-
1
-
-
77957939763
-
-
http://java.sun.com/products/archive/jaas/.
-
-
-
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In Proc, of ACM conference on Computer and communications security, pages 598-609, 2007.
-
(2007)
Proc, of ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
70350546040
-
Privacy-preserving indexing of documents on the network
-
Mayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, and Jaideep Vaidya. Privacy-preserving indexing of documents on the network. VLDB J., 18(4):837-856, 2009.
-
(2009)
VLDB J.
, vol.18
, Issue.4
, pp. 837-856
-
-
Bawa, M.1
Bayardo, R.J.2
Agrawal, R.3
Vaidya, J.4
-
6
-
-
77957945131
-
-
Black Duck Koders.com
-
Black Duck Koders.com. Pbkdf2 java. http://forums.sun.com/thread.jspa? threadID=5306039.
-
Pbkdf2 Java
-
-
-
11
-
-
14544292262
-
-
OASIS Security Services Technical Committee
-
OASIS Security Services Technical Committee. Security assertion markup language (saml) 2.0. http://www.oasisopen.org/committees/tc-home.php?wgabbrev= security.
-
Security Assertion Markup Language (saml) 2.0
-
-
-
17
-
-
70349309706
-
Data security in the world of cloud computing
-
L. M. Kaufman. Data security in the World of Cloud Computing. IEEE Security and Privacy, 7(4):61-64, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
18
-
-
85077532807
-
A cooperative internet backup scheme
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX Annual Technical Conference, pages 29-41, 2003.
-
(2003)
USENIX Annual Technical Conference
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
21
-
-
77954914530
-
Cloud Computing: Clash of the clouds
-
Cloud Computing: Clash of the clouds. The economist. 2009.
-
(2009)
The Economist
-
-
-
25
-
-
71749102261
-
A privacy manager for cloud computing
-
Siani Pearson, Yun Shen, and Miranda Mowbray. A privacy manager for cloud computing. In CloudCom, pages 90-106, 2009.
-
(2009)
CloudCom
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
28
-
-
77957969940
-
-
Proofpoint. http://www.proofpoint.com/.
-
Proofpoint
-
-
-
29
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
0
-
B. P. Rimal, E. Choi, and I. Lumb. A taxonomy and survey of Cloud Computing systems. Networked Computing and Advanced Information Management, International Conference on, 0:44-51, 2009.
-
(2009)
Networked Computing and Advanced Information Management, International Conference on
, pp. 44-51
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
31
-
-
84876306509
-
-
Salesforce. http://www.salesforce.com/.
-
Salesforce
-
-
-
32
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
33
-
-
38349006925
-
Simplified privacy controls for aggregated services - suspend and resume of personal data
-
M. Schunter and M. Waidner. Simplified privacy controls for aggregated services - suspend and resume of personal data. In Proc. of Privacy Enhancing Technologies, pages 218-232, 2007.
-
(2007)
Proc. of Privacy Enhancing Technologies
, pp. 218-232
-
-
Schunter, M.1
Waidner, M.2
-
38
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS, pages 355-370, 2009.
-
(2009)
ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
39
-
-
77957953210
-
-
Workday. http://www.workday.com/.
-
Workday
-
-
-
40
-
-
41849093709
-
Towards privacy-preserving model selection
-
Zhiqiang Yang, Sheng Zhong, and Rebecca N. Wright. Towards privacy-preserving model selection. In PinKDD, pages 138-152, 2007.
-
(2007)
PinKDD
, pp. 138-152
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
|