-
1
-
-
68249129760
-
Above the clouds: A berkely view of cloud computing
-
(Accessed in May 2011)
-
M. Armbrust, A. fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, "Above the Clouds: A Berkely view of Cloud Computing" Technical Report No. UCB/EECS-2009-28. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf (Accessed in May 2011).
-
Technical Report No. UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
77949861819
-
-
whitepaper 1st edition, June or
-
"Introduction to Cloud Computing architecture", whitepaper 1st edition, June 2009, or http://webobjects.cdw.com/webobjects/media/pdf/Sun-Cloud- Computing.pdf.
-
(2009)
Introduction to Cloud Computing Architecture
-
-
-
4
-
-
78349236138
-
Demystifying the cloud
-
viewed 13 December 2009
-
Global Netoptex Incorporated, 2009, demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13 December 2009.
-
(2009)
Important Opportunities, Crucial Choices
, pp. 4-14
-
-
-
5
-
-
77954945350
-
The information assurance practices of cloud computing vendors
-
R. Chakraborty, S. Ramireddy, T.S. Raghu, H. R. Rao, "The Information Assurance Practices of Cloud Computing Vendors". IT Professional, vol.12, 2010. pp.29-37.
-
(2010)
IT Professional
, vol.12
, pp. 29-37
-
-
Chakraborty, R.1
Ramireddy, S.2
Raghu, T.S.3
Rao, H.R.4
-
6
-
-
70749100039
-
Cloud computing: Will commodity services benefit users long term?
-
H. G. Miller and J. Veiga, "Cloud Computing: Will Commodity Services Benefit Users Long Term?" IT Professional, vol.11, 2010, Pp.29-37.
-
(2010)
IT Professional
, vol.11
, pp. 29-37
-
-
Miller, H.G.1
Veiga, J.2
-
7
-
-
77950653648
-
Hide and seek in the cloud
-
IEEE
-
M. S. Blumenthal, "Hide and Seek in the Cloud". Security & Privacy, IEEE, vol 8, 2010, Pp 57-58.
-
(2010)
Security & Privacy
, vol.8
, pp. 57-58
-
-
Blumenthal, M.S.1
-
8
-
-
80053153208
-
-
Ponemon Institute, Research Report, May
-
L. Ponemon, "Security of Cloud Computing Users," Ponemon Institute, Research Report, May 2010. http://www.ca.com/files/industryresearch/ security-cloud-computing-users-235659.pdf
-
(2010)
Security of Cloud Computing Users
-
-
Ponemon, L.1
-
9
-
-
78349242824
-
New IDC IT cloud services survey: Top benefits and challenges
-
viewed 14 July 2011
-
F. Gens, 2009,' New IDC IT Cloud Services Survey: Top Benefits and Challenges', IDC eXchange, viewed 14 July 2011, http://blogs.idc.com/ie/?p=730.
-
(2009)
IDC EXchange
-
-
Gens, F.1
-
10
-
-
84856514139
-
Two factor authentication for cloud computing
-
S. Lee, I. Ong, H.T. Lim, H.J. Lee, "Two factor authentication for cloud computing", International Journal of KIMICS, vol 8, Pp. 427-432
-
International Journal of KIMICS
, vol.8
, pp. 427-432
-
-
Lee, S.1
Ong, I.2
Lim, H.T.3
Lee, H.J.4
-
12
-
-
77955797759
-
Cloud computing system based on trusted computing platform
-
International Conference on
-
Z. Shen, L. Li, F. Yan, X. Wu, "Cloud Computing System Based on Trusted Computing Platform", Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, vol 1, Pp 942-945.
-
(2010)
Intelligent Computation Technology and Automation (ICICTA)
, vol.1
, pp. 942-945
-
-
Shen, Z.1
Li, L.2
Yan, F.3
Wu, X.4
-
13
-
-
77955905901
-
Security and cloud computing: Intercloud identity management infrastructure
-
A. Celesti, F. Tusa, M. Villari, A Puliafito, "Security and Cloud Computing: InterCloud Identity Management Infrastructure", 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010, Pp 263-265.
-
(2010)
19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE)
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
14
-
-
71749119798
-
Access control of cloud services based on UCON
-
LNCS 5931
-
C. Danwei, H. Xiuli, and R. Xugyi, "Access control of cloud services based on UCON," CloudCom 2009, LNCS 5931, pp. 559-564, 2009.
-
(2009)
CloudCom 2009
, pp. 559-564
-
-
Danwei, C.1
Xiuli, H.2
Xugyi, R.3
-
15
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password authentication with insecure communication," Comm. ACM 24(11), Nov 1981, 770-771.
