-
1
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Y. Shucheng, W. Cong, R. Kui, and L. Wenjing, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing" in INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Shucheng, Y.1
Cong, W.2
Kui, R.3
Wenjing, L.4
-
2
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
I. Foster, Z. Yong, I. Raicu, and S. Lu, "Cloud Computing and Grid Computing 360-Degree Compared" in Grid Computing Environments Workshop, 2008. GCE '08, pp. 1-10, 2008.
-
(2008)
Grid Computing Environments Workshop, 2008. GCE '08
, pp. 1-10
-
-
Foster, I.1
Yong, Z.2
Raicu, I.3
Lu, S.4
-
4
-
-
70449569012
-
Ensuring data storage security in Cloud Computing
-
W. Cong, W. Qian, R. Kui, and L. Wenjing, "Ensuring data storage security in Cloud Computing" in Quality of Service, 2009. IWQoS. 17th International Workshop on, pp. 1-9, 2009.
-
(2009)
Quality of Service, 2009. IWQoS. 17th International Workshop on
, pp. 1-9
-
-
Cong, W.1
Qian, W.2
Kui, R.3
Wenjing, L.4
-
5
-
-
78650535610
-
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
-
P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. Ben Othmane, and L. Lilien, "An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing" in Reliable Distributed Systems, 2010 29th IEEE Symposium, pp. 177-183, 2010.
-
(2010)
Reliable Distributed Systems, 2010 29th IEEE Symposium
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Ben Othmane, L.6
Lilien, L.7
-
7
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage" in Proceedings of the Second USENIX Conference on File and Storage Technologies (FAST). USENIX, pp. 29-42, 2003.
-
(2003)
Proceedings of the Second USENIX Conference on File and Storage Technologies (FAST). USENIX
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
9
-
-
70349333899
-
Privacy-Aware Role-Based Access Control
-
N. Qun, E. Bertino, J. Lobo, and S. B. Calo, "Privacy-Aware Role-Based Access Control" Security & Privacy, IEEE, vol. 7, pp. 35-43, 2009.
-
(2009)
Security & Privacy, IEEE
, vol.7
, pp. 35-43
-
-
Qun, N.1
Bertino, E.2
Lobo, J.3
Calo, S.B.4
-
10
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
W. Cong, W. Qian, R. Kui, and L. Wenjing, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing" in INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Cong, W.1
Qian, W.2
Kui, R.3
Wenjing, L.4
-
11
-
-
78650536265
-
Protection of Identity Information in Cloud Computing without Trusted Third Party
-
R. Ranchal, B. Bhargava, L. Othmane, L. Lilien, A. Kim, M. Kang, and M. Linderman, "Protection of Identity Information in Cloud Computing without Trusted Third Party" in Reliable Distributed Systems, 29th IEEE Symposium, pp. 368-372, 2010.
-
(2010)
Reliable Distributed Systems, 29th IEEE Symposium
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.3
Lilien, L.4
Kim, A.5
Kang, M.6
Linderman, M.7
-
12
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models" Computer, vol. 29, pp. 38-47, 1996.
-
(1996)
Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
79952020799
-
SecCloud: Bridging Secure Storage and Computation in Cloud
-
W. Lifei, Z. Haojin, C. Zhenfu, J. Weiwei, and A. V. Vasilakos, "SecCloud: Bridging Secure Storage and Computation in Cloud" in Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, pp. 52-61, 2010.
-
(2010)
Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on
, pp. 52-61
-
-
Lifei, W.1
Haojin, Z.2
Zhenfu, C.3
Weiwei, J.4
Vasilakos, A.V.5
-
14
-
-
38949178401
-
-
E. J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing remote untrusted storage", 〈http://www.isoc.org/isoc/conference -s/ndss/03/proceedings/papers/9.pdf〈, pp. 131-145, 2003.
-
(2003)
SiRiUS: Securing Remote Untrusted Storage
, pp. 131-145
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
|