-
2
-
-
67649635197
-
Database Management as a Service: Challenges and Opportunities
-
D. Agrawal, A. El Abbadi, F. Emekci and A. Metwally, Database Management as a Service: Challenges and Opportunities, Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on, 2009, pp. 1709-1716.
-
Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on, 2009
, pp. 1709-1716
-
-
Agrawal, D.1
El Abbadi, A.2
Emekci, F.3
Metwally, A.4
-
7
-
-
79955971286
-
-
ACM
-
A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, DepSky: dependable and secure storage in a cloud-of-clouds, ACM, 2011, pp. 31-46.
-
(2011)
DepSky: Dependable and Secure Storage in A Cloud-of-clouds
, pp. 31-46
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
8
-
-
84855198855
-
-
P. BNA. 03/09/2009. Copyright 2009 by The Bureau of National Affairs, Inc. (800-372-1033)
-
P. BNA. Privacy & security law report, 03/09/2009. Copyright 2009 by The Bureau of National Affairs, Inc. (800-372-1033), 2009
-
(2009)
Privacy & Security Law Report
-
-
-
9
-
-
44649194096
-
-
M. P. Boss G, Quan D, Legregni L, Hall H., Cloud computing, (2009), p. 4.
-
(2009)
Cloud Computing
, pp. 4
-
-
P, M.1
Boss, G.2
Quan, D.3
Legregni, L.4
Hall, H.5
-
11
-
-
84856090929
-
Dependable storage in the Intercloud
-
C. Cachin, R. Haas and M. Vukolic, Dependable storage in the Intercloud, Research Report RZ, 3783 (2010), pp. 1-6.
-
(2010)
Research Report RZ
, vol.3783
, pp. 1-6
-
-
Cachin, C.1
Haas, R.2
Vukolic, M.3
-
12
-
-
72749089553
-
Trusting the cloud
-
C. Cachin, I. Keidar and A. Shraer, Trusting the cloud, ACM SIGACT News, 40 (2009), pp. 81-86.
-
(2009)
ACM SIGACT News
, vol.40
, pp. 81-86
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
13
-
-
67649342400
-
Reliable distributed storage
-
G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, Reliable distributed storage, Computer, 42 (2009), pp. 60-67.
-
(2009)
Computer
, vol.42
, pp. 60-67
-
-
Chockler, G.1
Guerraoui, R.2
Keidar, I.3
Vukolic, M.4
-
14
-
-
84856093972
-
Security in the cloud
-
Clavister
-
Clavister, Security in the cloud, Clavister White Paper (2008), pp. 1-6.
-
(2008)
Clavister White Paper
, pp. 1-6
-
-
-
15
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
S. L. Garfinkel, Email-based identification and authentication: An alternative to PKI?, IEEE Security and Privacy (2003), pp. 20-26.
-
(2003)
IEEE Security and Privacy
, pp. 20-26
-
-
Garfinkel, S.L.1
-
16
-
-
52149124050
-
-
Citeseer
-
S. L. Garfinkel, An evaluation of amazon's grid computing services: EC2, S3, and SQS, Citeseer, 2007, pp. 1-15.
-
(2007)
An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS
, pp. 1-15
-
-
Garfinkel, S.L.1
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-serviceprovider model
-
B. I. H. Hacig, C. Li and S. Mehrotra, Executing SQL over encrypted data in the database-serviceprovider model, Proceedings of the 2002 ACM SIGMOD international conference on Management of data, ACM, Madison, Wisconsin, 2002, pp. 216-227.
-
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, ACM, Madison, Wisconsin, 2002
, pp. 216-227
-
-
Hacig, B.I.H.1
Li, C.2
Mehrotra, S.3
-
20
-
-
70349309706
-
Data security in the world of cloud computing
-
L. M. Kaufman, Data security in the world of cloud computing, IEEE Security & Privacy (2009), pp. 61-64.
-
(2009)
IEEE Security & Privacy
, pp. 61-64
-
-
Kaufman, L.M.1
-
22
-
-
67649641447
-
Supporting Database Applications as a Service
-
H. Mei, J. Dawei, L. Guoliang and Z. Yuan, Supporting Database Applications as a Service, Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on, 2009, pp. 832-843.
-
Data Engineering, 2009. ICDE '09. IEEE 25th International Conference On, 2009
, pp. 832-843
-
-
Mei, H.1
Dawei, J.2
Guoliang, L.3
Yuan, Z.4
-
23
-
-
74049152260
-
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, ACM, 2009, pp. 199-212.
-
(2009)
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-party Compute Clouds
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
78649334744
-
Security guidance for critical areas of focus in cloud computing
-
H. A. Seccombe A, Meisel A, Windel A, Mohammed A, Licciardi A, etal., Security guidance for critical areas of focus in cloud computing, CloudSecurityAlliance, 2009, p. 25. (2009).
-
(2009)
CloudSecurityAlliance
, vol.2009
, pp. 25
-
-
A, H.1
Seccombe, A.2
Meisel, A.3
Windel, A.4
Mohammed, A.5
Licciardi, A.6
-
25
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. ACM, 22 (1979), pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
84856093041
-
-
Sun, http://blogs.sun.com/gbrunett/entry/amazon-s3-silent-data- corruption.
-
-
-
-
29
-
-
78650065157
-
Security and Privacy Challenges in Cloud Computing Environments
-
IEEE
-
H. Takabi, J. B. D. Joshi and G. Ahn, Security and Privacy Challenges in Cloud Computing Environments, Security & Privacy, IEEE, 8 (2010), pp. 24-31.
-
(2010)
Security & Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
30
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, A break in the clouds: towards a cloud definition, ACM SIGCOMM Computer Communication Review, 39 (2008), pp. 50-55.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.39
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
31
-
-
69349098776
-
Cloud computing and the common man
-
J. Viega, Cloud computing and the common man, Computer, 42 (2009), pp. 106-108.
-
(2009)
Computer
, vol.42
, pp. 106-108
-
-
Viega, J.1
-
32
-
-
79955805332
-
The Byzantine empire in the intercloud
-
M. Vukolic The Byzantine empire in the intercloud, ACM SIGACT News, 41 (2010), pp. 105-111.
-
(2010)
ACM SIGACT News
, vol.41
, pp. 105-111
-
-
Vukolic, M.1
-
33
-
-
70449569012
-
-
IEEE
-
C. Wang, Q. Wang, K. Ren and W. Lou, Ensuring data storage security in cloud computing, IEEE, 2009, pp. 1-9.
-
(2009)
Ensuring Data Storage Security in Cloud Computing
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
|