Diff for Researchers find holes in the cloud

Tue, 10/25/2011 - 14:05 by dschurTue, 10/25/2011 - 14:44 by dschur
Changes to Body
 
Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services</a>
 
Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services</a>
 
including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2</a> cloud allowed unauthorised users to perform
 
including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2</a> cloud allowed unauthorised users to perform
-
administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM
+
administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM workshop</a> on cloud security, a team of researchers from Germany's
-
workshop</a> on cloud security, a team of researchers from Germany's
+
 
Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported</a><img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start
 
Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported</a><img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start
 
and stop virtual machines, and create new images and gateways, in an EC2
 
and stop virtual machines, and create new images and gateways, in an EC2
 
instance.
 
instance.
 
 
Revision of Tue, 10/25/2011 - 14:44:

Researchers find holes in the cloud

Until recently, a vulnerability in Amazon Web Services
including the EC2 cloud allowed unauthorised users to perform
administrative tasks. At an ACM workshop on cloud security, a team of researchers from Germany's
Ruhr University of Bochum led by professor Jörg Schwenk reportedGerman language link that attackers were, for example, able to start
and stop virtual machines, and create new images and gateways, in an EC2
instance.

XML.org Focus Areas: BPEL | DITA | ebXML | IDtrust | OpenDocument | SAML | UBL | UDDI
OASIS sites: OASIS | Cover Pages | XML.org | AMQP | CGM Open | eGov | Emergency | IDtrust | LegalXML | Open CSA | OSLC | WS-I