메뉴 건너뛰기




Volumn , Issue , 2011, Pages 113-120

Promoting distributed accountability in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

ACCOUNTABILITY FRAMEWORK; AUDITING MECHANISM; CLOUD SERVICES; EMERGING TECHNOLOGIES; EXPERIMENTAL STUDIES; HEALTH DATA; LOGGING MECHANISM;

EID: 80053159713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2011.57     Document Type: Conference Paper
Times cited : (35)

References (29)
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In International Cryptology Conference on Advances in Cryptology, pages 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 24344453002 scopus 로고    scopus 로고
    • Lineage retrieval for scientific data processing: A survey
    • DOI 10.1145/1057977.1057978
    • R. Bose and J. Frew. Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv., 37:1-28, March 2005. (Pubitemid 41246320)
    • (2005) ACM Computing Surveys , vol.37 , Issue.1 , pp. 1-28
    • Bose, R.1    Frew, J.2
  • 5
    • 12344311915 scopus 로고    scopus 로고
    • Decentralized trust management and accountability in federated systems
    • B. Chun and A. C. Bavier. Decentralized trust management and accountability in federated systems. In HICSS, 2004.
    • (2004) HICSS
    • Chun, B.1    Bavier, C.A.2
  • 7
    • 84956993751 scopus 로고    scopus 로고
    • Reasoning about accountability within delegation
    • Information and Communications Security
    • B. Crispo and G. Ruffo. Reasoning about accountability within delegation. In ICICS, pages 251-260, 2001. (Pubitemid 33361975)
    • (2001) Lecture Notes in Computer Science , Issue.2229 , pp. 251-260
    • Crispo, B.1    Ruffo, G.2
  • 8
    • 35248822611 scopus 로고    scopus 로고
    • Oblivious hashing: A stealthy software integrity verification primitive
    • Fabien Petitcolas, editor
    • Y. Chen et al. Oblivious hashing: A stealthy software integrity verification primitive. In Fabien Petitcolas, editor, Information Hiding, volume 2578 of Lecture Notes in Computer Science, pages 400-414. 2003.
    • (2003) Information Hiding, Volume 2578 of Lecture Notes in Computer Science , pp. 400-414
    • Chen, Y.1
  • 9
    • 85062006160 scopus 로고    scopus 로고
    • The case of the fake picasso: Preventing history forgery with secure provenance
    • Berkeley, CA, USA USENIX Association
    • R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: preventing history forgery with secure provenance. In 7th conference on File and storage technologies, pages 1-14, Berkeley, CA, USA, 2009. USENIX Association.
    • (2009) 7th Conference on File and Storage Technologies , pp. 1-14
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 10
    • 0035424017 scopus 로고    scopus 로고
    • Location systems for ubiquitous computing
    • DOI 10.1109/2.940014
    • J. Hightower and G. Borriello. Location systems for ubiquitous computing. Computer, 34(8):57-66, August 2001. (Pubitemid 32742945)
    • (2001) Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Borriello, G.2
  • 12
    • 70350381139 scopus 로고    scopus 로고
    • Towards a theory of accountability and audit
    • R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely. Towards a theory of accountability and audit. In ESORICS, pages 152-167, 2009.
    • (2009) ESORICS , pp. 152-167
    • Jagadeesan, R.1    Jeffrey, A.2    Pitcher, C.3    Riely, J.4
  • 13
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • R. Kailar. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22(5):313-328, 1996. (Pubitemid 126771673)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 16
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • M. Casassa Mont, S. Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In DEXA Workshops, pages 377-382, 2003.
    • (2003) DEXA Workshops , pp. 377-382
    • Casassa Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 20
    • 71749102261 scopus 로고    scopus 로고
    • A privacy manager for cloud computing
    • S. Pearson, Y. Shen, and M. Mowbray. A privacy manager for cloud computing. In CloudCom, pages 90-106, 2009.
    • (2009) CloudCom , pp. 90-106
    • Pearson, S.1    Shen, Y.2    Mowbray, M.3
  • 23
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • T. J. E. Schwarz and E. L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In IEEE International Conference on Distributed Systems, page 12, 2006.
    • (2006) IEEE International Conference on Distributed Systems , pp. 12
    • Schwarz, T.J.E.1    Miller, E.L.2
  • 25
    • 80053139948 scopus 로고    scopus 로고
    • Eucalyptus Systems. http://www.eucalyptus.com/.
  • 27
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS, pages 355-370, 2009.
    • (2009) ESORICS , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.