On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, pp.109-116, 2009. ,
DOI : 10.1109/CLOUD.2009.60
Survey of security problems in cloud computing virtual machines, Proceedings of Computer and Electronics Security Applications Rendez-vous, pp.61-74, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00761206
Attack types and intrusion detection systems in cloud computing, Proceedings of the 6th International Information Security & Cryptology Conference, pp.71-76, 2013. ,
On static reachability analysis of IP networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2170-2183, 2005. ,
DOI : 10.1109/INFCOM.2005.1498492
Quarnet: A tool for quantifying static network reachability, 2009. ,
A tool for automated iptables firewall analysis, ATEC '05: Proceedings of the annual conference on USENIX Annual Technical Conference, pp.44-44, 2005. ,
The margrave tool for firewall analysis, USENIX Large Installation System Administration Conference, 2010. ,
Automated security analysis of infrastructure clouds, 2010. ,
Sun behind clouds-on automatic cloud security audits and a cloud audit policy language, International Journal On Advances in Networks and Services, vol.6, issue.1 2, pp.1-16, 2013. ,
Secaas implementation guidance: Security assessments, 2012. ,
Automated Information Flow Analysis of Virtualized Infrastructures, Computer Security?ESORICS 2011, pp.392-415, 2011. ,
DOI : 10.1007/978-3-642-23822-2_22
An approach for security evaluation and analysis in cloud computing, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00926367