{"publication_identifier":{"isbn":["9781450310048"]},"type":"conference","date_created":"2020-02-15T09:19:07Z","date_updated":"2022-01-06T06:52:39Z","extern":"1","language":[{"iso":"eng"}],"publication_status":"published","doi":"10.1145/2046660.2046664","status":"public","author":[{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","first_name":"Juraj","id":"83504"},{"full_name":"Heiderich, Mario","last_name":"Heiderich","first_name":"Mario"},{"full_name":"Jensen, Meiko","last_name":"Jensen","first_name":"Meiko"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"},{"last_name":"Gruschka","full_name":"Gruschka, Nils","first_name":"Nils"},{"last_name":"Lo Iacono","full_name":"Lo Iacono, Luigi","first_name":"Luigi"}],"publication":"Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11","user_id":"83504","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2011/10/22/AmazonSignatureWrapping.pdf"}],"year":"2011","_id":"15885","title":"All your clouds are belong to us: security analysis of cloud management interfaces","citation":{"ama":"Somorovsky J, Heiderich M, Jensen M, Schwenk J, Gruschka N, Lo Iacono L. All your clouds are belong to us: security analysis of cloud management interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11. ; 2011. doi:10.1145/2046660.2046664","bibtex":"@inproceedings{Somorovsky_Heiderich_Jensen_Schwenk_Gruschka_Lo Iacono_2011, title={All your clouds are belong to us: security analysis of cloud management interfaces}, DOI={10.1145/2046660.2046664}, booktitle={Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11}, author={Somorovsky, Juraj and Heiderich, Mario and Jensen, Meiko and Schwenk, Jörg and Gruschka, Nils and Lo Iacono, Luigi}, year={2011} }","ieee":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11, 2011.","mla":"Somorovsky, Juraj, et al. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011, doi:10.1145/2046660.2046664.","chicago":"Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. “All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces.” In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011. https://doi.org/10.1145/2046660.2046664.","apa":"Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., & Lo Iacono, L. (2011). All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW ’11. https://doi.org/10.1145/2046660.2046664","short":"J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L. Lo Iacono, in: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW ’11, 2011."}}