-
3
-
-
33646514514
-
Bank outsources security to the cloud
-
Anonymous, December
-
Anonymous, "Bank outsources security to the cloud," COMMUNICATIONS NEWS, vol. 42, no. 12, December 2005.
-
(2005)
Communications News
, vol.42
, Issue.12
-
-
-
4
-
-
33748948241
-
Bank trusts security to 'the cloud'
-
September
-
-, "Bank trusts security to 'the cloud'," COMMUNICATIONS NEWS, vol. 43, no. 9, September 2006.
-
(2006)
Communications News
, vol.43
, Issue.9
-
-
-
5
-
-
77749299167
-
-
Apache Hadoop, 2009, http://hadoop.apache.org/.
-
(2009)
Apache Hadoop
-
-
-
6
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb [Online]. Available
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb 2009. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
7
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
London, UK: Springer-Verlag
-
M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing," in CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1994, pp. 216-233.
-
(1994)
CRYPTO '94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
8
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
New York, NY, USA: ACM
-
-, "Incremental cryptography and application to virus protection," in STOC '95: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. New York, NY, USA: ACM, 1995, pp. 45-56.
-
(1995)
STOC '95: Proceedings of the Twenty-seventh Annual ACM Symposium on Theory of Computing
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
9
-
-
71749119798
-
Access control of cloud service based on ucon
-
D. Chen, X. Huang, and X. Ren, "Access control of cloud service based on ucon," in The First International Conference on Cloud Computing, 2009, pp. 559-564.
-
The First International Conference on Cloud Computing, 2009
, pp. 559-564
-
-
Chen, D.1
Huang, X.2
Ren, X.3
-
10
-
-
77956948573
-
-
Condor DAGman, 2009, http://www.cs.wisc.edu/condor/dagman/.
-
(2009)
Condor DAGman
-
-
-
11
-
-
71849115601
-
Data protection-aware design for cloud services
-
S. Creese, P. Hopkins, S. Pearson, and Y. Shen, "Data protection-aware design for cloud services," in The First International Conference on Cloud Computing, 2009, pp. 119-130.
-
The First International Conference on Cloud Computing, 2009
, pp. 119-130
-
-
Creese, S.1
Hopkins, P.2
Pearson, S.3
Shen, Y.4
-
12
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, no. 1, pp. 107-113, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
13
-
-
77954525794
-
-
Eucalyptus, 2009, http://eucalyptus.cs.ucsb.edu/.
-
(2009)
Eucalyptus
-
-
-
14
-
-
77953072434
-
-
Google App Engine, 2009, http://appengine.google.com.
-
(2009)
Google App Engine
-
-
-
15
-
-
2942579016
-
RFC 2634 - Enhanced Security Services for S/MIME
-
Network Working Group, June
-
P. Hoffman, "RFC 2634 - Enhanced Security Services for S/MIME," Network Working Group, Request For Comment, June 1999.
-
(1999)
Request for Comment
-
-
Hoffman, P.1
-
16
-
-
71749101660
-
Towards an approach of semantic access control for cloud computing
-
L. Hu, S. Ying, X. Jia, and K. Zhao, "Towards an approach of semantic access control for cloud computing," in The First International Conference on Cloud Computing, 2009, pp. 145-156.
-
The First International Conference on Cloud Computing, 2009
, pp. 145-156
-
-
Hu, L.1
Ying, S.2
Jia, X.3
Zhao, K.4
-
17
-
-
34548041192
-
Dryad: Distributed data-parallel programs from sequential building blocks
-
New York, NY, USA: ACM, [Online]. Available
-
M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, "Dryad: distributed data-parallel programs from sequential building blocks," in EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007. New York, NY, USA: ACM, 2007, pp. 59-72. [Online]. Available: http://dx.doi.org/10.1145/1272996.1273005
-
(2007)
EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
, pp. 59-72
-
-
Isard, M.1
Budiu, M.2
Yu, Y.3
Birrell, A.4
Fetterly, D.5
-
18
-
-
70349309706
-
Data security in the world of cloud computing
-
July-August
-
L. Kaufman, "Data security in the world of cloud computing," IEEE SECURITY & PRIVACY, vol. 7, no. 4, July-August 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
-
-
Kaufman, L.1
-
19
-
-
71749113079
-
Identity-based authentication for cloud computing
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in The First International Conference on Cloud Computing, 2009, pp. 157-166.
