-
3
-
-
80755159945
-
-
Amazon virtual private cloud. http://aws.amazon.com/vpc/, 2011.
-
(2011)
-
-
-
5
-
-
84864562068
-
-
Darpa intrusion detection data set. http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/data/index.html, 2011.
-
(2011)
Darpa Intrusion Detection Data Set
-
-
-
6
-
-
80755127593
-
-
Enron email dataset. http://www.cs.cmu.edu/~enron/, 2011.
-
(2011)
Enron Email Dataset
-
-
-
7
-
-
80755127592
-
-
Future grid portal. https://portal.futuregrid.org/, 2011.
-
(2011)
-
-
-
12
-
-
80755173892
-
-
Spam archieve. http://untroubled.org/spam/, 2011.
-
(2011)
Spam Archieve
-
-
-
14
-
-
80755172969
-
-
Target marketing. http://en.wikipedia.org/wiki/Target-market, 2011.
-
(2011)
Target Marketing
-
-
-
15
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
ASIACCS '10 New York, NY, USA ACM
-
M. J. Atallah and K. B. Frikken. Securely outsourcing linear algebra computations. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 48-59, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 48-59
-
-
Atallah, M.J.1
Frikken, K.B.2
-
16
-
-
1642327704
-
Secure and private sequence comparisons
-
WPES '03 New York, NY, USA ACM
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In Proceedings of the 2003 ACM workshop on Privacy in the electronic society, WPES '03, pages 39-44, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
18
-
-
70349755377
-
Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
-
International Conference on
-
D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow. Blueprint for the intercloud - protocols and formats for cloud computing interoperability. Internet and Web Applications and Services, International Conference on, 0:328-336, 2009.
-
(2009)
Internet and Web Applications and Services
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
19
-
-
77958487669
-
Secure outsourcing of dna searching via finite automata
-
S. Foresti and S. Jajodia, editors Springer
-
M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In S. Foresti and S. Jajodia, editors, DBSec, volume 6166 of Lecture Notes in Computer Science, pages 49-64. Springer, 2010.
-
(2010)
DBSec, Volume 6166 of Lecture Notes in Computer Science
, pp. 49-64
-
-
Blanton, M.1
Aliasgari, M.2
-
20
-
-
77958496068
-
Privacy-preserving matching of dna profiles
-
F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-preserving matching of dna profiles. Technical Report Report 2008/203, ACR Cryptology ePrint Archive, 2008.
-
(2008)
Technical Report Report 2008/203, ACR Cryptology EPrint Archive
-
-
Bruekers, F.1
Katzenbeisser, S.2
Kursawe, K.3
Tuyls, P.4
-
21
-
-
41149124878
-
Secure web application via automatic partitioning
-
DOI 10.1145/1294261.1294265, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. SIGOPS Oper. Syst. Rev., 41:31-44, October 2007. (Pubitemid 351429368)
-
(2007)
Operating Systems Review (ACM)
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
22
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
January
-
J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107-113, January 2008.
-
(2008)
Commun. ACM
, vol.51
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
23
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
January
-
J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107-113, January 2008.
-
(2008)
Commun. ACM
, vol.51
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
24
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the em algorithm. JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B, 39(1):1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society, Series B
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
25
-
-
84883298285
-
P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract
-
Washington, DC, August
-
Y. Duan, N. Youdao, J. Canny, and J. Zhan. P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract. In Proceedings of the 19th USENIX Security Symposium, Washington, DC, August 2010.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Duan, Y.1
Youdao, N.2
Canny, J.3
Zhan, J.4
-
27
-
-
80052585717
-
Twister: A runtime for iterative mapreduce
-
Bloomington, IN
-
J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S.-H. Bae, J. Qiu, and G. Fox. Twister: A runtime for iterative mapreduce. Technical report, Indiana University, Bloomington, IN, 2010.
-
(2010)
Technical Report, Indiana University
-
-
Ekanayake, J.1
Li, H.2
Zhang, B.3
Gunarathne, T.4
Bae, S.-H.5
Qiu, J.6
Fox, G.7
-
28
-
-
80755127585
-
-
T. A. S. Foundation
-
T. A. S. Foundation. Apache Hadoop Project. http://hadoop.apache.org/, 2010.
-
(2010)
-
-
-
29
-
-
80755172972
-
Cloud computing fundamentals
-
B. Furht and A. Escalante, editors Springer US
-
B. Furht. Cloud computing fundamentals. In B. Furht and A. Escalante, editors, Handbook of Cloud Computing, pages 3-19. Springer US, 2010.
