메뉴 건너뛰기




Volumn , Issue , 2010, Pages 25-32

Towards a data-centric view of cloud security

Author keywords

Cloud security; Declarative networking; Secure data processing; System analysis and forensics

Indexed keywords

DATA CENTRIC; DATA MANAGEMENT; DECLARATIVE NETWORKINGS; DISTRIBUTED QUERY PROCESSING; DISTRIBUTED SYSTEMS; OPERATING SYSTEMS; RESEARCH COMMUNITIES; SECURE DATA; SECURITY ISSUES; SECURITY PROPERTIES; SYSTEM ANALYSIS; VIRTUAL MACHINES;

EID: 78651302566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1871929.1871934     Document Type: Conference Paper
Times cited : (16)

References (44)
  • 2
    • 78651331525 scopus 로고    scopus 로고
    • Stanford WebBase. http://diglib.stanford.edu:8091/~testbed/doc2/WebBase/.
  • 3
    • 52149087973 scopus 로고    scopus 로고
    • Logic in access control
    • M. Abadi. Logic in Access Control. In Proc. LICS, 2003.
    • (2003) Proc. LICS
    • Abadi, M.1
  • 7
    • 0002439387 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • P. Buneman, S. Khanna, and W. C. Tan. Why and where: A characterization of data provenance. In Proc. ICDT, 2001.
    • (2001) Proc. ICDT
    • Buneman, P.1    Khanna, S.2    Tan, W.C.3
  • 10
    • 85030321143 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In Proc. OSDI, 2004.
    • (2004) Proc. OSDI
    • Dean, J.1    Ghemawat, S.2
  • 11
    • 84867167943 scopus 로고    scopus 로고
    • Binder: A logic-based security language
    • J. DeTreville. Binder: A logic-based security language. In Proc IEEE S&P, 2002.
    • (2002) Proc IEEE S&P
    • De Treville, J.1
  • 12
    • 78651282483 scopus 로고    scopus 로고
    • *. http://www.joindiaspora.com.
    • *
  • 14
    • 85048840252 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • M. H. Feifei Li and G. Kollios. Dynamic authenticated index structures for outsourced databases. In Proc. SIGMOD, 2006.
    • (2006) Proc. SIGMOD
    • Feifei Li, M.H.1    Kollios, G.2
  • 18
    • 58049120018 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical Accountability for Distributed Systems. In Proc. SOSP, 2007.
    • (2007) Proc. SOSP
    • Haeberlen, A.1    Kuznetsov, P.2    Druschel, P.3
  • 19
    • 85062006160 scopus 로고    scopus 로고
    • The case of the fake picasso: Preventing history forgery with secure provenance
    • R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proc. FAST, 2009.
    • (2009) Proc. FAST
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 21
    • 33749662509 scopus 로고    scopus 로고
    • Orchestra: Rapid, collaborative sharing of dynamic data
    • Z. Ives, N. Khandelwal, A. Kapur, and M. Cakir. Orchestra: Rapid, collaborative sharing of dynamic data. In Proc. CIDR, 2005.
    • (2005) Proc. CIDR
    • Ives, Z.1    Khandelwal, N.2    Kapur, A.3    Cakir, M.4
  • 24
    • 0001251855 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM TOCS, 1992.
    • (1992) ACM TOCS
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 25
    • 67649647582 scopus 로고    scopus 로고
    • Recursive computation of regions and connectivity in networks
    • M. Liu, N. Taylor, W. Zhou, Z. Ives, and B. T. Loo. Recursive computation of regions and connectivity in networks. In Proc. ICDE, 2009.
    • (2009) Proc. ICDE
    • Liu, M.1    Taylor, N.2    Zhou, W.3    Ives, Z.4    Loo, B.T.5
  • 31
    • 58149462240 scopus 로고    scopus 로고
    • Partially materialized digest scheme: An efficient verification method for outsourced databases
    • K. Mouratidis, D. Sacharidis, and H. Pang. Partially materialized digest scheme: an efficient verification method for outsourced databases. VLDB Journal, 2009.
    • (2009) VLDB Journal
    • Mouratidis, K.1    Sacharidis, D.2    Pang, H.3
  • 33
    • 24944520998 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Proc. NDSS, 2004.
    • (2004) Proc. NDSS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 35
    • 40049111546 scopus 로고    scopus 로고
    • Verifying completeness of relational query answers from online servers
    • H. Pang and K.-L. Tan. Verifying Completeness of Relational Query Answers from Online Servers. ACM TISSEC, 2008.
    • (2008) ACM TISSEC
    • Pang, H.1    Tan, K.-L.2
  • 37
    • 78651331099 scopus 로고    scopus 로고
    • Resource management for isolation enhanced cloud services
    • H. Raj, R. Nathuji, A. Singh, and P. England. Resource Management for Isolation Enhanced Cloud Services. In Proc. CCSW, 2009.
    • (2009) Proc. CCSW
    • Raj, H.1    Nathuji, R.2    Singh, A.3    England, P.4
  • 38
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In Proc. SIGMOD, 2004.
    • (2004) Proc. SIGMOD
    • Rizvi, S.1    Mendelzon, A.O.2    Sudarshan, S.3    Roy, P.4
  • 41
    • 78449235064 scopus 로고    scopus 로고
    • Managing security of virtual machine images in a cloud environment
    • J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing Security of Virtual Machine Images in a Cloud Environment. In Proc. CCSW, 2009.
    • (2009) Proc. CCSW
    • Wei, J.1    Zhang, X.2    Ammons, G.3    Bala, V.4    Ning, P.5
  • 42
    • 67649635248 scopus 로고    scopus 로고
    • Unified declarative platform for secure networked information systems
    • W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In Proc. ICDE, 2009.
    • (2009) Proc. ICDE
    • Zhou, W.1    Mao, Y.2    Loo, B.T.3    Abadi, M.4
  • 43
    • 77954746819 scopus 로고    scopus 로고
    • Efficient querying and maintenance of network provenance at internet-scale
    • W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at internet-scale. In Proc. SIGMOD, 2010.
    • (2010) Proc. SIGMOD
    • Zhou, W.1    Sherr, M.2    Tao, T.3    Li, X.4    Loo, B.T.5    Mao, Y.6
  • 44
    • 78651268739 scopus 로고    scopus 로고
    • From facebook, answering privacy concerns with new settings
    • 24 May
    • M. Zuckerberg. From Facebook, Answering Privacy Concerns with New Settings. The Washington Post, 24 May 2010.
    • (2010) The Washington Post
    • Zuckerberg, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.