-
(1981)
Comm. ACM
, vol.24
, Issue.11
, pp. 770-771
-
-
Lamport, L.1
-
16
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.S. Hwang, and L.H. Li, "A New Remote User Authentication Scheme using Smart Cards", IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
17
-
-
51849126082
-
Cryptanalysis and security enhancement of two password authentication schemes with smart cards
-
INMIC IEEE International
-
M.K. Khan, "Cryptanalysis and Security Enhancement of Two Password Authentication Schemes with Smart Cards", Multitopic Conference, 2007. INMIC 2007. IEEE International.
-
(2007)
Multitopic Conference, 2007
-
-
Khan, M.K.1
-
18
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication: Smart card," Comput. Secur. 21 (4) (2002) 372-375.
-
(2002)
Comput. Secur.
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
19
-
-
33748126252
-
A password authentication scheme over insecure networks
-
DOI 10.1016/j.jcss.2005.10.001, PII S0022000005001157
-
I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, "A password authentication scheme over insecure networks," J. Comput. System Sci. 72 (4) (2006) 727-740. (Pubitemid 44308160)
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
20
-
-
4043072876
-
Efficient remote user authentication scheme based on generalized ElGamal signature scheme
-
May
-
E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Efficient remote user authentication scheme based on generalized ElGamal signature scheme," IEEE Trans. Consum. Electron. 50 (2) (May 2004) 568-570.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 568-570
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
21
-
-
33744828520
-
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
-
CANS 2005, LNCS Springer-Verlag
-
E.J. Yoon, K.Y. Yoo, "New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange," 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS vol. 3810, Springer-Verlag, 2005, pp. 147-160.
-
(2005)
4th International Conference of Cryptology and Network Security
, vol.3810
, pp. 147-160
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
22
-
-
0032669728
-
Cryptanalysis of remote login authentication scheme
-
M.-S. Hwang, "Cryptanalysis of remote login authentication scheme," Comput. Commun. 22 (8) (1999). Pp. 742-744.
-
(1999)
Comput. Commun.
, vol.22
, Issue.8
, pp. 742-744
-
-
Hwang, M.-S.1
-
23
-
-
0000362936
-
An Improvement of SPLICE/AS in WIDE against Guessing Attack
-
M.-S. Hwang, C.-C. Lee, Y.-L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack," Internat. J. Inform. 12 (2) (2001). pp. 297-302. (Pubitemid 33675133)
-
(2001)
Informatica
, vol.12
, Issue.2
, pp. 297-302
-
-
Hwang, M.-S.1
Lee, C.-C.2
Tang, Y.-L.3
-
24
-
-
33645758252
-
Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints
-
M. Scott, "Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev. 38 (2) (2004). Pp. 73-75.
-
(2004)
SIGOPS Oper. Syst. Rev.
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
25
-
-
0242552288
-
Cryptanalysis of an enhanced timestamp-based password authentication scheme
-
B. Wang, J.H. Li, Z.P. Tong, "Cryptanalysis of an enhanced timestamp-based password authentication scheme," Comput. Secur. 22 (7) (2003). pp. 643-645.
-
(2003)
Comput. Secur.
, vol.22
, Issue.7
, pp. 643-645
-
-
Wang, B.1
Li, J.H.2
Tong, Z.P.3
-
26
-
-
33744828520
-
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
-
CANS 2005, LNCS Springer-Verlag
-
E.J. Yoon, K.Y. Yoo, "New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange," 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS, vol. 3810, Springer-Verlag, 2005, pp. 147-160.
-
(2005)
4th International Conference of Cryptology and Network Security
, vol.3810
, pp. 147-160
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
27
-
-
84947904235
-
Session key distribution using smartcards
-
LNCS Springer-Verlag
-
V. Shoup, A. Rubin, "Session key distribution using smartcards", in: Proc. EUROCRYPT 96, in: LNCS., vol 1070, Springer-Verlag, 1996, pp 321-333
-
(1996)
Proc. EUROCRYPT 96
, vol.1070
, pp. 321-333
-
-
Shoup, V.1
Rubin, A.2
-
28
-
-
0001940580
-
Provably secure session key distribution - The third party case
-
ACM, Las Vegas
-
M. Bellare, P. Rogaway, Provably secure session key distribution-The third party case, in: Proc. 27th ACM Symp. on Theory of Computing, ACM, Las Vegas, 1995, pp 57-66.
-
(1995)
Proc. 27th ACM Symp. on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
29
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang, D. S. Wong, H. Wang, X. Deng, "Two-factor mutual authentication based on smart cards and passwords", Journal of Computer and System Sciences, vol 74, 2008, Pp. 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
|