{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:37:35Z","timestamp":1773405455636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,26]],"date-time":"2012-03-26T00:00:00Z","timestamp":1332720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1116777"],"award-info":[{"award-number":["CNS-1116777"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,26]]},"DOI":"10.1145\/2245276.2232005","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"1427-1434","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["A security analysis of amazon's elastic compute cloud service"],"prefix":"10.1145","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[{"name":"EURECOM"}]},{"given":"Jonas","family":"Zaddach","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Sergio","family":"Loureiro","sequence":"additional","affiliation":[{"name":"SecludIT"}]}],"member":"320","published-online":{"date-parts":[[2012,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Security focus: Port scans legal judge says. http:\/\/www.securityfocus.com\/news\/126.  Security focus: Port scans legal judge says. http:\/\/www.securityfocus.com\/news\/126."},{"key":"e_1_3_2_1_2_1","unstructured":"Security guidance for critical areas of focus in cloud computing v2.1 Dec. 2009. https:\/\/cloudsecurityalliance.org\/csaguide.pdf.  Security guidance for critical areas of focus in cloud computing v2.1 Dec. 2009. https:\/\/cloudsecurityalliance.org\/csaguide.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon elastic compute cloud May 2011. http:\/\/aws.amazon.com\/security.  Amazon elastic compute cloud May 2011. http:\/\/aws.amazon.com\/security."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon elastic compute cloud (amazon ec2) May 2011. http:\/\/aws.amazon.com\/ec2\/.  Amazon elastic compute cloud (amazon ec2) May 2011. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_5_1","volume-title":"May","author":"Cloud","year":"2011","unstructured":"Cloud computing , cloud hosting and online storage by rackspace hosting , May 2011 . http:\/\/www.rackspace.com\/cloud\/. Cloud computing, cloud hosting and online storage by rackspace hosting, May 2011. http:\/\/www.rackspace.com\/cloud\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Enterprise cloud computing from terremark May 2011. http:\/\/www.terremark.com\/services\/cloudcomputing.aspx.  Enterprise cloud computing from terremark May 2011. http:\/\/www.terremark.com\/services\/cloudcomputing.aspx."},{"key":"e_1_3_2_1_7_1","volume-title":"draft special publication 800-144","author":"Guidelines","year":"2011","unstructured":"Guidelines on security and privacy in public cloud computing , draft special publication 800-144 , 2011 . Guidelines on security and privacy in public cloud computing, draft special publication 800-144, 2011."},{"key":"e_1_3_2_1_8_1","unstructured":"Ibm smartcloud May 2011. http:\/\/www.ibm.com\/cloud-computing\/us\/en\/#!iaas.  Ibm smartcloud May 2011. http:\/\/www.ibm.com\/cloud-computing\/us\/en\/#!iaas."},{"key":"e_1_3_2_1_9_1","unstructured":"John the ripper unix password cracker Apr. 2011. http:\/\/www.openwall.com\/john\/.  John the ripper unix password cracker Apr. 2011. http:\/\/www.openwall.com\/john\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Joyent smartdatacenter May 2011. http:\/\/www.joyent.com\/services\/smartdatacenter-services\/.  Joyent smartdatacenter May 2011. http:\/\/www.joyent.com\/services\/smartdatacenter-services\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Reminder about safely sharing and using public amis Jun 2011. http:\/\/aws.amazon.com\/security\/security-bulletins\/reminder-about-safely-sharing-and-using-public-amis\/.  Reminder about safely sharing and using public amis Jun 2011. http:\/\/aws.amazon.com\/security\/security-bulletins\/reminder-about-safely-sharing-and-using-public-amis\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866853"},{"key":"e_1_3_2_1_13_1","volume-title":"Amazonia: When elasticity snaps back","author":"Bugiel S.","year":"2011","unstructured":"S. Bugiel , S. N\u00fcrnberger , T. P\u00f6ppelmann , A. Sadeghi , and T. Schneider . Amazonia: When elasticity snaps back . 2011 . S. Bugiel, S. N\u00fcrnberger, T. P\u00f6ppelmann, A. Sadeghi, and T. Schneider. Amazonia: When elasticity snaps back. 