메뉴 건너뛰기




Volumn , Issue , 2009, Pages 711-716

Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures

Author keywords

Cloud computing; Cryptographic coprocessors; Privacy; Security

Indexed keywords

CLOUD COMPUTING; CONFIDENTIAL DATA; CONFIGURABLE; CRYPTOGRAPHIC COPROCESSORS; CUSTOMER DATA; DATA STORAGE; DESIGN GOAL; FEEDBACK PROCESS; LEGAL COMPLIANCE; POTENTIAL RISKS; PRIVACY SOLUTIONS; SECURE EXECUTION; SECURE STORAGE; SECURITY PROTOCOLS; SENSITIVE DATAS; SENSITIVE INFORMATIONS; SOFTWARE PROTECTION; TAMPERPROOF;

EID: 77950587463     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DASC.2009.139     Document Type: Conference Paper
Times cited : (219)

References (25)
  • 1
    • 0018995481 scopus 로고    scopus 로고
    • Preventing Software Piracy with Crypto-Microprocessors
    • RM Best, "Preventing Software Piracy with Crypto- Microprocessors", in Proceedings of IEEE Spring COMPCON 80, pp 466-469.
    • Proceedings of IEEE Spring COMPCON , vol.80 , pp. 466-469
    • Best, R.M.1
  • 2
    • 0004743526 scopus 로고
    • The smart card: A standardized security device dedicated to public cryptology
    • Gustavus J Simmons, editor, IEEE Press, Piscataway, NJ
    • L C. Guillou, M. Ugon, and JJ. Quisquater, "The smart card: A standardized security device dedicated to public cryptology", In Gustavus J Simmons, editor, Contemporary cryptology: The science of information integrity, IEEE Press, Piscataway, NJ, 1992.
    • (1992) Contemporary Cryptology: The Science of Information Integrity
    • Guillou, L.C.1    Ugon, M.2    Quisquater, J.J.3
  • 3
    • 21644434531 scopus 로고    scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • J. D. Tygar and B. Yee, "Dyad: A system for using physically secure coprocessors", In Proc. of IP Workshop, 1994.
    • Proc. of IP Workshop, 1994
    • Tygar, J.D.1    Yee, B.2
  • 4
    • 0025438148 scopus 로고
    • ABYSS: An Architecture for Software Protection
    • June
    • S.R. White and L. Comerford, "ABYSS: An Architecture for Software Protection", IEEE Transactions on Software Engineering, vol. 16, no. 6, June 1990, pp. 619-629.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 619-629
    • White, S.R.1    Comerford, L.2
  • 5
    • 0343421180 scopus 로고
    • Introduction to the Citadel architecture: Security in physically exposed environments
    • Distributed Systems Security Group, IBM T.J. Watson Research Center, March
    • S.R. White, S.H. Weingart, W.C. Arnold, E.R. Palmer, Introduction to the Citadel architecture: security in physically exposed environments, Technical Report RC 16672, Distributed Systems Security Group, IBM T.J. Watson Research Center, March 1991.
    • (1991) Technical Report RC 16672
    • White, S.R.1    Weingart, S.H.2    Arnold, W.C.3    Palmer, E.R.4
  • 7
    • 77950564477 scopus 로고    scopus 로고
    • CHRYSALIS-ITS HOME PAGE: HTTP://WWW.CHRYSALIS-ITS.COM
  • 14
    • 0031177289 scopus 로고    scopus 로고
    • Remote Auditing of Software Outputs Using a Trusted Coprocessor
    • B. Schneier and J. Kelsey, "Remote Auditing of Software Outputs Using a Trusted Coprocessor", Journal of Future Generation Computer Systems, v.13, n.1, 1997, pp. 9-18.
    • (1997) Journal of Future Generation Computer Systems , vol.13 , Issue.1 , pp. 9-18
    • Schneier, B.1    Kelsey, J.2
  • 19
    • 77950562201 scopus 로고    scopus 로고
    • Accountability as a Way Forward for Privacy Protection in the Cloud
    • S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud", HP Labs Technical Report, HPL-2009-2178, http://www.hpl.hp.com/techreports/2009/HPL-2009-178.pdf (2009)
    • (2009) HP Labs Technical Report
    • Pearson, S.1    Charlesworth, A.2
  • 21
    • 77950571712 scopus 로고    scopus 로고
    • http://www.schneier.com/blog/archives/2009/07/homomorphic-enc.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.