-
1
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I,. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 2009; 25 (6): 599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
2
-
-
49149119622
-
Computing in the cloud
-
Weiss A,. Computing in the cloud. ACM Networker 2007; 11 (4): 16-25.
-
(2007)
ACM Networker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
3
-
-
77950347409
-
Above the clouds: A Berkeley view of cloud computing
-
et al
-
Armbrust M,. et al. Above the clouds: A Berkeley view of cloud computing. Communications of the ACM 2010; 53 (6): 50-58.
-
(2010)
Communications of the ACM
, vol.53
, Issue.6
, pp. 50-58
-
-
Armbrust, M.1
-
4
-
-
71749102261
-
-
Beijing, China, 1-4 December
-
Pearson S, Shen Y, Mowbray M,. A privacy manager for cloud computing. Proceedings of the First International Conference on Cloud Computing, Beijing, China, 1-4 December 2009; 90-106.
-
(2009)
A Privacy Manager for Cloud Computing. Proceedings of the First International Conference on Cloud Computing
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
6
-
-
70349900879
-
Generation of similarity knowledge flow for intelligent browsing based on semantic link networks
-
et al
-
Luo X, Xu Z,. et al. Generation of similarity knowledge flow for intelligent browsing based on semantic link networks. Concurrency Computation: Practice and Experience 2009; 21 (16): 2018-2032.
-
(2009)
Concurrency Computation: Practice and Experience
, vol.21
, Issue.16
, pp. 2018-2032
-
-
Luo, X.1
Xu, Z.2
-
7
-
-
85016228906
-
-
IBM Cloud Labs 2009 [5 April ]
-
IBM Cloud Labs. IBM Perspective on Cloud Computing. Available at:, 2009 [5 April 2010 ].
-
(2010)
IBM Perspective on Cloud Computing
-
-
-
8
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Beijing, China, 1-4 December
-
Yan L, Rong C, Zhao G,. Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. Proceedings of the First International Conference on Cloud Computing, Beijing, China, 1-4 December 2009; 167-177.
-
(2009)
Proceedings of the First International Conference on Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
9
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX, U.S.A., 14-19 May
-
Agrawal R, Srikant R,. Privacy-preserving data mining. Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, U.S.A., 14-19 May 2000; 439-450.
-
(2000)
Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
11
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, CA, U.S.A., 9-11 June
-
Evfimievski A, Gehrke J, Srikant R,. Limiting privacy breaches in privacy preserving data mining. Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, San Diego, CA, U.S.A., 9-11 June 2003; 211-222.
-
(2003)
Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
12
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
DOI 10.1016/j.datak.2007.06.011, PII S0169023X07001322
-
Liu L, Kantarcioglu M, Thuraisingham B,. The applicability of the perturbation based privacy preserving data mining for real-world data. Data and Knowledge Engineering 2008; 65 (1): 5-21. (Pubitemid 351295928)
-
(2008)
Data and Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
13
-
-
0032201622
-
Private information retrieval
-
Chor B, Kushilevitz E, Goldreich O, Sudan M,. Private information retrieval. Journal of ACM 1998; 45 (6): 965-981.
-
(1998)
Journal of ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
14
-
-
21144453606
-
General constructions for information-theoretic private information retrieval
-
DOI 10.1016/j.jcss.2005.03.002, PII S0022000005000309
-
Beimel A, Ishai Y, Kushilevitz E,. General constructions for information-theoretic private information retrieval. Journal of Computer System Science 2005; 71 (2): 213-247. (Pubitemid 40878949)
-
(2005)
Journal of Computer and System Sciences
, vol.71
, Issue.2
, pp. 213-247
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
15
-
-
0036957230
-
Breaking the O(n1/(2k - 1)) barrier for information-theoretic private information retrieval
-
Vancouver, Canada, 16-19 November
-
Beimel A, Ishai Y, Kushilevitz E, Raymond J,. Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval. Proceedings of the 43rd Annual Symposium on Foundations of Computer Science, Vancouver, Canada, 16-19 November 2002; 261-270.
-
(2002)
Proceedings of the 43rd Annual Symposium on Foundations of Computer Science
, pp. 261-270
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Raymond, J.4
-
16
-
-
34548787882
-
Improving the robustness of private information retrieval
-
Oakland, CA, U.S.A., 20-23 May
-
Goldberg I,. Improving the robustness of private information retrieval. Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 20-23 May 2007; 131-148.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 131-148
-
-
Goldberg, I.1
-
17
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Springer: Berlin, Heidelberg, January 1999;. ISSN: 0302-9743, ISBN: 978-3-540-65889-4
-
Cachin C, Micali S, Stadler M,. Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology- EUROCRYPT'99. Springer: Berlin, Heidelberg, January 1999; 402-414. ISSN: 0302-9743, ISBN: 978-3-540-65889-4.
-
Advances in Cryptology-EUROCRYPT'99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
18
-
-
74249119947
-
Extended attribute based encryption for private information retrieval
-
Macau, China, 12-15 October
-
Yinan S, Cao Z,. Extended attribute based encryption for private information retrieval. Proceedings of IEEE 6th International Conference on Mobile Ad-hoc and Sensor Systems (MASS '09), Macau, China, 12-15 October, 2009; 702-707.
