Reading List
As part of this doctoral
seminar, we will create a comprehensive reading list .
From the list, we will select better ones for review/presentation and
discussion in class. The reading lists will contain papers related to recent
developments in IA. Based on the number of students and interest, we may narrow
down to only few topics. The students are welcome to suggest new additions.
All the papers should be
available online.
Introductory Papers (for those who have not have security
courses)
- Carl, E. Landwehr, "Formal
Models for Computer Security," Computing Surveys, Vol
13, No 3, September, 1981
- James B. D. Joshi, Walid G. Aref, Arif Ghafoor and Eugene H. Spafford, "Security models for web-based
applications", Communications of the ACM , 44, 2 (Feb. 2001), Page 38-44.
- Introduction to Security Book:
Authentication and Access Control
Trust papers
Privacy Papers
Security in Wireless and Ad hoc Environments
Security in Grid/Cloud Computing
- Effectively and Securely Using the Cloud Computing
Paradigm, Presentation by Peter Mell, Tim Grance, NIST, Information Technology Laboratory,
6-26-2009
(Being
presented by Hassan Takabi)
- Carl
Hewitt, ORGs for Scalable, Robust, Privacy-Friendly Client Cloud
Computing, IEEE Computer Society, 2008
- W. K. Wong,
David W. Cheung, Ben Kao, and Nikos Mamoulis,
Secure kNN Computation on Encrypted Databases,
SIGMOD’09
- Siani Pearson, Taking Account of Privacy when
Designing Cloud Computing Services, CLOUD’09
- Cong Wang; Qian Wang; Kui Ren; Wenjing
Lou, Ensuring data storage security in Cloud Computing
- Nils Gruschka, Luigi Lo Iacono, Vulnerable Cloud: SOAP Message Security
Validation Revisited, 2009 IEEE
International Conference on Web Services
- Sukhyun Song, Kyung Dong Ryu,
Dilma Da Silva, Blue
Eyes: Scalable and Reliable System Management for Cloud Computing, IEEE,
2009
- Lori M. Kaufman, Data Security in the World of Cloud
Computing, IEEE Security and Privacy, 2009-08-28
- Allen Booz,
Cloud Computing Security Standards
- Draft NIST
Working Definition of Cloud Computing, Authors: Peter
Mell and Tim Grance
- Harold C.
Lim, Shivnath Babu,
Jeffrey S. Chase, and Sujay S. Parekh, Automated
Control in Cloud Computing: Challenges and Opportunities, ACDC’09
- Jeff Sedayao, Implementing and Operating an Internet Scale
Distributed Application using Service Oriented Architecture Principles and
Cloud Computing Infrastructure, iiWAS2008
- Asesh Das, Ramana (Y.V)
Reddy, Information Intelligence in Cloud Computing-How can Vijjana, a Collaborative, Self-organizing, Domain
Centric Knowledge Network Model Help, CSIIRW '09
- Paul Mur,
Enterprise Grade Cloud Computing WDDDM’09
- Jeanna Matthews, Tal Garfinkel,
Christofer Hoff, and Jeff Wheeler, Virtual
Machine Contracts for Datacenter and Cloud Computing Environments, ACDC’09
- Rajkumar Buyya, Chee Shin Ye, Srikumar Venugopal, James Broberg,
and Ivona Brandic,
Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for
Delivering Computing as the 5th Utility
- Tobias Anstett, Frank Leymann, Ralph Mietzner , and Steve Strauch, Towards BPEL in the Cloud: Exploiting
Different Delivery Models for the Execution of Business Processes, Proceedings of the 2009 Congress on Services
- B.
Rochwerger1, A. Galis, E. Levy, J. A. Cáceres, D. Breitgand1, Y. Wolfsthal,
I. M. Llorente, M. Wusthoff,
R. S. Montero, E. Elmroth, RESERVOIR: Management
Technologies and Requirements for Next Generation Service Oriented
Infrastructures, IEEE, 2009