Concepedia

Publication | Closed Access

All your clouds are belong to us

141

Citations

20

References

2011

Year

Abstract

Cloud Computing resources are handled through control interfaces. It is through these interfaces that the new machine images can be added, existing ones can be modified, and instances can be started or ceased. Effectively, a successful attack on a Cloud control interface grants the attacker a complete power over the victim's account, with all the stored data included.

References

YearCitations

Page 1