ICCSM2014-Proceedings of the International Conference on Cloud Security Management ICCSM-2014: ICCSM2014Barbara Endicott-Popovsky These Proceedings are the work of researchers contributing to the 2nd International Conference on Cloud Security Management Security (ICCSM 2014), being held this year at the University of Reading, UK on the 23-24 October 2014, . The conference chair is Dr John McCarthy, Vice President, from the Cyber Security, ServiceTech, UK and the Programme Chair is Dr. Barbara Endicott-Popovsky, from the Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA. As organisations rush to adopt Cloud Computing at a rate faster than originally projected, it is safe to predict that, over the coming years, Cloud Computing will have major impacts, not only on the way we conduct science and research, but also on the quality of our daily human lives. Computation research, education, and business communities have been exploring the potential benefits of Cloud Computing and the changes these imply. Experts have predicted that the move to the cloud will alter significantly the content of IT jobs, with cloud clients needing fewer hands-on skills and more skills that administer and manage information. Bill Gates was recently quoted: "How you gather, manage, and use information will determine whether you win or lose." Cloud Computing impacts will be broad and pervasive, applying to public and private institutions alike. |
Contents
1 | |
9 | |
Baharon007 | 18 |
Boggess et al | 27 |
DavidZaidenberg020 | 36 |
De Marco et al031 | 42 |
FranksDoyle012 | 51 |
Greiman038 | 59 |
Kronqvist | 90 |
Rogers005 | 101 |
Tait033 | 109 |
XBushey013 | 121 |
XOsterloh015 | 130 |
XOYounis010 | 138 |
XXXAlgawi et al | 149 |
XXXTamir et al | 154 |
Common terms and phrases
algorithm application Archives biometric characteristic biometric data cameras challenges cloud adoption cloud based cloud computing cloud providers Cloud Security cloud service providers cloud storage communication component CPU cache cryptographic cyber cybersecurity decryption digital photographs digital preservation digital records DP services Electronic encryption ensure enterprises environment ethics Figure Forensic Readiness framework functional Homomorphic Encryption HoneyGuard hypervisor implementation information systems infrastructure integrity International Internet InterPARES iPhone issues kernel Linux long‐term message bundle metadata middleware Object Management Group operating system organizations paper Parliamentary Archives photo‐sharing and social preservation administration preservation services protocol public cloud records management requirements responsible retention and disposition risk Sam’s side‐channel attacks signature SLAs smart device social media social media platforms social networking social networking services solutions specific standards stored stream survey transcoding trust University user space virtual machine VoIP