메뉴 건너뛰기




Volumn , Issue , 2011, Pages 427-434

Enhancing data privacy and integrity in the cloud

Author keywords

Cloud Infrastructure Security; Privacy Protection in Cloud Platforms and Operations

Indexed keywords

CLOUD SYSTEMS; COMPUTING PARADIGM; EXECUTION ENVIRONMENTS; INFRASTRUCTURE SECURITY; POTENTIAL USERS; PRIVACY PROTECTION IN CLOUD PLATFORMS AND OPERATIONS; SENSITIVE INFORMATIONS; TRUSTED COMPUTING; TRUSTED COMPUTING BASE; USER EXCHANGES;

EID: 80053009214     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPCSim.2011.5999856     Document Type: Conference Paper
Times cited : (16)

References (45)
  • 2
    • 77954931916 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • R. Gellmax, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing," World privacy forum, pp. 1-26, 2009.
    • (2009) World Privacy Forum , pp. 1-26
    • Gellmax, R.1
  • 5
    • 68149092220 scopus 로고    scopus 로고
    • Trusted computing: Security and applications
    • (to appear)
    • E. Gallery and C. J. Mitchell, "Trusted computing: Security and applications," Cryptologia, (to appear).
    • Cryptologia
    • Gallery, E.1    Mitchell, C.J.2
  • 6
    • 77954418560 scopus 로고    scopus 로고
    • August [Online]. Available: https://www.trustedcomputinggroup.org/groups/ -TCG-1-4-Architecture-Overview.pdf
    • "TCG architecture overview," August 2007, https://www. trustedcomputinggroup.org/groups/TCG-1-4-Architecture-Overview.pdf. [Online]. Available: https://www.trustedcomputinggroup.org/groups/-TCG-1-4-Architecture- Overview.pdf
    • (2007) TCG Architecture Overview
  • 10
    • 33646075344 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • October
    • S. W. Smith, "Outbound authentication for programmable secure coprocessors," International Journal of Information Security, vol. 3, no. 1, pp. 28-41, October 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 28-41
    • Smith, S.W.1
  • 11
    • 18844391719 scopus 로고    scopus 로고
    • [Online]. Available: http://www.trustedcomputinggroup.org
    • "Trusted computing group," http://www.trustedcomputinggroup. org. [Online]. Available: http://www.trustedcomputinggroup.org
    • Trusted Computing Group
  • 13
    • 79957905089 scopus 로고    scopus 로고
    • [Online]. Available: http://www.intel.com/technology/security
    • "Trusted execution technology architectural overview," http://www.intel.com/technology/security. [Online]. Available: http://www.intel.com/technology/security
    • Trusted Execution Technology Architectural Overview
  • 16
    • 37149044968 scopus 로고    scopus 로고
    • Aegis: A single-chip secure processor
    • G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A single-chip secure processor," IEEE Design & Test, vol. 24, no. 6, pp. 570-580, 2007.
    • (2007) IEEE Design & Test , vol.24 , Issue.6 , pp. 570-580
    • Suh, G.E.1    O'Donnell, C.W.2    Devadas, S.3
  • 21
    • 24644461219 scopus 로고    scopus 로고
    • Short linkable ring signatures for e-voting, e-cash and attestation
    • Springer
    • P. P. Tsang and V. K. Wei, "Short linkable ring signatures for e-voting, e-cash and attestation," in Information Security Practice and Experience. Springer, 2005, pp. 48-60.
    • (2005) Information Security Practice and Experience , pp. 48-60
    • Tsang, P.P.1    Wei, V.K.2
  • 31
    • 77952256837 scopus 로고    scopus 로고
    • Towards trustworthy computing systems: Taking microkernels to the next level
    • G. Heiser, K. Elphinstone, I. Kuz, G. Klein, and S. M. Petters, "Towards trustworthy computing systems: taking microkernels to the next level," SIGOPS Oper. Syst. Rev., vol. 41, no. 4, pp. 3-11, 2007.
    • (2007) SIGOPS Oper. Syst. Rev. , vol.41 , Issue.4 , pp. 3-11
    • Heiser, G.1    Elphinstone, K.2    Kuz, I.3    Klein, G.4    Petters, S.M.5
  • 34
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • 04
    • K. J. Biba, "Integrity considerations for secure computer systems," MITRE Corp., Tech. Rep., 04 1977.
    • (1977) MITRE Corp., Tech. Rep.
    • Biba, K.J.1
  • 35
    • 0033690785 scopus 로고    scopus 로고
    • Lomac: Low water-mark integrity protection for cots environments
    • IEEE Computer Society
    • T. Fraser, "Lomac: Low water-mark integrity protection for cots environments," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2000, pp. 230-245.
    • (2000) IEEE Symposium on Security and Privacy , pp. 230-245
    • Fraser, T.1
  • 36
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE Computer Society Press
    • D. D. Clark and D. R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," in IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1987, pp. 184-194.
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 37
    • 27544477855 scopus 로고    scopus 로고
    • Bind: A fine-grained attestation service for secure distributed systems
    • E. Shi and A. Perrig, "Bind: A fine-grained attestation service for secure distributed systems," in IEEE Symposium on Security and Privacy, 2005, pp. 154-168.
    • (2005) IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.