-
1
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al., "Above the clouds: A berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
5
-
-
74049154660
-
Secure and efficient access to outsourced data
-
W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and efficient access to outsourced data," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 55-66.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
6
-
-
74049138993
-
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
-
A. Yun, C. Shi, and Y. Kim, "On protecting integrity and confidentiality of cryptographic file system for outsourced storage," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 67-76.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 67-76
-
-
Yun, A.1
Shi, C.2
Kim, Y.3
-
7
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 85-90.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
78449254291
-
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study
-
J. Sobey, T. Whalen, R. Biddle, P. V. Oorschot, and A. Patrick, "Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study," in Proceedings of the ACM workshop on Cloud computing security, 2009.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
-
-
Sobey, J.1
Whalen, T.2
Biddle, R.3
Oorschot, P.V.4
Patrick, A.5
-
10
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning, "Managing security of virtual machine images in a cloud environment," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 91-96.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
11
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
M. Christodorescu, R. Sailer, D. Schales, D. Sgandurra, and D. Zamboni, "Cloud security is not (just) virtualization security: a short paper," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 97-102.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.3
Sgandurra, D.4
Zamboni, D.5
-
12
-
-
74049110390
-
Patient Controlled Encryption: Patient privacy in electronic medical records
-
M. Chase, K. Lauter, J. Benaloh, and E. Horvitz, "Patient Controlled Encryption: patient privacy in electronic medical records," in Proceedings of the ACM workshop on Cloud computing security, 2009.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
-
-
Chase, M.1
Lauter, K.2
Benaloh, J.3
Horvitz, E.4
-
13
-
-
74049149270
-
Secure Anonymous Database Search
-
M. Raykova, B. Vo, S. Bellovin, and T. Malkin, "Secure Anonymous Database Search," in Proceedings of the ACM workshop on Cloud computing security, 2009.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
-
-
Raykova, M.1
Vo, B.2
Bellovin, S.3
Malkin, T.4
-
14
-
-
67650675490
-
Enabling pervasive collaboration with platform composition
-
T. Pering, R. Want, B. Rosario, S. Sud, and K. Lyons, "Enabling pervasive collaboration with platform composition," Proceedings of Perviasive, 2009.
-
Proceedings of Perviasive, 2009
-
-
Pering, T.1
Want, R.2
Rosario, B.3
Sud, S.4
Lyons, K.5
-
15
-
-
70449698814
-
Multi-display Composition: Supporting Display Sharing for Collocated Mobile Devices
-
K. Lyons, T. Pering, B. Rosario, S. Sud, and R. Want, "Multi-display Composition: Supporting Display Sharing for Collocated Mobile Devices," in Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I, 2009.
-
Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I, 2009
-
-
Lyons, K.1
Pering, T.2
Rosario, B.3
Sud, S.4
Want, R.5
-
18
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, "Securing elastic applications on mobile devices for cloud computing," in Proceedings of the ACM workshop on Cloud computing security, 2009, pp. 127-134.
-
Proceedings of the ACM Workshop on Cloud Computing Security, 2009
, pp. 127-134
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
19
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, "Virtualized in-cloud security services for mobile devices," in Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008, pp. 31-35.
-
Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
21
-
-
34548775145
-
NetFPGA-an open platform for gigabit-rate network switching and routing
-
J. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous, R. Raghuraman, and J. Luo, "NetFPGA-an open platform for gigabit-rate network switching and routing," in IEEE International Conference on Microelectronic Systems Education, 2007.
-
IEEE International Conference on Microelectronic Systems Education, 2007
-
-
Lockwood, J.1
McKeown, N.2
Watson, G.3
Gibb, G.4
Hartke, P.5
Naous, J.6
Raghuraman, R.7
Luo, J.8
-
22
-
-
49949097790
-
Multi-Tenant Data Architecture
-
available at
-
F. Chong, G. Carraro, and R. Wolter, "Multi-Tenant Data Architecture," Microsoft MSDN Document, available at http://msdn.microsoft. com/en-us/library/aa479086.aspx, 2006.
-
(2006)
Microsoft MSDN Document
-
-
Chong, F.1
Carraro, G.2
Wolter, R.3
-
24
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM Journal of Computing, vol. 32, no. 2, pp. 586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.2
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
27
-
-
33749513451
-
A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks
-
M. Refaei, V. Srivastava, L. DaSilva, and M. Eltoweissy, "A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks," in in Proceedings of the IEEE Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS), 2005.
-
Proceedings of the IEEE Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS), 2005
-
-
Refaei, M.1
Srivastava, V.2
DaSilva, L.3
Eltoweissy, M.4
-
28
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
T. View, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 305-317, 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 305-317
-
-
View, T.1
-
29
-
-
68249092616
-
Group force mobility model and its obstacle avoidance capability
-
October-November
-
S. A. Williams and D. Huang, "Group force mobility model and its obstacle avoidance capability," Journal of the International Academy of Astronautics, Acta Astronautica, vol. 65, no. 7-8, pp. 949-957, October-November 2009.
-
(2009)
Journal of the International Academy of Astronautics, Acta Astronautica
, vol.65
, Issue.7-8
, pp. 949-957
-
-
Williams, S.A.1
Huang, D.2
-
32
-
-
74049152260
-
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," in ACM Conference on Computer and Communications Security, 2009.
-
ACM Conference on Computer and Communications Security, 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
33
-
-
75349109660
-
CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks
-
M. Musolesi and C. Mascolo, "CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks," IEEE Transactions on Mobile Computing, vol. 8, no. 2, pp. 246-260, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.2
, pp. 246-260
-
-
Musolesi, M.1
Mascolo, C.2
|