-
The First International Conference on Cloud Computing, 2009
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
21
-
-
79952378406
-
-
Nimbus, 2009, http://workspace.globus.org/.
-
(2009)
Nimbus
-
-
-
23
-
-
71749102261
-
A privacy manager for cloud computing
-
S. Pearson, Y. Shen, and M. Mowbray, "A privacy manager for cloud computing," in The First International Conference on Cloud Computing, 2009, pp. 90-106.
-
The First International Conference on Cloud Computing, 2009
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
24
-
-
79952371846
-
RFC 3851 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification
-
Network Working Group, July [Online]. Available
-
B. Ramsdell, "RFC 3851 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification," Network Working Group, Request For Comment, July 2004. [Online]. Available: http://www.faqs.org/ rfcs/rfc3851.html
-
(2004)
Request for Comment
-
-
Ramsdell, B.1
-
25
-
-
79952427543
-
-
Salesforce, 2009, http://www.salesforce.com/.
-
(2009)
Salesforce
-
-
-
26
-
-
0018545449
-
How to share a secret
-
[Online]. Available
-
A. Shamir, "How to share a secret," Comm. ACM, vol. 22, no. 11, 1979. [Online]. Available: http://portal.acm.org/citation.cfm?id=359168.359176
-
(1979)
Comm. ACM
, vol.22
, Issue.11
-
-
Shamir, A.1
-
27
-
-
84925452156
-
Search-as-a-Service: Outsourced Search over Outsourced Storage
-
September
-
A. Singh, M. Srivatsa, and L. Liu, "Search-as-a-Service: Outsourced Search over Outsourced Storage," ACM TRANSACTIONS ON THE WEB, vol. 3, no. 4, September 2009.
-
(2009)
ACM Transactions on the Web
, vol.3
, Issue.4
-
-
Singh, A.1
Srivatsa, M.2
Liu, L.3
-
28
-
-
71749117758
-
Availability analysis of a scalable intrusion tolerant architecture with two detection modes
-
T. Uemura, T. Dohi, and N. Kaio, "Availability analysis of a scalable intrusion tolerant architecture with two detection modes," in The First International Conference on Cloud Computing, 2009, pp. 178-189.
-
The First International Conference on Cloud Computing, 2009
, pp. 178-189
-
-
Uemura, T.1
Dohi, T.2
Kaio, N.3
-
29
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
L. Yan, C. Rong, and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography," in The First International Conference on Cloud Computing, 2009, pp. 167-177.
-
The First International Conference on Cloud Computing, 2009
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
30
-
-
70350591395
-
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language
-
Y. Yu, M. Isard, D. Fetterly, M. Budiu, ú. Erlingsson, P. K. Gunda, and J. Currey, "DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language," in Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI '08), San Diego, CA, December 2008.
-
Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI '08), San Diego, CA, December 2008
-
-
Yu, Y.1
Isard, M.2
Fetterly, D.3
Budiu, M.4
Erlingsson, Ú.5
Gunda, P.K.6
Currey, J.7
-
31
-
-
71749114896
-
Cloud computing: A statistics aspect of users
-
The First International Conference on Cloud Computing, ser. M. G. Jaatun, G. Zhao, and C. Rong, Eds., Springer, [Online]. Available
-
G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. ping Ye, and N. Tang, "Cloud computing: A statistics aspect of users." in The First International Conference on Cloud Computing, ser. Lecture Notes in Computer Science, M. G. Jaatun, G. Zhao, and C. Rong, Eds., vol. 5931. Springer, 2009, pp. 347-358. [Online]. Available: http://dblp.unitrier.de/db/conf/cloudcom/ cloudcom2009.html#ZhaoLTSZYT09
-
(2009)
Lecture Notes in Computer Science
, vol.5931
, pp. 347-358
-
-
Zhao, G.1
Liu, J.2
Tang, Y.3
Sun, W.4
Zhang, F.5
Ping Ye, X.6
Tang, N.7
-
32
-
-
38049084665
-
Distributed key management for secure role based messaging
-
G. Zhao, S. Otenko, and D. Chadwick, "Distributed key management for secure role based messaging," in Proceeding of The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vienna, Austria, April 2006.
-
Proceeding of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vienna, Austria, April 2006
-
-
Zhao, G.1
Otenko, S.2
Chadwick, D.3
|