메뉴 건너뛰기




Volumn 6163 LNCS, Issue , 2010, Pages 104-128

SocialClouds: Concept, security architecture and some mechanisms

Author keywords

authentication; Cloud computing; credentials; security; social computing; social networks

Indexed keywords

CLOUD COMPUTING; COMPUTING PLATFORM; CRYPTOGRAPHIC ARCHITECTURE; DATA CENTERS; IDENTIFICATION SCHEME; LARGE POPULATION; SECURITY; SECURITY ARCHITECTURE; SECURITY CHALLENGES; SOCIAL COMPUTING; SOCIAL NETWORKS; SOCIAL RELATIONSHIPS;

EID: 77955007911     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14597-1_7     Document Type: Conference Paper
Times cited : (10)

References (39)
  • 1
    • 84995514651 scopus 로고    scopus 로고
    • Privacy-enabling social networking over untrusted networks
    • Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Proc. WOSN 2009, pp. 1-6 (2009)
    • (2009) Proc. WOSN 2009 , pp. 1-6
    • Anderson, J.1    Diaz, C.2    Bonneau, J.3    Stajano, F.4
  • 5
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Bellare, M., Micciancio, D.,Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 6
    • 0027726717 scopus 로고    scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM CCS 2003, pp. 62-73 (2003)
    • (2003) Proc. ACM CCS 2003 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 64849115333 scopus 로고    scopus 로고
    • A case for P2P infrastructure for social networks - Opportunities and challenges
    • Buchegger, S., Datta, A.: A case for P2P infrastructure for social networks - opportunities and challenges. In: WONS 2009 (2009)
    • (2009) WONS 2009
    • Buchegger, S.1    Datta, A.2
  • 13
    • 70450172971 scopus 로고    scopus 로고
    • PeerSoN: P2P social networking - Early experiences and insights
    • Buchegger, S., Schiöberg, D., Vu, L., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: WOSN 2009 (2009)
    • (2009) WOSN 2009
    • Buchegger, S.1    Schiöberg, D.2    Vu, L.3    Datta, A.4
  • 14
  • 15
  • 16
    • 85024290278 scopus 로고
    • Group signatures
    • Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Chaum, D., Van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 18
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 19
    • 64849110666 scopus 로고    scopus 로고
    • Privacy preserving social networking through decentralization
    • Cutillo, L., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: WONS 2009 (2009)
    • (2009) WONS 2009
    • Cutillo, L.1    Molva, R.2    Strufe, T.3
  • 20
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 21
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 22
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • Douceur, J.: The sybil attack. In: Proc. IPTPS 2001, pp. 251-260 (2001)
    • (2001) Proc. IPTPS 2001 , pp. 251-260
    • Douceur, J.1
  • 23
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 24
    • 0016560084 scopus 로고
    • Fast approximation for the knapsack and sum of subset problems
    • Ibarra, O., Kim, C.: Fast approximation for the knapsack and sum of subset problems. Journal of ACM 22(4), 463-468 (1975)
    • (1975) Journal of ACM , vol.22 , Issue.4 , pp. 463-468
    • Ibarra, O.1    Kim, C.2
  • 28
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds
    • Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds. In: CCS 2009 (2009)
    • (2009) CCS 2009
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 31
    • 84995370788 scopus 로고    scopus 로고
    • Privacy, cost, and availability tradeoffs in decentralized osns
    • Shakimov, A., Varshavsky, A., Cox, L., Cáceres, R.: Privacy, cost, and availability tradeoffs in decentralized osns. In: Proc. WOSN 2009, pp. 13-18 (2009)
    • (2009) Proc. WOSN 2009 , pp. 13-18
    • Shakimov, A.1    Varshavsky, A.2    Cox, L.3    Cáceres, R.4
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. C. ACM 22, 612-613 (1979)
    • (1979) C. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 33
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 35
    • 77954996619 scopus 로고    scopus 로고
    • TCG, https://www.trustedcomputinggroup.org/
  • 37
    • 77952350757 scopus 로고    scopus 로고
    • Exploiting social networks for threshold signing: Attack-resilience vs. availability
    • Xu, S., Li, X., Parker, P.: Exploiting social networks for threshold signing: Attack-resilience vs. availability. In: Proc. ACM ASIACCS 2008, pp. 325-336 (2008)
    • (2008) Proc. ACM ASIACCS 2008 , pp. 325-336
    • Xu, S.1    Li, X.2    Parker, P.3
  • 39
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proc. ACM SIGCOMM 2006, pp. 267-278 (2006)
    • (2006) Proc. ACM SIGCOMM 2006 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.