메뉴 건너뛰기




Volumn 4, Issue , 2009, Pages 47-50

Security scheme for sensitive data in management-type SaaS

Author keywords

Data security; Identity based signature; Management type SaaS; Non credible PKG; Sensitive data

Indexed keywords

DATA SECURITY; DISTRIBUTED SYSTEMS; DOUBLE LAYERS; FEASIBILITY ANALYSIS; IDENTITY BASED SIGNATURE; NON-REPUDIATION; SECURITY PROBLEMS; SECURITY SCHEME; SENSITIVE DATAS; SERVICE LEVEL AGREEMENTS; SERVICE PROVIDER; SYMMETRIC CRYPTOGRAPHY;

EID: 77649278531     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIII.2009.473     Document Type: Conference Paper
Times cited : (1)

References (13)
  • 1
    • 77649317330 scopus 로고    scopus 로고
    • Software as a Service, Jul. 2009
    • Software as a Service, http://en.wikipedia.org/wiki/SaaS,Jul. 2009.
  • 2
    • 77649300582 scopus 로고    scopus 로고
    • Sept. 2009
    • Saleforce System Secturity, http://trust.salesforce.com/trust/security/, Sept. 2009.
    • Saleforce System Secturity
  • 5
    • 0036684150 scopus 로고    scopus 로고
    • PKI:It's not Dead , Just Resting
    • Aug
    • P Guttman, "PKI:It's not Dead , Just Resting," IEEE Computer, vol. 35, Aug 2002, pp. 41-49.
    • (2002) IEEE Computer , vol.35 , pp. 41-49
    • Guttman, P.1
  • 6
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag New York
    • Adi Shamir, "Identity-based cryptosystems and signature schemes," Proc. Of CRYPTO 84 on Advances in Cryptology, Springer-Verlag New York,1985, pp. 47-53.
    • (1985) Proc. Of CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • Mar
    • Dan Boneh, Matthew K. Franklin, "Identity-based Encryption from the Weil Pairing," SIAM Journal on Computing, vol. 32 ,Mar. 2003, pp. 586-615.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 34648825634 scopus 로고    scopus 로고
    • New ID-Based Universal Designated-Verifier Signature Scheme
    • Aug
    • Wang Xiaofeng, Zhang Jing, Wang Shangping, Zhang Yaling, Qin Bo, "New ID-Based Universal Designated-Verifier Signature Scheme," Acta Electronica Sinia, vol. 35, Aug. 2007, pp. 1432-1436.
    • (2007) Acta Electronica Sinia , vol.35 , pp. 1432-1436
    • Wang, X.1    Jing, Z.2    Wang, S.3    Zhang, Y.4    Bo, Q.5
  • 9
    • 77649328644 scopus 로고    scopus 로고
    • New ID-based Universal Designated Multi-Verifiers Signature schem
    • Jul
    • Zhang Xuejun, "New ID-based Universal Designated Multi-Verifiers Signature schem," Engineering and Applications, vol 44, Jul. 2008, pp. 33-35
    • (2008) Engineering and Applications , vol.44 , pp. 33-35
    • Zhang, X.1
  • 10
    • 70349735426 scopus 로고    scopus 로고
    • Chen Jinjun,Yang Yun, Key Research Issues in Grid Workflow Verification and Validation. Proc. the 2006 Astralasian Workshop on Grid Computing and e-research, Australian Computer Socity, 2006, pp. 97-104.
    • Chen Jinjun,Yang Yun, "Key Research Issues in Grid Workflow Verification and Validation." Proc. the 2006 Astralasian Workshop on Grid Computing and e-research, Australian Computer Socity, 2006, pp. 97-104.
  • 11
    • 77649305345 scopus 로고    scopus 로고
    • A Java Implementation of an Elliptic Curve Cryptosystem
    • Computer Science press, Trinity College
    • Andrew Burnett, Keith Winters, Tom Dowling, "A Java Implementation of an Elliptic Curve Cryptosystem," Recent Advances in Java Technology, Computer Science press, Trinity College, 2002, pp. 83-88.
    • (2002) Recent Advances in Java Technology , pp. 83-88
    • Burnett, A.1    Winters, K.2    Dowling, T.3
  • 12
    • 84944878354 scopus 로고    scopus 로고
    • Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of applied Cryptography, CRC Press LLC, 1997.
    • Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of applied Cryptography, CRC Press LLC, 1997.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.