메뉴 건너뛰기




Volumn , Issue , 2010, Pages 368-372

Protection of identity information in cloud computing without trusted third party

Author keywords

Active bundle; Cloud computing; Computing predicates; Identity management system; Multi party computing; Privacy; Security

Indexed keywords

ACTIVE BUNDLE; CLOUD COMPUTING; COMPUTING PREDICATES; IDENTITY MANAGEMENT SYSTEMS; MULTI-PARTY COMPUTING; PRIVACY; SECURITY;

EID: 78650536265     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2010.57     Document Type: Conference Paper
Times cited : (68)

References (17)
  • 1
    • 77956385334 scopus 로고    scopus 로고
    • accessed in Aug. 2010. Online at
    • "Cloud Computing," NIST, accessed in Aug. 2010. Online at: http://csrc.nist.gov/groups/SNS/cloud-computing/
    • Cloud Computing
  • 2
    • 77954931916 scopus 로고    scopus 로고
    • Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
    • Feb. Online at
    • R. Gellman, "Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing," World Privacy Forum, Feb. 2009. Online at: http://www.worldprivacyforum.org/pdf/WPF-Cloud-Privacy-Report.pdf
    • (2009) World Privacy Forum
    • Gellman, R.1
  • 4
    • 78650573573 scopus 로고    scopus 로고
    • Cloud Computing Identity Management
    • Online at
    • A. Gopalakrishnan, "Cloud Computing Identity Management," SETLabs Briefings, vol. 7, 2009. Online at: http://www.infosys.com/research/
    • (2009) SETLabs Briefings , vol.7
    • Gopalakrishnan, A.1
  • 5
    • 78650574904 scopus 로고    scopus 로고
    • Website, accessed in Aug. 2010. Online at
    • OpenID Foundation Website, accessed in Aug. 2010. Online at: http://openid.net/
  • 6
    • 78650548216 scopus 로고    scopus 로고
    • accessed in Aug. 2010. Online at
    • K. Cameron, "Identity Web blog," accessed in Aug. 2010. Online at: http://www.identityblog.com/?=p685
    • Identity Web Blog
    • Cameron, K.1
  • 13
    • 78650542662 scopus 로고    scopus 로고
    • Ph.D. Thesis. Carnegie Mellon University, Pittsburgh, PA. Oct.
    • E. Shi, "Evaluating Predicates over Encrypted Data," Ph.D. Thesis. Carnegie Mellon University, Pittsburgh, PA. Oct. 2008.
    • (2008) Evaluating Predicates over Encrypted Data
    • Shi, E.1
  • 14
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Nov.
    • A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22(11), Nov. 1979, pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.