Zusammenfassung
Der Begriff „Cloud Computing “ wurde geprägt als eine zwar nicht scharfe, aber dennoch technisch fundierte Beschreibung verschiedener neuer Outsourcing-Technologien. Mittlerweile ist daraus ein reiner Marketingbegriff geworden, der auf alle möglichen Arten von Webanwendungen, insbesondere auf Web Storage, angewandt wird. Es ist daher zunächst eine Begriffsklärung erforderlich.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Grance und Mell 2009.
- 2.
http://aws.amazon.com/de/.
- 3.
Eucalyptus, http://open.eucalyptus.com/.
- 4.
- 5.
Sempolinski und Thain 2010.
- 6.
Ristenpart et al. 2009, S. 199.
- 7.
Bugiel et al. 2011, S. 389.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
James Clark: XSL Transformations (XSLT) Version 1.0., http://www.w3.org/TR/xslt.
- 18.
Bradley W. Hill: Command Injection in XML Signatures and Encryption. http://www.isecpartners.com/files/XMLDSIG_Command_Injection.pdf
- 19.
David C. Fallside, Priscilla Walmsley:XML Schema Part 0: Primer Second Edition. http://www.w3.org/TR/2004/REC-xmlschema-0-20041028/.
- 20.
Roberto Chinnici, Jean-Jacques Moreau, Arthur Ryman, Sanjiva Weerawarana: Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. http://www.w3.org/TR/wsdl20/.
- 21.
Donald Eastlake, Joseph Reagle, David Solo, Frederick Hirsch, Thomas Roessler: XML Signature Syntax and Processing (Second Edition). http://www.w3.org/TR/xmldsig-core/.
- 22.
McIntosh und Austel 2005, S. 20.
- 23.
Donald Eastlake, Joseph Reagle: XML Encryption Syntax and Processing. http://www.w3.org/TR/xmlenc-core/.
- 24.
Jager und Somorovsky 2011.
- 25.
Nilo Mitra, Yves Lafon: SOAP Version 1.2 Part 0: Primer (Second Edition). http://www.w3.org/TR/2007/REC-soap12-part0-20070427/.
- 26.
- 27.
Anthony Nadalin, Chris Kaler, Ronald Monzillo, Phillip Hallam-Baker: Web Services Security: 4 SOAP Message Security 1.1, http://www.oasis-open.org/committees/download.php/16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf.
- 28.
Asir S. Vedamuthu, David Orchard, Frederick Hirsch, Maryann Hondo, Prasad Yendluri, Toufic Boubez, Ümit Yalçinalp: Web Services Policy 1.5– Framework, http://www.w3.org/TR/ws-policy/.
- 29.
Anthony Nadalin, Marc Goodner, Martin Gudgin, Abbie Barbir, Hans Granqvist: WS-SecurityPolicy 1.2, http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200512/ws-securitypolicy-1.2-spec-cd-01.pdf.
- 30.
Anthony Nadalin, Marc Goodner, Martin Gudgin, Abbie Barbir, Hans Granqvist: WS-Trust 1.3, http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.pdf.
- 31.
- 32.
Anthony Nadalin, Marc Goodner, Martin Gudgin, Abbie Barbir, Hans Granqvist: WS-SecureConversation 1.3, http://docs.oasis-open.org/ws-sx/ws-secureconversation/v1.3/ws-secureconversation.pdf.
- 33.
Gartner Consulting: Seven Cloud Computing Risks, http://www.infoworld.com/article/08/07/02/Gartner_Seven_cloudcomputing_security_risks_1.html.
- 34.
Jensen et al. 2009
Literatur
Bugiel S, Nürnberger S, Pöppelmann T, Sadeghi AR, Schneider T (2011) AmazonIA: when elasticity snaps back. In: The 18th ACM conference on computer and communications security (CCS), S 389−400
Grance T, Mell P (2009) The NIST definition of cloud computing, Version 1.5, October 7, 2009. http://csrc.nist.gov/groups/SNS/cloud-computing
Jager T, Somorovsky J (2011) How to break XML encryption. The 18th ACM conference on computer and communications security (CCS)
Jensen M, Gruschka N, Lo Iacono L, Schwenk J (2009) On technical security issues in cloud computing. In: Proceedings of the IEEE international conference on cloud computing (CLOUD-II), Bangalore, India
McIntosh M, Austel P (2005) XML signature element wrapping attacks and countermeasures—workshop on secure web services (SWS 2005). ACM Press, New York, S 20–27
Ristenpart T, Savage S, Shacham H, Tromer E (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. The 16th ACM conference on computer and communications security (CCS), S 199−212
Sempolinski P, Thain D (2010) A comparison and critique of eucalyptus, opennebula and nimbus. University of Notre Dame, USA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schwenk, J. (2012). Angriffe gegen Cloud Computing. In: Borges, G., Schwenk, J. (eds) Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30102-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-30102-5_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30101-8
Online ISBN: 978-3-642-30102-5
eBook Packages: Humanities, Social Science (German Language)