-
1
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering IT services as the 5th utility
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering IT services as the 5th utility. Future Generation of Computer Systems 2009; 25: 599-616.
-
(2009)
Future Generation of Computer Systems
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
3
-
-
84858377386
-
Privacy regulations for cloud computing - Compliance and implementation in theory and practice
-
Ruiter J, Warnier M. Privacy regulations for cloud computing - compliance and implementation in theory and practice. SPCC 2010.
-
(2010)
SPCC
-
-
Ruiter, J.1
Warnier, M.2
-
6
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009.
-
(2009)
CCS
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
7
-
-
78650851875
-
Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 Era
-
Soghoian, C. Caught in the cloud: privacy, encryption, and government back doors in the Web 2.0 Era, J on Telecomm & High Tech L 2009, 8: 359-424.
-
(2009)
J on Telecomm & High Tech L
, vol.8
, pp. 359-424
-
-
Soghoian, C.1
-
10
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry C. Fully homomorphic encryption using ideal lattices. ACM Symposium on Theory of Computing 2009, 169-178.
-
(2009)
ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
11
-
-
82655174072
-
IBM touts encryption innovation
-
June 25
-
Cooney M. IBM touts encryption innovation. Computer World 2009, June 25.
-
(2009)
Computer World
-
-
Cooney, M.1
-
12
-
-
84858381053
-
Homomorphic encryption breakthrough
-
July 9
-
Schneier B. Homomorphic encryption breakthrough. Schneier on Security 2009, July 9.
-
(2009)
Schneier on Security
-
-
Schneier, B.1
-
13
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R. et al. Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009.
-
(2009)
CCSW
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
-
16
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM 2010, 1-9.
-
(2010)
INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
17
-
-
84858377389
-
A maturity model for cloud computing
-
December 12
-
Urquhart J. A maturity model for cloud computing. CNET News 2008, December 12.
-
(2008)
CNET News
-
-
Urquhart, J.1
-
19
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
Pearson S. Taking account of privacy when designing cloud computing services. ICSE-Cloud 2009.
-
(2009)
ICSE-Cloud
-
-
Pearson, S.1
-
21
-
-
79960242476
-
-
Oct. 2009
-
Centre for Information Policy Leadership (CIPL). Data Protection Accountability: The Essential Elements, Oct. 2009. Available from: http://www.huntonfiles.com/files/webupload/CIPL-Galway-Accountability-Paper.pdf. 2009
-
(2009)
Data Protection Accountability: The Essential Elements
-
-
-
22
-
-
84858381054
-
-
Oct. 2010
-
Centre for Information Policy Leadership (CIPL). Demonstrating and Measuring Accountability: A Discussion Document, Oct. 2010. Available from: http://www.huntonfiles.com/files/webupload/CIPL-Accountability-Phase-II-Paris- Project.PDF. 2010.
-
(2010)
Demonstrating and Measuring Accountability: A Discussion Document
-
-
-
23
-
-
78049329836
-
Accountability as a service for the cloud: From concept to implementation with BPEL
-
Yao J, Chen S, Wang C, Levy D, Zic J. Accountability as a Service for the Cloud: From Concept to Implementation with BPEL. Proc. 6th IEEE World Congress on Services, 2000, 91-98.
-
(2000)
Proc. 6th IEEE World Congress on Services
, pp. 91-98
-
-
Yao, J.1
Chen, S.2
Wang, C.3
Levy, D.4
Zic, J.5
-
24
-
-
77950562201
-
Accountability as a way forward for privacy protection in the cloud
-
Pearson S, Charlesworth A. Accountability as a way forward for privacy protection in the cloud. CloudCom 2009.
-
(2009)
CloudCom
-
-
Pearson, S.1
Charlesworth, A.2
-
27
-
-
84858388464
-
"Apps.Gov": Assessing privacy in the cloud computing
-
Khan S. "Apps.Gov": assessing privacy in the cloud computing. NCJL & Tech 2010, 11: 259-289.
-
(2010)
NCJL & Tech
, vol.11
, pp. 259-289
-
-
Khan, S.1
-
29
-
-
77954044387
-
Free at what costs?: Cloud computing privacy under the stored communications act
-
Robison WJ. Free at what costs?: cloud computing privacy under the stored communications act. The Georgetown Law Journal 2010, 98, 1195-1239.
-
(2010)
The Georgetown Law Journal
, vol.98
, pp. 1195-1239
-
-
Robison, W.J.1
-
30
-
-
84858413539
-
Coalition: New laws needed to curb government access to private data
-
March 31
-
Morphy E. Coalition: new laws needed to curb government access to private data. E Commerce Times 2010, March 31.
-
(2010)
E Commerce Times
-
-
Morphy, E.1
-
31
-
-
8344286664
-
Protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive 95/46/EC of the European Parliament and of the council of 24 October 1995 on the, No L281/31
-
Directive 95/46/EC of the European Parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities 1995, No L 281/31.
-
(1995)
Official Journal of the European Communities
-
-
-
32
-
-
84858413538
-
New security breach notification requirements under amended e-privacy directive
-
March 01
-
Dhont J, Woodcock K. New security breach notification requirements under amended e-privacy directive. The Privacy Advisor 2010, March 01.
-
(2010)
The Privacy Advisor
-
-
Dhont, J.1
Woodcock, K.2
-
34
-
-
84858432432
-
Clouds at the crossroads: Research perspectives and challenges
-
Vigfusson Y, Chockler G. Clouds at the crossroads: research perspectives and challenges. ACM Crossroads 2010, 16(3).
-
(2010)
ACM Crossroads
, vol.16
, Issue.3
-
-
Vigfusson, Y.1
Chockler, G.2
|