-
1
-
-
0142091714
-
Turning software into a service
-
M. Turner, D. Budgen, and P. Brereton, "Turning Software into a Service," Computer, vol. 36, no. 10, pp. 38-44, 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 38-44
-
-
Turner, M.1
Budgen, D.2
Brereton, P.3
-
3
-
-
0035812694
-
Protein structure prediction and structural genomics
-
D. Baker and A. Sali, "Protein structure prediction and structural genomics," Science's STKE, vol. 294, no. 5540, p. 93, 2001.
-
(2001)
Science's STKE
, vol.294
, Issue.5540
, pp. 93
-
-
Baker, D.1
Sali, A.2
-
5
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
54249165796
-
-
IBM Press
-
D. Challener, K. Yoder, R. Catherman, D. Safford, and L. Van Doorn, A practical guide to trusted computing. IBM Press, 2007.
-
(2007)
A Practical Guide to Trusted Computing
-
-
Challener, D.1
Yoder, K.2
Catherman, R.3
Safford, D.4
Van Doorn, L.5
-
9
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
New York, NY, USA: ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation," in CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security. New York, NY, USA: ACM, 2009, pp. 43-54.
-
(2009)
CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
10
-
-
79960385470
-
-
Springer Berlin ch. Secure Data Management in Trusted Computing
-
U. Kuhn, K. Kursawe, S. Lucks, A. Sadeghi, and C. Stuble, Cryptographic Hardware and Embedded Systems. Springer Berlin, 2005, vol. 3659/2005, ch. Secure Data Management in Trusted Computing.
-
(2005)
Cryptographic Hardware and Embedded Systems
, vol.3659
, Issue.2005
-
-
Kuhn, U.1
Kursawe, K.2
Lucks, S.3
Sadeghi, A.4
Stuble, C.5
-
11
-
-
77649302043
-
Enhance the user data privacy for saas by separation of data
-
2009 International Conference on 26-27
-
Z. Qiang and C. Dong, "Enhance the user data privacy for saas by separation of data," in Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on, vol. 3, 26-27 2009, pp. 130 - 132.
-
(2009)
Information Management, Innovation Management and Industrial Engineering
, vol.3
, pp. 130-132
-
-
Qiang, Z.1
Dong, C.2
-
12
-
-
77749344712
-
Data privacy preserving mechanism based on tenant customization for saas
-
MINES '09. International Conference on 18-20
-
K. Zhang, Y. Shi, Q. Li, and J. Bian, "Data privacy preserving mechanism based on tenant customization for saas," in Multimedia Information Networking and Security, 2009. MINES '09. International Conference on, vol. 1, 18-20 2009, pp. 599-603.
-
(2009)
Multimedia Information Networking and Security, 2009
, vol.1
, pp. 599-603
-
-
Zhang, K.1
Shi, Y.2
Li, Q.3
Bian, J.4
-
15
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 2, pp. 85-106, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
16
-
-
68249129760
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb [Online]
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the clouds: A berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb 2009. [Online]. Available: http://www.eecs.berkeley.edu/ Pubs/TechRpts/2009/EECS-2009-28.html
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
17
-
-
1842583323
-
Understanding service-oriented software
-
N. Gold, C. Knight, A. Mohan, and M. Munro, "Understanding service-oriented software," IEEE Softw., vol. 21, no. 2, pp. 71-77, 2004.
-
(2004)
IEEE Softw.
, vol.21
, Issue.2
, pp. 71-77
-
-
Gold, N.1
Knight, C.2
Mohan, A.3
Munro, M.4
-
19
-
-
58149233944
-
Short-term and long-term competition between providers of shrink-wrap software and software as a service
-
M. Fan, S. Kumar, and A. B. Whinston, "Short-term and long-term competition between providers of shrink-wrap software and software as a service," European Journal of Operational Research, vol. 196, no. 2, pp. 661 - 671, 2009.
-
(2009)
European Journal of Operational Research
, vol.196
, Issue.2
, pp. 661-671
-
-
Fan, M.1
Kumar, S.2
Whinston, A.B.3
|