-
5
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chow,R.,Gotlle,P.,Jakobsson, E.S.,Staddon,J., Masuoka,R., and Molina,J. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. Proceedings of the 2009 ACM workshop on Cloud computing security, 2009
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Gotlle, P.2
Jakobsson, E.S.3
Staddon, J.4
Masuoka, R.5
Molina, J.6
-
6
-
-
77950567715
-
Privacy in the cloud: Risks to privacy and confidentiality in cloud computing
-
Gellman, R., Privacy in the Cloud: Risks to Privacy and Confidentiality in Cloud Computing. Technical Report prepared for World Privacy Forum, 2009
-
(2009)
Technical Report Prepared for World Privacy Forum
-
-
Gellman, R.1
-
7
-
-
80053415674
-
-
Novell Inc. survey on cloud computing, http://www.novell.com/news/press/ novell-survey-revealswidespread-and-accelerating-enterprise-adoption-of- privateclouds
-
-
-
-
9
-
-
34250017073
-
Hiding virtualization from attackers and malware
-
Carpenter, M., Liston, t., and Skoudis, E, Hiding Virtualization from Attackers and Malware. IEEE Security and Privacy Magazine, 2007
-
(2007)
IEEE Security and Privacy Magazine
-
-
Carpenter, M.1
Liston, T.2
Skoudis, E.3
-
10
-
-
74049152260
-
Hey you get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenport, T., Tromer, E., Shacham, H., and Savage, S., Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. Proceedings of the 16th ACM conference on Computer and Communication Security, 2009
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communication Security
-
-
Ristenport, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
0034447026
-
Application isolation in the java virtual machine
-
Oct
-
Czajkowski, G., Application Isolation in the Java Virtual Machine. ACM SIGPLAN Notices, vol 35, issue 10. Oct 2000
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.10
-
-
Czajkowski, G.1
-
14
-
-
80053392965
-
-
Google Gears at http://gears.google.com
-
-
-
-
15
-
-
80053413201
-
-
http://www.zdnet.com/blog/projectfailures/mediamax-thelinkup-when-the- cloud-fails/999
-
-
-
-
18
-
-
33244463520
-
Privacy-enhancing k - Anonymization of customer data
-
Zhong, S., Yang, Z., and Wright, R., Privacy-Enhancing k - anonymization of Customer Data, Proceedings of the 24th ACM Symposium on Principles of Databases. 2005
-
(2005)
Proceedings of the 24th ACM Symposium on Principles of Databases
-
-
Zhong, S.1
Yang, Z.2
Wright, R.3
-
19
-
-
80053387803
-
-
Storage Network Industry Alliance, http://www.snia.org
-
-
-
-
20
-
-
80053405778
-
-
Cloud Security Alliance, http://www.cloudsecurityalliance.org
-
-
-
-
21
-
-
80053400964
-
-
OpenID foundation website, http://www.openid.net
-
-
-
-
22
-
-
80053419362
-
-
http://specs.xmlsoap.org/ws/2006/12/federation/wsfederation.pdf
-
-
-
-
23
-
-
80053393456
-
-
http://epic.org/privacy/cloudcomputing/google /ftc031709.pdf
-
-
-
-
24
-
-
80053418353
-
-
http://ciocoo.com/clouds-and-data-jurisdiction-282/
-
-
-
-
27
-
-
80053395217
-
-
Trusted Computing Group, http://www.trustedcomputinggroup.org
-
-
-
-
28
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff,B., Chow, J., Rosenblum, M., and Boneh, D., Terra: A Virtual Machine-Based Platform for Trusted Computing, Proceedings of ACM Symposium on Operating Systems Principles. 2003
-
(2003)
Proceedings of ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
29
-
-
74049102823
-
Provable data possession in untrusted stores
-
Ateniese, G., Burns, R., and Curtmola, R., Provable Data Possession in Untrusted Stores, Proceedings of the 14th ACM conference on Computer and Communication Security, 2007
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communication Security
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
33
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
Boneh, D., and Crescenzo, G., D., Public Key Encryption with Keyword Search, Proceedings of Advances in Cryptology, EuroCrypt 2004. Lecture Notes in Computer Science, Springer
-
Proceedings of Advances in Cryptology, EuroCrypt 2004. Lecture Notes in Computer Science
-
-
Boneh, D.1
Crescenzo, G.D.2
-
34
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., and Madhu Sudan, Private Information Retrieval, Proceedings of the 36th Annual 1EEE conference on foundation of Computer Science. 1995
-
(1995)
Proceedings of the 36th Annual 1EEE Conference on Foundation of Computer Science
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
35
-
-
80053431064
-
-
OAuth community site, http://www.oauth.net
-
-
-
-
36
-
-
80053426490
-
-
http://blogs.wsj.com/digits/2009/03/08/1214/
-
-
-
-
37
-
-
85077083089
-
Provenance for the cloud
-
Reddy, K.K.M, Macko, P., and Seltzer, M., Provenance for the cloud. Proceedings of the 8th USENIX conference on File and storage technologies, 2010
-
(2010)
Proceedings of the 8th USENIX Conference on File and Storage Technologies
-
-
Reddy, K.K.M.1
MacKo, P.2
Seltzer, M.3
-
38
-
-
80053415421
-
-
http://www.oasis-open.org/committees/provision/
-
-
-
-
39
-
-
80053403212
-
-
National Institute of Standards and Technology (NIST), http://www.nist.gov
-
-
-
|