-
1
-
-
68249129760
-
-
University of California, Berkeley, Tech. Rep. USB-EECS-2009-28 Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
77953319704
-
-
Online at
-
Amazon Web Services (AWS), Online at http://aws. amazon.com.
-
-
-
-
3
-
-
77957936026
-
-
Online at
-
Google App Engine, Online at http://code.google.com/appengine/.
-
Google App Engine
-
-
-
4
-
-
77953302523
-
-
Microsoft Azure, http://www.microsoft.com/azure/.
-
-
-
-
7
-
-
77953306664
-
Methods and limitations of security policy reconciliation
-
P. D. McDaniel and A. Prakash, "Methods and limitations of security policy reconciliation," in Proc. of SP'02, 2002.
-
Proc. of SP'02, 2002
-
-
McDaniel, P.D.1
Prakash, A.2
-
8
-
-
77953309871
-
A unified scheme for resource protection in automated trust negotiation
-
T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. of SP'03, 2003.
-
Proc. of SP'03, 2003
-
-
Yu, T.1
Winslett, M.2
-
10
-
-
0004200684
-
-
Air Force Electronic Systems Division, Report ESD-TR-73-51
-
J. Anderson, "Computer Security Technology Planning Study," Air Force Electronic Systems Division, Report ESD-TR-73-51, 1972, http://seclab.cs.ucdavis.edu/projects/history/.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.1
-
11
-
-
4544290272
-
Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Scalable secure file sharing on untrusted storage," in Proc. of FAST'03, 2003.
-
Proc. of FAST'03, 2003
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
12
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing remote untrusted storage," in Proc. of NDSS'03, 2003.
-
Proc. of NDSS'03, 2003
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
13
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," in Proc. of NDSS'05, 2005.
-
Proc. of NDSS'05, 2005
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
14
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in Proc. of VLDB'07, 2007.
-
Proc. of VLDB'07, 2007
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS'06, 2006.
-
Proc. of CCS'06, 2006
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. of ESORICS '09, 2009.
-
Proc. of ESORICS '09, 2009
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
19
-
-
84908526195
-
Defending against key abuse attacks in kp-abe enabled broadcast systems
-
S. Yu, K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in kp-abe enabled broadcast systems," in Proc. of SECURECOMM'09, 2009.
-
Proc. of SECURECOMM'09, 2009
-
-
Yu, S.1
Ren, K.2
Lou, W.3
Li, J.4
-
20
-
-
77953296239
-
The optimality of a fast CNF conversion and its use with SAT
-
D. Sheridan, "The optimality of a fast CNF conversion and its use with SAT," in Proc. of SAT'04, 2004.
-
Proc. of SAT'04, 2004
-
-
Sheridan, D.1
|