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 10th conference on Hot Topics in Operating Systems-Volume 10","author":"Garfinkel T.","unstructured":"T. Garfinkel and M. Rosenblum . When virtual is harder than real: Security challenges in virtual machine based computing environments . In Proceedings of the 10th conference on Hot Topics in Operating Systems-Volume 10 . T. Garfinkel and M. Rosenblum. When virtual is harder than real: Security challenges in virtual machine based computing environments. In Proceedings of the 10th conference on Hot Topics in Operating Systems-Volume 10."},{"key":"e_1_3_2_1_15_1","unstructured":"R. Glott E. Husmann A. Sadeghi and M. Schunter. Trustworthy clouds underpinning the future internet. The Future Internet.  R. Glott E. Husmann A. Sadeghi and M. Schunter. Trustworthy clouds underpinning the future internet. The Future Internet ."},{"key":"e_1_3_2_1_16_1","volume-title":"Clobbering the cloud, part 4 of 5","author":"Haroon Meer M. S.","year":"2009","unstructured":"M. S. Haroon Meer , Nick Arvanitis . Clobbering the cloud, part 4 of 5 , 2009 . http:\/\/www.sensepost.com\/labs\/conferences\/clobbering_the_cloud\/amazon. M. S. Haroon Meer, Nick Arvanitis. Clobbering the cloud, part 4 of 5, 2009. http:\/\/www.sensepost.com\/labs\/conferences\/clobbering_the_cloud\/amazon."},{"key":"e_1_3_2_1_17_1","volume-title":"Network Mapper (NMap)","author":"I.","year":"1996","unstructured":"I. LLC. Network Mapper (NMap) , 1996 --2011. http:\/\/nmap.org\/. I. LLC. Network Mapper (NMap), 1996--2011. http:\/\/nmap.org\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555271.1555278"},{"key":"e_1_3_2_1_19_1","volume-title":"Apr.","author":"Puzic A.","year":"2011","unstructured":"A. Puzic . Cloud security: Amazon's ec2 serves up 'certified pre-owned' server images , Apr. 2011 . http:\/\/dvlabs.tippingpoint.com\/blog\/2011\/04\/11\/cloud-security-amazons-ec2-serves-up-certified-pre-owned A. Puzic. Cloud security: Amazon's ec2 serves up 'certified pre-owned' server images, Apr. 2011. http:\/\/dvlabs.tippingpoint.com\/blog\/2011\/04\/11\/cloud-security-amazons-ec2-serves-up-certified-pre-owned"},{"key":"e_1_3_2_1_20_1","unstructured":"M. Russinovich. Psexec 2009. http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb897553.  M. Russinovich. Psexec 2009. http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb897553."},{"key":"e_1_3_2_1_21_1","volume-title":"June","author":"Security A. A.","year":"2011","unstructured":"A. A. Security . How to share and use public amis in a secure manner , June 2011 . http:\/\/aws.amazon.com\/articles\/0155828273219400. A. A. Security. How to share and use public amis in a secure manner, June 2011. http:\/\/aws.amazon.com\/articles\/0155828273219400."},{"key":"e_1_3_2_1_22_1","volume-title":"June","author":"Security A. A.","year":"2011","unstructured":"A. A. Security . Reminder about safely sharing and using public amis , June 2011 . http:\/\/aws.amazon.com\/security\/security-bulletins\/reminder-about-safely-sharing-and-using-public-amis\/. A. A. Security. Reminder about safely sharing and using public amis, June 2011. http:\/\/aws.amazon.com\/security\/security-bulletins\/reminder-about-safely-sharing-and-using-public-amis\/."},{"key":"e_1_3_2_1_23_1","unstructured":"T. N. Security. Nessus vulnerability scanner 2002--2011. http:\/\/www.tenable.com\/products\/nessus.  T. N. Security. Nessus vulnerability scanner 2002--2011. http:\/\/www.tenable.com\/products\/nessus."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"}],"event":{"name":"SAC 2012: ACM Symposium on Applied Computing","location":"Trento Italy","acronym":"SAC 2012","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 27th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2245276.2232005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:43Z","timestamp":1750241203000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2245276.2232005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,26]]},"references-count":24,"alternative-id":["10.1145\/2245276.2232005","10.1145\/2245276"],"URL":"https:\/\/doi.org\/10.1145\/2245276.2232005","relation":{},"subject":[],"published":{"date-parts":[[2012,3,26]]},"assertion":[{"value":"2012-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}