-
(2009)
Proceedings of IEEE 6th International Conference on Mobile Ad-hoc and Sensor Systems (MASS '09)
, pp. 702-707
-
-
Yinan, S.1
Cao, Z.2
-
21
-
-
85084161366
-
Tor: The second generation onion router
-
San Diego, CA, U.S.A., 9-13 August
-
Dingledine R, Mathewson N, Syverson P,. Tor: The second generation onion router. Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, U.S.A., 9-13 August 2004; 21-21.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
22
-
-
70449632682
-
De-anonymizing social networks
-
Oakland, CA, U.S.A., 17-20 May
-
Narayanan A, Shmatikov V,. De-anonymizing social networks. Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 17-20 May 2009; 173-187.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
23
-
-
70849118924
-
Examining the shifting nature of privacy, identities, and impression management with Web 2.0
-
4, Vancouver, Canada, 29-31 August
-
Hawkey K,. Examining the shifting nature of privacy, identities, and impression management with Web 2.0. Proceedings of 2009 International Conference on Computational Science and Engineering, vol. 4, Vancouver, Canada, 29-31 August 2009; 990-995.
-
(2009)
Proceedings of 2009 International Conference on Computational Science and Engineering
, pp. 990-995
-
-
Hawkey, K.1
-
24
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
Preprint, June
-
Ardagna C, Cremonini M, De Capitani di Vimercati S, Samarati P,. An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing, Preprint, June 2009.
-
(2009)
IEEE Transactions on Dependable and Secure Computing
-
-
Ardagna, C.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
25
-
-
68349138297
-
A hybrid positioning system for technology-independent location-aware computing
-
ISSN: 1097-024X
-
Ficco M, Russo S,. A hybrid positioning system for technology-independent location-aware computing. Software: Practice and Experience 2009; 39 (13): 1095-1125. ISSN: 1097-024X.
-
(2009)
Software: Practice and Experience
, vol.39
, Issue.13
, pp. 1095-1125
-
-
Ficco, M.1
Russo, S.2
-
26
-
-
0027307382
-
On introducing noise into the bus-contention channel
-
Oakland, CA, U.S.A., 24-26 May
-
James I, Gray W,. On introducing noise into the bus-contention channel. Proceedings of the 1993 IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 24-26 May 1993; 90-98.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 90-98
-
-
James, I.1
Gray, W.2
-
27
-
-
70849130158
-
Noise injection for search privacy protection
-
Vancouver, Canada, 29-31 August
-
Ye S, Wu F, Pandey R, Chen H,. Noise injection for search privacy protection. Proceedings of the 2009 International Conference on Computational Science and Engineering, vol. 3, Vancouver, Canada, 29-31 August 2009; 1-8.
-
(2009)
Proceedings of the 2009 International Conference on Computational Science and Engineering
, vol.3
, pp. 1-8
-
-
Ye, S.1
Wu, F.2
Pandey, R.3
Chen, H.4
-
28
-
-
70749131896
-
Multidimensional dynamic trust management for federated services
-
Vancouver, Canada, 29-31 August
-
Boursas L, Hommel W,. Multidimensional dynamic trust management for federated services. Proceedings of the 2009 International Conference on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 August 2009; 684-689.
-
(2009)
Proceedings of the 2009 International Conference on Computational Science and Engineering
, vol.2
, pp. 684-689
-
-
Boursas, L.1
Hommel, W.2
-
29
-
-
34547505017
-
PP-Trust-X: A system for privacy preserving trust negotiations
-
Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B,. PP-Trust-X: A system for privacy preserving trust negotiations. ACM Transactions on Information and System Security 2007; 10 (3): 50.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
, pp. 50
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
30
-
-
0037430830
-
Access control and trust in the use of widely distributed services
-
Bacon J, Moody K, Yao W,. Access control and trust in the use of widely distributed services. Software: Practice and Experience 2003; 33 (4): 375-394.
-
(2003)
Software: Practice and Experience
, vol.33
, Issue.4
, pp. 375-394
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
31
-
-
72449135752
-
Maintaining control while delegating trust: Integrity constraints in trust management
-
Etalle S, Winsborough W,. Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security 2009; 13 (1): 27.
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
, pp. 27
-
-
Etalle, S.1
Winsborough, W.2
-
33
-
-
71749098580
-
Trust model to enhance security and interoperability of cloud environment
-
Beijing, China, 1-4 December
-
Li W, Ping L,. Trust model to enhance security and interoperability of cloud environment. Proceedings of the First International Conference on Cloud Computing, Beijing, China, 1-4 December 2009; 69-79.
-
(2009)
Proceedings of the First International Conference on Cloud Computing
, pp. 69-79
-
-
Li, W.1
Ping, L.2
-
34
-
-
4644323662
-
Enhancing grid security with trust management
-
Proceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
-
Lin C, Varadharajan V, Wang Y, Pruthi V,. Enhancing grid security with trust management. Proceedings of the 2004 IEEE International Conference on Services Computing (SCC'04), Shanghai, China, 15-18 September 2004; 303-310. (Pubitemid 40201759)
-
(2004)
Proceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
, pp. 303-310
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Pruthi, V.4
-
35
-
-
78951488046
-
SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications
-
Springer: Berlin, ISBN: 978-1-4419-6523-3
-
Liu X, Yuan D, Zhang G, Chen J, Yang Y,. SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications. Handbook of Cloud Computing. Springer: Berlin, 2010; 309-332. ISBN: 978-1-4419-6523-3.
-
(2010)
Handbook of Cloud Computing
, pp. 309-332
-
-
Liu, X.1
Yuan, D.2
Zhang, G.3
Chen, J.4
Yang, Y.5
-
36
-
-
84860423157
-
-
SwinDeW-G Available at:, 10 May 2010
-
SwinDeW-G Team. System Architecture of SwinDeW-G, 2008. Available at:, 10 May 2010.
-
(2010)
System Architecture of SwinDeW-G
-
-
|