-
6
-
-
77954472711
-
RunTest: Assuring integrity of dataflow processing in cloud computing infrastructures
-
ACM, New York, NY, USA
-
J. Du, W. Wei, X. Gu, T. Yu, "RunTest: assuring integrity of dataflow processing in cloud computing infrastructures", In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10), ACM, New York, NY, USA, 293-304.
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
, pp. 293-304
-
-
Du, J.1
Wei, W.2
Gu, X.3
Yu, T.4
-
8
-
-
78149428615
-
-
March
-
The Official Google Blog, "A new approach to China: an update", online at http://googleblog.blogspot.com/2010/03/new-approach-to-chinaupdate. html, March 2010.
-
(2010)
A new approach to China: An update
-
-
-
10
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
Dec
-
W. Itani, A. Kayssi, A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009.
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
11
-
-
74349113474
-
On technical security issues in cloud computing
-
Banglore, India, September
-
M. Jensen, J. Schwenk, N. Gruschka, L.L. Iacono, "On Technical Security Issues in Cloud Computing", IEEE International Conference on Cloud Computing, (CLOUD II 2009), Banglore, India, September 2009, 109-116.
-
(2009)
IEEE International Conference on Cloud Computing, (CLOUD II 2009)
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
13
-
-
77953309043
-
-
processor breach may b.html, Jan
-
B. Krebs, "Payment Processor Breach May Be Largest Ever", Online at http://voices.washingtonpost.com/securityfix/2009/01/payment processor breach may b.html, Jan, 2009.
-
(2009)
Payment Processor Breach May Be Largest Ever
-
-
Krebs, B.1
-
14
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
M. Dijk, A. Juels, "On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing", HotSec 2010.
-
(2010)
HotSec
-
-
Dijk, M.1
Juels, A.2
-
15
-
-
71749118650
-
-
Referenced on June. 3rd, 2009, Online at
-
P. Mell, T. Grance, "Draft NIST working definition of cloud computing", Referenced on June. 3rd, 2009, Online at http://csrc.nist.gov/ groups/SNS/cloud-computing/index.html, 2009.
-
(2009)
Draft NIST Working Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
16
-
-
79551628302
-
Trusted storage over untrusted networks
-
Miami, FL. USA
-
P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. Médard, "Trusted storage over untrusted networks", IEEE GLOBECOM 2010, Miami, FL. USA.
-
(2010)
IEEE GLOBECOM
-
-
Oliveira, P.F.1
Lima, L.2
Vinhoza, T.T.V.3
Barros, J.4
Médard, M.5
-
17
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, "How to share a secret", Commun. ACM 22, 11(November 1979).
-
(1979)
Commun. ACM
, vol.22
, pp. 11
-
-
Shamir, A.1
-
19
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
March
-
C. Wang, Sherman S.-M. Chow, Q. Wang, K. Ren, W. Lou, "Privacypreserving public auditing for secure cloud storage", in InfoCom2010, IEEE, March 2010.
-
(2010)
InfoCom2010 IEEE
-
-
Wang, C.1
Sherman, S.-M.2
Wang, C.Q.3
Ren, K.4
Lou, W.5
|