-
2
-
-
74049122943
-
Privacy-preserving digital identity management for cloud computing
-
E. Bertino, F. Paci, R. Ferrini, and N. Shang. Privacy-preserving digital identity management for cloud computing. IEEE Data Engineering Bulletin, 32(1):21-27, 2009.
-
(2009)
IEEE Data Engineering Bulletin
, vol.32
, Issue.1
, pp. 21-27
-
-
Bertino, E.1
Paci, F.2
Ferrini, R.3
Shang, N.4
-
3
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599-616, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
4
-
-
77954327465
-
WhatSs new about cloud computing security?
-
University of California, Berkeley
-
Y. Chen, V. Paxson, and R. Katz. WhatSs New About Cloud Computing Security? Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley, 2010.
-
(2010)
Tech. Rep. UCB/EECS-2010-5, EECS Department
-
-
Chen, Y.1
Paxson, V.2
Katz, R.3
-
5
-
-
71849115601
-
Data protection-aware design for cloud computing
-
Springer-Verlag
-
S. Creese, P. Hopkins, S. Pearson, and Y. Shen. Data protection-aware design for cloud computing. In Proceedings of the first International Conference on Cloud Computing, pages 119-130. Springer-Verlag, 2009.
-
(2009)
Proceedings of the First International Conference on Cloud Computing
, pp. 119-130
-
-
Creese, S.1
Hopkins, P.2
Pearson, S.3
Shen, Y.4
-
6
-
-
77949590054
-
Distributed intrusion detection in clouds using mobile agents
-
International Conference on IEEE Computer Society
-
A. V. Dastjerdi, K. A. Bakar, and S. G. H. Tabatabaei. Distributed intrusion detection in clouds using mobile agents. In Advanced Engineering Computing and Applications in Sciences, International Conference on, volume 0, pages 175-180. IEEE Computer Society, 2009.
-
(2009)
Advanced Engineering Computing and Applications in Sciences
, pp. 175-180
-
-
Dastjerdi, A.V.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
8
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
IEEE Computer Society
-
I. Foster, Y. Zhao, I. Raicu, and S. Lu. Cloud computing and grid computing 360-degree compared. In Proceedings of the Grid Computing Environments Workshop, pages 1-10. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
11
-
-
74349113474
-
On technical security issues in cloud computing
-
IEEE Computer Society
-
M. Jensen, J. Schwenk, N. Gruschka, and L. Iacono. On technical security issues in cloud computing. In Proceedings of the IEEE International Conference on Cloud Computing, pages 109-116. IEEE Computer Society, 2009.
-
(2009)
Proceedings of the IEEE International Conference on Cloud Computing
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.4
-
12
-
-
84857990384
-
-
Microsoft, May Retrieved December 2010
-
Securing MicrosoftŠs Cloud Infrastructure. Microsoft, May 2009. Retrieved December 2010, from www.globalfoundationservices.com/security.
-
(2009)
Securing MicrosoftŠs Cloud Infrastructure
-
-
-
15
-
-
34547448344
-
OpenID 2.0: A platform for user-centric identity management
-
DOI 10.1145/1179529.1179532, Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
D. Recordon and D. Reed. Openid 2.0: A platform for user-centric identity management. In Proceedings of the Second ACM Workshop on Digital Identity Management, pages 11-16. ACM Press, 2006. (Pubitemid 47165640)
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
16
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
18
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Springer-Verlag
-
L. Yan, C. Rong, and G. Zhao. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. In Proceedings of the first International Conference on Cloud Computing, pages 167-177. Springer-Verlag, 2009.
-
(2009)
Proceedings of the First International Conference on Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
|