메뉴 건너뛰기




Volumn 5931 LNCS, Issue , 2009, Pages 90-106

A privacy manager for cloud computing

Author keywords

Cloud computing; Privacy

Indexed keywords

ALGEBRAIC DESCRIPTION; CLOUD COMPUTING; PRIVACY LAW; PRIVACY MANAGEMENT; PRIVATE DATA;

EID: 71749102261     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10665-1_9     Document Type: Conference Paper
Times cited : (163)

References (38)
  • 1
    • 71749101474 scopus 로고    scopus 로고
    • Regulation of Investigatory Powers Act, Part II, s 28, UK (2000)
    • Regulation of Investigatory Powers Act, Part II, s 28, UK (2000)
  • 2
    • 71749110030 scopus 로고    scopus 로고
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act, Title V, s 505 2001
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act, Title V, s 505 (2001)
  • 4
    • 71749117185 scopus 로고    scopus 로고
    • EU Data Protection Directive (95/46/EC) (1995)
    • EU Data Protection Directive (95/46/EC) (1995)
  • 7
    • 1142270162 scopus 로고    scopus 로고
    • Pearson, S, ed, Prentice-Hall, Englewood Cliffs
    • Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2002)
    • (2002) Trusted Computing Platforms
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Goos, G, Hartmanis, J, van Leeuwen, J, eds, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Goos, G., Hartmanis, J., van Leeuwen, J. (eds.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 84942776290 scopus 로고    scopus 로고
    • Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services
    • IEEE Computer Society Press, Washington
    • Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: IEEE Workshop on Data and Expert Systems Applications, pp. 377-382. IEEE Computer Society Press, Washington (2003)
    • (2003) IEEE Workshop on Data and Expert Systems Applications , pp. 377-382
    • Casassa Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 12
    • 77049083421 scopus 로고    scopus 로고
    • Casassa Mont, M., Thyne, R.: A systemic approach to automate privacy policy enforcement in enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 118-134. Springer, Heidelberg (2006)
    • Casassa Mont, M., Thyne, R.: A systemic approach to automate privacy policy enforcement in enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 118-134. Springer, Heidelberg (2006)
  • 13
    • 72249098337 scopus 로고    scopus 로고
    • A client-based privacy manager for cloud computing
    • ACM, New York
    • Mowbray, M., Pearson, S.: A client-based privacy manager for cloud computing. In: COMSWARE 2009. ACM, New York (2009)
    • (2009) COMSWARE
    • Mowbray, M.1    Pearson, S.2
  • 15
    • 24944506569 scopus 로고    scopus 로고
    • Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 305-320. Springer, Heidelberg (2005)
    • Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 305-320. Springer, Heidelberg (2005)
  • 17
    • 84955564654 scopus 로고    scopus 로고
    • A privacy-enhancing e-business model based on infomediaries
    • Gorodetski, V.I, Skormin, V.A, Popyack, L.J, eds, MMM-ACNS 2001, Springer, Heidelberg
    • Gritzalis, D., Moulinos, K., Kostis, K.: A privacy-enhancing e-business model based on infomediaries. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 72-83. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2052 , pp. 72-83
    • Gritzalis, D.1    Moulinos, K.2    Kostis, K.3
  • 18
    • 84857713690 scopus 로고    scopus 로고
    • Otemba project
    • Otemba project: The Reasons for Otemba's Existence, http://sourceforge. net/apps/trac/otemba/wiki/Reasons%20for%20existence
    • The Reasons for Otemba's Existence
  • 19
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • FoCS, pp, IEEE Press, New York
    • Yao, A.C.: How to Generate and Exchange Secrets. In: 27th Symposium of Foundations of Computer Science (FoCS), pp. 162-167. IEEE Press, New York (1986)
    • (1986) 27th Symposium of Foundations of Computer Science , pp. 162-167
    • Yao, A.C.1
  • 20
    • 70350642087 scopus 로고    scopus 로고
    • Fully Homomorphic Encryption Using Ideal Lattices
    • Bethesda, Maryland, USA, May 31-June 2
    • Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: 41st ACM Symposium on Theory of Computing, Bethesda, Maryland, USA, May 31-June 2 (2009), pp. 169-178 (2009)
    • (2009) 41st ACM Symposium on Theory of Computing , pp. 169-178
    • Gentry, C.1
  • 21
    • 24144433396 scopus 로고    scopus 로고
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
    • Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
  • 22
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. J. Cryptology 15(3), 151-222 (2002)
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 151-222
    • Lindell, Y.1    Pinkas, B.2
  • 24
    • 37549003336 scopus 로고    scopus 로고
    • Map Reduce: Simplified data processing on large clusters
    • Dean, J., Ghemawat, S.: Map Reduce: Simplified data processing on large clusters. Communications of the ACM 51(1) (2008)
    • (2008) Communications of the ACM , vol.51 , Issue.1
    • Dean, J.1    Ghemawat, S.2
  • 25
    • 0004081967 scopus 로고
    • Addison-Wesley Longman Publishing Co, Boston
    • Date, C.J.: A guide to the SQL standard. Addison-Wesley Longman Publishing Co., Boston (1986)
    • (1986) A guide to the SQL standard
    • Date, C.J.1
  • 27
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • DeMillo, R.A, et al, eds, Academic Press, New York
    • Rivest, R., Adelman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 168-179. Academic Press, New York (1978)
    • (1978) Foundations of Secure Computation , pp. 168-179
    • Rivest, R.1    Adelman, L.2    Dertouzos, M.L.3
  • 30
    • 85001786260 scopus 로고    scopus 로고
    • Secure and Selective Dissemination of XML Documents
    • ACM, New York
    • Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. In: Proc. TISSEC, pp. 290-331. ACM, New York (2002)
    • (2002) Proc. TISSEC , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 32
  • 34
    • 26844431950 scopus 로고    scopus 로고
    • Casassa Mont, M., Pearson, S.: An Adaptive Privacy Management System for Data Repositories. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LMXS, 3592, pp. 236-245. Springer, Heidelberg (2005)
    • Casassa Mont, M., Pearson, S.: An Adaptive Privacy Management System for Data Repositories. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LMXS, vol. 3592, pp. 236-245. Springer, Heidelberg (2005)
  • 37
    • 29244482785 scopus 로고    scopus 로고
    • P2P reputation management: Probabilistic estimation vs. social networks. Management in Peer-to-Peer Systems
    • Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Management in Peer-to-Peer Systems, Computer Networks 50(4), 485-500 (2006)
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 485-500
    • Despotovic, Z.1    Aberer, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.