메뉴 건너뛰기




Volumn , Issue , 2010, Pages 133-138

Trusted anonymous execution: A model to raise trust in cloud

Author keywords

Cloud computing; Trusted binding

Indexed keywords

AMAZON EC2; CLOUD PROVIDERS; COMPUTATIONAL RESOURCES; COMPUTING INFRASTRUCTURES; DATA BINDING; DATA SETS; DATA USERS; POLICY OPTIONS; PRIVACY CONCERNS; PROTOTYPE SYSTEM; SENSITIVE DATAS; SOFTWARE VALIDATION; SOFTWARE-AS-A-SERVICE; TRUSTED BINDING; TRUSTED PLATFORM MODULE;

EID: 79960424555     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GCC.2010.37     Document Type: Conference Paper
Times cited : (14)

References (19)
  • 1
    • 0142091714 scopus 로고    scopus 로고
    • Turning software into a service
    • M. Turner, D. Budgen, and P. Brereton, "Turning Software into a Service," Computer, vol. 36, no. 10, pp. 38-44, 2003.
    • (2003) Computer , vol.36 , Issue.10 , pp. 38-44
    • Turner, M.1    Budgen, D.2    Brereton, P.3
  • 3
    • 0035812694 scopus 로고    scopus 로고
    • Protein structure prediction and structural genomics
    • D. Baker and A. Sali, "Protein structure prediction and structural genomics," Science's STKE, vol. 294, no. 5540, p. 93, 2001.
    • (2001) Science's STKE , vol.294 , Issue.5540 , pp. 93
    • Baker, D.1    Sali, A.2
  • 5
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A lattice model of secure information flow," Commun. ACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 11
    • 77649302043 scopus 로고    scopus 로고
    • Enhance the user data privacy for saas by separation of data
    • 2009 International Conference on 26-27
    • Z. Qiang and C. Dong, "Enhance the user data privacy for saas by separation of data," in Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on, vol. 3, 26-27 2009, pp. 130 - 132.
    • (2009) Information Management, Innovation Management and Industrial Engineering , vol.3 , pp. 130-132
    • Qiang, Z.1    Dong, C.2
  • 12
    • 77749344712 scopus 로고    scopus 로고
    • Data privacy preserving mechanism based on tenant customization for saas
    • MINES '09. International Conference on 18-20
    • K. Zhang, Y. Shi, Q. Li, and J. Bian, "Data privacy preserving mechanism based on tenant customization for saas," in Multimedia Information Networking and Security, 2009. MINES '09. International Conference on, vol. 1, 18-20 2009, pp. 599-603.
    • (2009) Multimedia Information Networking and Security, 2009 , vol.1 , pp. 599-603
    • Zhang, K.1    Shi, Y.2    Li, Q.3    Bian, J.4
  • 15
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 2, pp. 85-106, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 17
    • 1842583323 scopus 로고    scopus 로고
    • Understanding service-oriented software
    • N. Gold, C. Knight, A. Mohan, and M. Munro, "Understanding service-oriented software," IEEE Softw., vol. 21, no. 2, pp. 71-77, 2004.
    • (2004) IEEE Softw. , vol.21 , Issue.2 , pp. 71-77
    • Gold, N.1    Knight, C.2    Mohan, A.3    Munro, M.4
  • 19
    • 58149233944 scopus 로고    scopus 로고
    • Short-term and long-term competition between providers of shrink-wrap software and software as a service
    • M. Fan, S. Kumar, and A. B. Whinston, "Short-term and long-term competition between providers of shrink-wrap software and software as a service," European Journal of Operational Research, vol. 196, no. 2, pp. 661 - 671, 2009.
    • (2009) European Journal of Operational Research , vol.196 , Issue.2 , pp. 661-671
    • Fan, M.1    Kumar, S.2    Whinston, A.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.