-
1
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85-90, ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
2
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
8
-
-
71749119798
-
Access control of cloud service based on ucon
-
Springer Berlin / Heidelberg
-
C. Danwei, H. Xiuli, and R. Xunyi, "Access control of cloud service based on ucon," in Cloud Computing, pp. 559-564, Springer Berlin / Heidelberg, 2009.
-
(2009)
Cloud Computing
, pp. 559-564
-
-
Danwei, C.1
Xiuli, H.2
Xunyi, R.3
-
12
-
-
84857978060
-
-
tech. rep., NIST: National Institute of Standards and Technology, U.S. Department of Commerce, Oct
-
M. Wilson and J. Hash, "Nist special publication 800-50: Building an information technology security awareness and training program," tech. rep., NIST: National Institute of Standards and Technology, U.S. Department of Commerce, Oct 2003.
-
(2003)
Nist Special Publication 800-50: Building An Information Technology Security Awareness and Training Program
-
-
Wilson, M.1
Hash, J.2
-
13
-
-
33645723526
-
-
tech. rep., NIST: National Institute of Standards and Technology, U.S. Department of Commerce, July
-
R. Ross, A. Johnson, S. Katzke, P. Toth, G. Stoneburner, and G. Rogers, "Nist special publication 800-53a: Guide for assessing the security controls in federal information systems," tech. rep., NIST: National Institute of Standards and Technology, U.S. Department of Commerce, July 2008.
-
(2008)
Nist Special Publication 800-53a: Guide for Assessing the Security Controls in Federal Information Systems
-
-
Ross, R.1
Johnson, A.2
Katzke, S.3
Toth, P.4
Stoneburner, G.5
Rogers, G.6
-
14
-
-
83755183262
-
-
May Available at
-
A. Sharma, "Cloud computing and open source," May 2010. Available at: http://ldn.linuxfoundation.org/article/cloud-computing-and-open- source.
-
(2010)
Cloud Computing and Open Source
-
-
Sharma, A.1
-
16
-
-
33847329743
-
An rfid distance bounding protocol
-
IEEE Computer Society Press
-
G. Hancke and M. Kuhn, "An rfid distance bounding protocol," in IEEE/Create-Net SecureComm, pp. 67-73, IEEE Computer Society Press, 2005.
-
(2005)
IEEE/Create-Net SecureComm
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
|