메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A farewell to trust: An approach to confidentiality control in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

DIVIDE-AND-CONQUER APPROACH;

EID: 79960903995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIRELESSVITAE.2011.5940844     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 1
    • 73149112637 scopus 로고    scopus 로고
    • Forecast for cloud computing: Up, up, and away
    • Oct.
    • S. Cherry, "Forecast for cloud computing: Up, up, and away," Spectrum, IEEE, vol. 46, no. 10, pp. 68-68, Oct. 2009.
    • (2009) Spectrum IEEE , vol.46 , Issue.10 , pp. 68-68
    • Cherry, S.1
  • 2
    • 84864579259 scopus 로고    scopus 로고
    • Reference deployment models for eliminating user concerns on cloud security
    • 10.1007/s11227-010-0460-9. [Online]
    • G. Zhao, C. Rong, M. G. Jaatun, and F. Sandnes, "Reference deployment models for eliminating user concerns on cloud security," The Journal of Supercomputing, pp. 1-16, 2010, 10.1007/s11227-010-0460-9. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0460-9
    • (2010) The Journal of Supercomputing , pp. 1-16
    • Zhao, G.1    Rong, C.2    Jaatun, M.G.3    Sandnes, F.4
  • 3
    • 77953250064 scopus 로고    scopus 로고
    • A probabilistic approach to information control
    • Å. A. Nyre and M. G. Jaatun, "A Probabilistic Approach to Information Control," Journal of Internet Technology, vol. 11, no. 3, pp. 407-416, 2010.
    • (2010) Journal of Internet Technology , vol.11 , Issue.3 , pp. 407-416
    • Nyre, A.A.1    Jaatun, M.G.2
  • 8
    • 84864578620 scopus 로고    scopus 로고
    • Enhancing privacy in cloud computing via policy-based obfuscation
    • 10.1007/s11227-010-0425-z. [Online]
    • M. Mowbray, S. Pearson, and Y. Shen, "Enhancing privacy in cloud computing via policy-based obfuscation," The Journal of Supercomputing, pp. 1-25, 2010, 10.1007/s11227-010-0425-z. [Online]. Available: http://dx.doi.org/10.1007/s11227-010-0425-z
    • (2010) The Journal of Supercomputing , pp. 1-25
    • Mowbray, M.1    Pearson, S.2    Shen, Y.3
  • 10
    • 79960909223 scopus 로고    scopus 로고
    • visited: Sept. 9, 2010. [Online]
    • "Cybernetica news blog-sharemind," http://research.cyber.ee/ sharemind/, visited: Sept. 9, 2010. [Online]. Available: http://research.cyber. ee/sharemind/
    • Available: Http://research.cyber.ee/sharemind/
  • 12
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • J. Park and R. Sandhu, "The UCON ABC usage control model," ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
    • (2004) ACM Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.