-
5
-
-
71749090060
-
Accountability as a way forward for privacy protection in the cloud
-
Pearson, S., Charlesworth, A.: Accountability as a way forward for privacy protection in the cloud. In: Cloud Computing 2009, pp. 131-144 (2009)
-
(2009)
Cloud Computing 2009
, pp. 131-144
-
-
Pearson, S.1
Charlesworth, A.2
-
6
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., et al.: A view of cloud computing. Communications of the ACM 53(4), 50-58 (2010)
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
-
9
-
-
84947733945
-
Data provenance: Some basic issues
-
Buneman, P., Khanna, S., Tan, W.: Data provenance: Some basic issues. In: Foundations of Software Technology and Theoretical Computer Science, pp. 87-93 (2000)
-
(2000)
Foundations of Software Technology and Theoretical Computer Science
, pp. 87-93
-
-
Buneman, P.1
Khanna, S.2
Tan, W.3
-
12
-
-
80051557418
-
-
HyTrust. HyTrust Appliance (2010), http://www.hytrust.com/product/ overview/
-
(2010)
HyTrust Appliance
-
-
-
13
-
-
0004233425
-
-
Addison-Wesley, New York
-
Silberschatz, A., Galvin, P., Gagne, G.: Operating system concepts. Addison-Wesley, New York (1991)
-
(1991)
Operating System Concepts
-
-
Silberschatz, A.1
Galvin, P.2
Gagne, G.3
-
15
-
-
80051573080
-
Live Forensics and the Cloud - Part 1
-
Shende, J.: Live Forensics and the Cloud - Part 1. Cloud Computing Journal (2010), http://cloudcomputing.sys-con.com/node/1547944
-
(2010)
Cloud Computing Journal
-
-
Shende, J.1
-
16
-
-
79960570447
-
Why and where: A characterization of data provenance
-
Buneman, P., Khanna, S., Wang-Chiew, T.: Why and where: A characterization of data provenance. In: International Conference on Database Theory - ICDT 2001, pp. 316-330 (2001)
-
(2001)
International Conference on Database Theory - ICDT 2001
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Wang-Chiew, T.3
-
17
-
-
42449132132
-
Provenance in databases: Past, current, and future
-
Tan, W.: Provenance in databases: Past, current, and future. Data Engineering 2007, 3 (2007)
-
(2007)
Data Engineering 2007
, vol.3
-
-
Tan, W.1
-
19
-
-
85013596514
-
Concepts of trusted computing
-
Mitchell, C.J. (ed.) The Institute of Electrical Engineers (IEE), London
-
Proudler, G.: Concepts of trusted computing. In: Mitchell, C.J. (ed.) Trusted Computing. IEE Professional Applications of Computing Series, vol. 6, pp. 11-27. The Institute of Electrical Engineers (IEE), London (2005)
-
(2005)
Trusted Computing. IEE Professional Applications of Computing Series
, vol.6
, pp. 11-27
-
-
Proudler, G.1
-
22
-
-
0019009078
-
OSI reference model-The ISO model of architecture for open systems interconnection
-
Zimmermann, H.: OSI reference model-The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4), 425-432 (2002)
-
(2002)
IEEE Transactions on Communications
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmermann, H.1
-
26
-
-
80051569876
-
Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows
-
Slagell, A., Wang, J., Yurcik, W.: Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows. In: NSF/AFRL Workshop on Secure Knowledge Management (SKM 2004), Buffalo, NY (2004)
-
NSF/AFRL Workshop on Secure Knowledge Management (SKM 2004), Buffalo, NY (2004)
-
-
Slagell, A.1
Wang, J.2
Yurcik, W.3
-
29
-
-
0002165432
-
The history and development of transaction log analysis
-
Peters, T.: The history and development of transaction log analysis. Library Hi Tech. 11(2), 41-66 (1993)
-
(1993)
Library Hi Tech.
, vol.11
, Issue.2
, pp. 41-66
-
-
Peters, T.1
-
30
-
-
79952673678
-
A computer scientist's introductory guide to business process management (BPM)
-
Ko, R.: A computer scientist's introductory guide to business process management (BPM). ACM Crossroads 15(4), 11-18 (2009)
-
(2009)
ACM Crossroads
, vol.15
, Issue.4
, pp. 11-18
-
-
Ko, R.1
-
31
-
-
70349678836
-
Business process management (BPM) standards: A survey
-
Ko, R., Lee, S., Lee, E.: Business process management (BPM) standards: a survey. Business Process Management Journal 15(5), 744-791 (2009)
-
(2009)
Business Process Management Journal
, vol.15
, Issue.5
, pp. 744-791
-
-
Ko, R.1
Lee, S.2
Lee, E.3
-
32
-
-
0004047288
-
-
Division of Research, Graduate School of Business Administration, Harvard University
-
Anthony, R.: Planning and control systems: a framework for analysis. Division of Research, Graduate School of Business Administration, Harvard University (1965)
-
(1965)
Planning and Control Systems: A Framework for Analysis
-
-
Anthony, R.1
-
33
-
-
80051555086
-
-
Cloud Security Alliance: Trusted Cloud Initiative (2010), http://www.cloudsecurityalliance.org/trustedcloud.html
-
(2010)
Trusted Cloud Initiative
-
-
-
35
-
-
80051566784
-
-
Cloud Security Alliance (2010), http://www.cloudsecurityalliance.org/
-
(2010)
-
-
-
37
-
-
80051557542
-
-
Knode, R.: CloudTrust 2.0 (2010), http://scap.nist.gov/events/2010/itsac/ presentations/day2/Security-Automation-for-Cloud-Computing-CloudTrust-2.0.pdf
-
(2010)
CloudTrust 2.0
-
-
Knode, R.1
-
38
-
-
79960249132
-
Enhancing privacy in cloud computing via policybased obfuscation
-
Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policybased obfuscation. The Journal of Supercomputing, 1-25 (2010)
-
(2010)
The Journal of Supercomputing
, pp. 1-25
-
-
Mowbray, M.1
Pearson, S.2
Shen, Y.3
|