-
1
-
-
77956385334
-
-
accessed in Aug. 2010. Online at
-
"Cloud Computing," NIST, accessed in Aug. 2010. Online at: http://csrc.nist.gov/groups/SNS/cloud-computing/
-
Cloud Computing
-
-
-
2
-
-
77954931916
-
Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
-
Feb. Online at
-
R. Gellman, "Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing," World Privacy Forum, Feb. 2009. Online at: http://www.worldprivacyforum.org/pdf/WPF-Cloud-Privacy-Report.pdf
-
(2009)
World Privacy Forum
-
-
Gellman, R.1
-
3
-
-
78650535610
-
A User-Centric Approach for Privacy and Identity Management in Cloud Computing
-
th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New Delhi , India, Nov. 2010.
-
th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New Delhi, India, Nov. 2010
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Ben Othmane, L.5
Lilien, L.6
Linderman, M.7
-
4
-
-
78650573573
-
Cloud Computing Identity Management
-
Online at
-
A. Gopalakrishnan, "Cloud Computing Identity Management," SETLabs Briefings, vol. 7, 2009. Online at: http://www.infosys.com/research/
-
(2009)
SETLabs Briefings
, vol.7
-
-
Gopalakrishnan, A.1
-
5
-
-
78650574904
-
-
Website, accessed in Aug. 2010. Online at
-
OpenID Foundation Website, accessed in Aug. 2010. Online at: http://openid.net/
-
-
-
-
6
-
-
78650548216
-
-
accessed in Aug. 2010. Online at
-
K. Cameron, "Identity Web blog," accessed in Aug. 2010. Online at: http://www.identityblog.com/?=p685
-
Identity Web Blog
-
-
Cameron, K.1
-
8
-
-
33646878754
-
A Scheme for Privacy-preserving Data Dissemination
-
L. Lilien, and B. Bhargava, "A Scheme for Privacy-preserving Data Dissemination," IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans, Vol. 36(3), 2006.
-
(2006)
IEEE Trans. on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.36
, Issue.3
-
-
Lilien, L.1
Bhargava, B.2
-
9
-
-
42149083231
-
Profiling a Million User DHT
-
J. Falkner, M. Piatek, J. John, A. Krishnamurthy, and T. Anderson, "Profiling a Million User DHT," Proc. 7th ACM SIGCOMM Conference on Internet Measurement. San Diego, CA. Oct. 2007, pp. 129-134.
-
Proc. 7th ACM SIGCOMM Conference on Internet Measurement. San Diego, CA. Oct. 2007
, pp. 129-134
-
-
Falkner, J.1
Piatek, M.2
John, J.3
Krishnamurthy, A.4
Anderson, T.5
-
13
-
-
78650542662
-
-
Ph.D. Thesis. Carnegie Mellon University, Pittsburgh, PA. Oct.
-
E. Shi, "Evaluating Predicates over Encrypted Data," Ph.D. Thesis. Carnegie Mellon University, Pittsburgh, PA. Oct. 2008.
-
(2008)
Evaluating Predicates over Encrypted Data
-
-
Shi, E.1
-
14
-
-
0018545449
-
How to Share a Secret
-
Nov.
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22(11), Nov. 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," Proc. Twentieth Annual ACM Symposium on Theory of Computing. Chicago, IL. May 1988, pp.1-10.
-
Proc. Twentieth Annual ACM Symposium on Theory of Computing. Chicago, IL. May 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
16
-
-
74549182764
-
Protecting Privacy in Sensitive Data Dissemination with Active Bundles
-
L. Ben Othmane, and L. Lilien, "Protecting Privacy in Sensitive Data Dissemination with Active Bundles," Proc. 7th Annual Conference on Privacy, Security & Trust (PST 2009), Saint John, New Brunswick, Canada, Aug 2009.
-
Proc. 7th Annual Conference on Privacy, Security & Trust (PST 2009), Saint John, New Brunswick, Canada, Aug 2009
-
-
Ben Othmane, L.1
Lilien, L.2
-
17
-
-
74049152260
-
Hey, You, Get off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
T. Ristenpart, E. Tromer, H. Shacham, S. Savage, "Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 6th ACM conference on Computer and Communications Security, Chicago, IL, Nov. 2009, pp. 199-212.
-
Proc. 6th ACM Conference on Computer and Communications Security, Chicago, IL, Nov. 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
|