메뉴 건너뛰기




Volumn , Issue , 2010, Pages 109-114

On securing untrusted clouds with cryptography

Author keywords

cloud computing; economics; security

Indexed keywords

CLOUD COMPUTING; CPU CYCLES; CURRENT TECHNIQUES; ENCRYPTED DATA; ORDERS OF MAGNITUDE; SECURITY; SMALL ENTERPRISE;

EID: 78650219479     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866919.1866935     Document Type: Conference Paper
Times cited : (54)

References (40)
  • 4
    • 37849008829 scopus 로고    scopus 로고
    • Provably-secure schemes for basic query support in outsourced databases
    • S. Barker and G.-J. Ahn, editors, DBSec, Springer
    • G. Amanatidis, A. Boldyreva, and A. O'Neill. Provably-secure schemes for basic query support in outsourced databases. In S. Barker and G.-J. Ahn, editors, DBSec, volume 4602 of Lecture Notes in Computer Science, pages 14-30. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4602 , pp. 14-30
    • Amanatidis, G.1    Boldyreva, A.2    O'Neill, A.3
  • 6
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • A. Menezes, editor, CRYPTO, Springer
    • M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and efficiently searchable encryption. In A. Menezes, editor, CRYPTO, volume 4622 of Lecture Notes in Computer Science, pages 535-552. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 9
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.
    • (2003) EuroCrypt
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 19
    • 77957936026 scopus 로고    scopus 로고
    • Google Inc Online at
    • Google Inc. Google App Engine. Online at http://code.google.com/ appengine/.
    • Google App Engine
  • 31
    • 78650206764 scopus 로고    scopus 로고
    • Technical report, Microsoft Corporation, July
    • Microsoft Research. Encrypting File System for Windows 2000. Technical report, Microsoft Corporation, July 1999. www.microsoft.com/windows2000/ techinfo/ howitworks/security/encrypt.asp.
    • (1999) Microsoft Research. Encrypting File System for Windows 2000
  • 33
    • 35048891654 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/condensed signatures
    • Computer Security - ESORICS 2004, Springer
    • E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In Computer Security - ESORICS 2004, volume 3193 of Lecture Notes in Computer Science, pages 160-176. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 160-176
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 34
    • 34548160016 scopus 로고    scopus 로고
    • Authentication of Outsourced Databases using Signature Aggregation and Chaining
    • M. Narasimha and G. Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.
    • Proceedings of DASFAA, 2006
    • Narasimha, M.1    Tsudik, G.2
  • 35
    • 78650192086 scopus 로고    scopus 로고
    • Online at
    • Optimum. Optimum online plans. Online at http://www.buyoptimum.com.
    • Optimum Online Plans
  • 38
    • 33244473885 scopus 로고    scopus 로고
    • Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May
    • G. Sivathanu, C. P. Wright, and E. Zadok. Enhancing File System Integrity Through Checksums. Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May 2004. www.fsl.cs. sunysb.edu/docs/nc-checksum-tr/nc- checksum.pdf.
    • (2004) Enhancing File System Integrity Through Checksums
    • Sivathanu, G.1    Wright, C.P.2    Zadok, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.