-
(2010)
Handbook of Cloud Computing
, pp. 3-19
-
-
Furht, B.1
-
30
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
STOC '09 New York, NY, USA ACM
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st annual ACM symposium on Theory of computing, STOC '09, pages 169-178, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
31
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
S. Hohenberger and A. Lysyanskaya. How to securely outsource cryptographic computations. In J. Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 264-282. Springer Berlin / Heidelberg, 2005. (Pubitemid 41231169)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
33
-
-
70149089438
-
An architecture for virtual solution composition and deployment in infrastructure clouds
-
VTDC '09 New York, NY, USA ACM
-
A. V. Konstantinou, T. Eilam, M. Kalantar, A. A. Totok, W. Arnold, and E. Snible. An architecture for virtual solution composition and deployment in infrastructure clouds. In Proceedings of the 3rd international workshop on Virtualization technologies in distributed computing, VTDC '09, pages 9-18, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 3rd International Workshop on Virtualization Technologies in Distributed Computing
, pp. 9-18
-
-
Konstantinou, A.V.1
Eilam, T.2
Kalantar, M.3
Totok, A.A.4
Arnold, W.5
Snible, E.6
-
34
-
-
72849149423
-
Searching for SNPs with cloud computing
-
November
-
B. Langmead, M. Schatz, J. Lin, M. Pop, and S. Salzberg. Searching for SNPs with cloud computing. Genome Biology, 10(11):R134+, November 2009.
-
(2009)
Genome Biology
, vol.10
, Issue.11
-
-
Langmead, B.1
Schatz, M.2
Lin, J.3
Pop, M.4
Salzberg, S.5
-
38
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
London, UK Springer-Verlag
-
T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, pages 497-506, London, UK, 1990. Springer-Verlag.
-
(1990)
Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
39
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
41
-
-
85015649873
-
Airavat: Security and privacy for mapreduce
-
USENIX Association
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for mapreduce. In NSDI, pages 297-312. USENIX Association, 2010.
-
(2010)
NSDI
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
42
-
-
65649120715
-
CloudBurst: Highly sensitive read mapping with MapReduce
-
M. C. Schatz. CloudBurst: highly sensitive read mapping with MapReduce. Bioinformatics, 25(11):1363-1369, 2009.
-
(2009)
Bioinformatics
, vol.25
, Issue.11
, pp. 1363-1369
-
-
Schatz, M.C.1
-
43
-
-
80755159942
-
-
A. W. Services December As of
-
A. W. Services. Aws case study: Washington post. http://aws.amazon.com/ solutions/case-studies/washington-post/, December As of 2010.
-
(2010)
Aws Case Study: Washington Post
-
-
-
44
-
-
85129493630
-
Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm
-
The Internet Society
-
D. Szajda, M. Pohl, J. Owen, and B. G. Lawson. Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm. In NDSS. The Internet Society, 2006.
-
(2006)
NDSS
-
-
Szajda, D.1
Pohl, M.2
Owen, J.3
Lawson, B.G.4
-
45
-
-
66149192669
-
How to map billions of short reads onto genomes
-
May
-
C. Trapnell and S. L. Salzberg. How to map billions of short reads onto genomes. Nature biotechnology, 27(5):455-457, May 2009.
-
(2009)
Nature Biotechnology
, vol.27
, Issue.5
, pp. 455-457
-
-
Trapnell, C.1
Salzberg, S.L.2
-
46
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
H. Gilbert, editor Springer Berlin / Heidelberg
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In H. Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 24-43. Springer Berlin / Heidelberg, 2010.
-
(2010)
Advances in Cryptology - EUROCRYPT 2010, Volume 6110 of Lecture Notes in Computer Science
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
47
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
INFOCOM'10 Piscataway, NJ, USA IEEE Press
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on Information communications, INFOCOM'10, pages 525-533, Piscataway, NJ, USA, 2010. IEEE Press.
-
(2010)
Proceedings of the 29th Conference on Information Communications
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
48
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
New York, NY, USA ACM
-
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 338-347, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 338-347
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
49
-
-
35248872290
-
Privacy-preserving classification of customer data without loss of accuracy
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving classification of customer data without loss of accuracy. In In SIAM SDM, pages 21-23, 2005.
-
(2005)
SIAM SDM
, pp. 21-23
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
|