-
1
-
-
73149112637
-
Forecast for cloud computing: Up, up, and away
-
Oct.
-
S. Cherry, "Forecast for cloud computing: Up, up, and away," Spectrum, IEEE, vol. 46, no. 10, pp. 68-68, Oct. 2009.
-
(2009)
Spectrum IEEE
, vol.46
, Issue.10
, pp. 68-68
-
-
Cherry, S.1
-
2
-
-
84864579259
-
Reference deployment models for eliminating user concerns on cloud security
-
10.1007/s11227-010-0460-9. [Online]
-
G. Zhao, C. Rong, M. G. Jaatun, and F. Sandnes, "Reference deployment models for eliminating user concerns on cloud security," The Journal of Supercomputing, pp. 1-16, 2010, 10.1007/s11227-010-0460-9. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0460-9
-
(2010)
The Journal of Supercomputing
, pp. 1-16
-
-
Zhao, G.1
Rong, C.2
Jaatun, M.G.3
Sandnes, F.4
-
3
-
-
77953250064
-
A probabilistic approach to information control
-
Å. A. Nyre and M. G. Jaatun, "A Probabilistic Approach to Information Control," Journal of Internet Technology, vol. 11, no. 3, pp. 407-416, 2010.
-
(2010)
Journal of Internet Technology
, vol.11
, Issue.3
, pp. 407-416
-
-
Nyre, A.A.1
Jaatun, M.G.2
-
5
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing," Cloud Computing, IEEE International Conference on, vol. 0, pp. 109-116, 2009.
-
(2009)
Cloud Computing IEEE International Conference on
, vol.0
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
6
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
84864578620
-
Enhancing privacy in cloud computing via policy-based obfuscation
-
10.1007/s11227-010-0425-z. [Online]
-
M. Mowbray, S. Pearson, and Y. Shen, "Enhancing privacy in cloud computing via policy-based obfuscation," The Journal of Supercomputing, pp. 1-25, 2010, 10.1007/s11227-010-0425-z. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0425-z
-
(2010)
The Journal of Supercomputing
, pp. 1-25
-
-
Mowbray, M.1
Pearson, S.2
Shen, Y.3
-
9
-
-
80052383468
-
-
Report 2008/289
-
D. Bogdanov, S. Laur, and J. Willemson, "Sharemind: a framework for fast privacy-preserving computations," Cryptology ePrint Archive, Report 2008/289, 2008, http://eprint.iacr.org/.
-
Sharemind: A Framework for Fast Privacy-preserving Computations
, pp. 2008
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
10
-
-
79960909223
-
-
visited: Sept. 9, 2010. [Online]
-
"Cybernetica news blog-sharemind," http://research.cyber.ee/ sharemind/, visited: Sept. 9, 2010. [Online]. Available: http://research.cyber. ee/sharemind/
-
Available: Http://research.cyber.ee/sharemind/
-
-
-
11
-
-
70449085275
-
A systematic study on peerto-peer botnets
-
Washington, DC, USA: IEEE Computer Society
-
P. Wang, L. Wu, B. Aslam, and C. C. Zou, "A systematic study on peerto-peer botnets," in ICCCN '09: Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks. Washington, DC, USA: IEEE Computer Society, 2009, pp. 1-8.
-
(2009)
ICCCN '09: Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
, pp. 1-8
-
-
Wang, P.1
Wu, L.2
Aslam, B.3
Zou, C.C.4
-
12
-
-
3142523603
-
The UCON ABC usage control model
-
J. Park and R. Sandhu, "The UCON ABC usage control model," ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
14
-
-
84943547553
-
Pond: The ocean store prototype
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz, "Pond: the OceanStore Prototype," in Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST '03), 2003.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST '03)
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
|