메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A business model for cloud computing based on a separate encryption and decryption service

Author keywords

Cloud computing; Data privacy protection; Encryption and decryption cloud service; Service level agreements

Indexed keywords

APPLICATION SYSTEMS; BUSINESS MODELS; CLOUD SYSTEMS; CRM APPLICATIONS; CUSTOMER RELATIONSHIP MANAGEMENT; DATA ACCESS; DATA ENCRYPTION; DATA PRIVACY PROTECTION; DATA STORAGE SYSTEMS; DECRYPTION KEYS; ENCRYPTED DATA; ENCRYPTION AND DECRYPTION; ENCRYPTION AND DECRYPTION CLOUD SERVICE; ENCRYPTION/DECRYPTION; INFORMATION PRIVACY; INTERNAL STORAGE; MULTI-PARTY SERVICE; PLAINTEXT; SERVICE LEVEL AGREEMENTS; SERVICE PROVIDER; STORAGE SERVICES; STORAGE SYSTEMS; SYSTEM ADMINISTRATORS;

EID: 79960241719     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICISA.2011.5772349     Document Type: Conference Paper
Times cited : (44)

References (17)
  • 1
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the clouds
    • December
    • A. Weiss, "Computing in the clouds", netWorker, vol. 11, no. 4, pp. 16-25, December 2007.
    • (2007) NetWorker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 2
    • 77955519189 scopus 로고    scopus 로고
    • Autonomic metered pricing for a utility computing service
    • October
    • C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
    • (2010) Future Generation Computer Systems , vol.26 , Issue.8 , pp. 1368-1380
    • Yeo, C.S.1    Venugopal, S.2    Chu, X.3    Buyya, R.4
  • 5
    • 25844499675 scopus 로고    scopus 로고
    • Autonomic computing
    • DOI 10.1007/s11334-005-0001-5
    • R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005. (Pubitemid 41683853)
    • (2005) Innovations in Systems and Software Engineering , vol.1 , Issue.1 , pp. 79-88
    • Sterritt, R.1
  • 6
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • June
    • R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.
    • (2008) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 9
    • 71749100243 scopus 로고    scopus 로고
    • Finding security in the cloud
    • October
    • N. Hawthorn, "Finding security in the cloud," Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
    • (2009) Computer Fraud & Security , vol.2009 , Issue.10 , pp. 19-20
    • Hawthorn, N.1
  • 10
    • 67650951127 scopus 로고    scopus 로고
    • Online data storage using implicit security
    • September
    • A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009.
    • (2009) Information Sciences , vol.179 , Issue.19 , pp. 3323-3333
    • Parakh, A.1    Kak, S.2
  • 11
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Advances in Cryptology - CRYPTO '85
    • V. Miller, "Uses of elliptic curves in cryptography," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, pp. 417-426, 1986.
    • (1986) Lecture Notes in Computer Science , pp. 417-426
    • Miller, V.1
  • 13
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 14
    • 33744979078 scopus 로고    scopus 로고
    • Design of an enhancement for SSL/TLS protocols
    • DOI 10.1016/j.cose.2006.02.007, PII S0167404806000319
    • A. Elgohary, T. S. Sobh, and M. Zaki, "Design of an enhancement for SSL/TLS protocols," Computers & Security, vol. 25, no. 4, pp. 297-306, June 2006. (Pubitemid 43866954)
    • (2006) Computers and Security , vol.25 , Issue.4 , pp. 297-306
    • Elgohary, A.1    Sobh, T.S.2    Zaki, M.3
  • 15
    • 77954407691 scopus 로고    scopus 로고
    • Salesforce.com, Inc Retrieved Dec.
    • Salesforce.com, Inc., "Force.com platform," Retrieved Dec. 2009, from http://www.salesforce.com/tw/
    • (2009) Force.com Platform
  • 16
    • 79960226270 scopus 로고    scopus 로고
    • SAP AG Retrieved Jan.
    • SAP AG., "SAP services: maximize your success," Retrieved Jan. 2010, from http://www.sap.com/services/index.epx
    • (2010) SAP Services: Maximize Your Success
  • 17
    • 52249115614 scopus 로고    scopus 로고
    • Services mashups: The new generation of web applications
    • D. Benslimane, S. Dustdar, and A. Sheth, "Services mashups: the new generation of web applications". IEEE Internet Computing, vol. 12, no. 5, pp. 13-15, 2008.
    • (2008) IEEE Internet Computing , vol.12 , Issue.5 , pp. 13-15
    • Benslimane, D.1    Dustdar, S.2    Sheth, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.