Model},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {383--400},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00017-3},
  doi          = {10.1016/B978-0-12-801595-7.00017-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/RahmanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/ShariatiDMC15,
  author       = {Mohammad Shariati and
                  Ali Dehghantanha and
                  Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Ubuntu One investigation: Detecting evidences on client machines},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {429--446},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00019-7},
  doi          = {10.1016/B978-0-12-801595-7.00019-7},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/ShariatiDMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/Sullivan15,
  author       = {Clare Sullivan},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Protecting digital identity in the cloud},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {149--170},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00007-0},
  doi          = {10.1016/B978-0-12-801595-7.00007-0},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/Sullivan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/TanKHR15,
  author       = {Alan Yu Shyang Tan and
                  Ryan K. L. Ko and
                  Geoff Holmes and
                  Bill Rogers},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Provenance for cloud data accountability},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {171--185},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00008-2},
  doi          = {10.1016/B978-0-12-801595-7.00008-2},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/el/15/TanKHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/UllrichW15,
  author       = {Johanna Ullrich and
                  Edgar R. Weippl},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Protection through isolation: Virtues and pitfalls},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {129--147},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00006-9},
  doi          = {10.1016/B978-0-12-801595-7.00006-9},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/UllrichW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/VidalC15,
  author       = {Chaz Vidal and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud security and forensic readiness: The current state of an IaaS
                  provider},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {401--428},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00018-5},
  doi          = {10.1016/B978-0-12-801595-7.00018-5},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/VidalC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/WillK15,
  author       = {Mark A. Will and
                  Ryan K. L. Ko},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {A guide to homomorphic encryption},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {101--127},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00005-7},
  doi          = {10.1016/B978-0-12-801595-7.00005-7},
  timestamp    = {Mon, 19 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/WillK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/el/KC2015,
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://www.sciencedirect.com/science/book/9780128015957},
  isbn         = {978-0-12-801595-7},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/KC2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics