메뉴 건너뛰기




Volumn , Issue , 2010, Pages 581-592

Secure cloud computing with brokered trusted sensor networks

Author keywords

Brokered network; Security; Sensor network; Wireless

Indexed keywords

BROKERED NETWORK; CLOUD COMPUTING; MALWARES; MASHUPS; NETWORK CONFIGURATION; SECURITY; SECURITY ARCHITECTURE; SENSING APPLICATIONS; SENSOR INFORMATIONS; SMART PHONES;

EID: 77954464638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CTS.2010.5478459     Document Type: Conference Paper
Times cited : (19)

References (39)
  • 8
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • D. Dagon, T. Martin, and T. Starner. "Mobile phones as computing devices: The viruses are coming!" IEEE Pervasive Computing, 3(4):11-15, 2004.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 14
    • 74249094714 scopus 로고    scopus 로고
    • Learning and predicting multimodal daily life patterns from cell phones
    • J.L. Crowley, Y. Ivanov, C.R. Wren, D. Gatica-Perez, M. Johnston, and R. Stiefelhagen, editors. ACM
    • K. Farrahi and D.G. Perez. "Learning and predicting multimodal daily life patterns from cell phones," In J.L. Crowley, Y. Ivanov, C.R. Wren, D. Gatica-Perez, M. Johnston, and R. Stiefelhagen, editors, ICMI, pages 277-280. ACM, 2009.
    • (2009) ICMI , pp. 277-280
    • Farrahi, K.1    Perez, D.G.2
  • 20
    • 76649138917 scopus 로고    scopus 로고
    • Virusmeter: Preventing your cellphone from spies
    • E. Kirda, S. Jha, and D. Balzarotti, editors of Lecture Notes in Computer Science. Springer
    • L. Liu, G. Yan, X. Zhang, and S. Chen. "Virusmeter: Preventing your cellphone from spies," In E. Kirda, S. Jha, and D. Balzarotti, editors, RAID, volume 5758 of Lecture Notes in Computer Science, pages 244-264. Springer, 2009.
    • (2009) RAID , vol.5758 , pp. 244-264
    • Liu, L.1    Yan, G.2    Zhang, X.3    Chen, S.4
  • 23
    • 77950851532 scopus 로고    scopus 로고
    • Semantically rich application-centric security in Android
    • IEEE Computer Society
    • M. Ongtang, S. E. McLaughlin, W. Enck, and P. D. McDaniel. "Semantically rich application-centric security in Android," In ACSAC, pages 340-349. IEEE Computer Society, 2009.
    • (2009) ACSAC , pp. 340-349
    • Ongtang, M.1    McLaughlin, S.E.2    Enck, W.3    McDaniel, P.D.4
  • 31
    • 79960330115 scopus 로고    scopus 로고
    • The Tor Project. Tor: anonymity online. http://www.torproject.org/, 2009.
    • (2009) Tor: Anonymity Online
  • 32
    • 70349309702 scopus 로고    scopus 로고
    • Securing cellular infrastructure: Challenges and opportunities
    • P. Traynor. "Securing cellular infrastructure: Challenges and opportunities," IEEE Security & Privacy, 7(4):77-79, 2009.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.4 , pp. 77-79
    • Traynor, P.1
  • 35
    • 84882198584 scopus 로고    scopus 로고
    • Compromising electromagnetic emanations of wired and wireless key-boards
    • Montreal, Canada. USENIX Association
    • M. Vuagnoux and S. Pasini. "Compromising electromagnetic emanations of wired and wireless key-boards," In proceedings of the 18th USENIX Security Symposium, pages 1-16, Montreal, Canada, 2009. USENIX Association.
    • (2009) Proceedings of the 18th USENIX Security Symposium , pp. 1-16
    • Vuagnoux, M.1    Pasini, S.2
  • 39
    • 77954483223 scopus 로고    scopus 로고
    • Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
    • Montreal, Canada. USENIX Association
    • K. Zhang and X. Wang. "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-user Systems," In USENIX Security 09: proceedings of the 18th USENIX Security Symposium, Montreal, Canada, 2008. USENIX Association.
    • (2008) USENIX Security 09: Proceedings of the 18th USENIX Security Symposium
    • Zhang, K.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.