메뉴 건너뛰기




Volumn 9, Issue 4, 2012, Pages 556-568

Ensuring distributed accountability for data sharing in the cloud

Author keywords

accountability; Cloud computing; data sharing.

Indexed keywords

CLOUD COMPUTING; WEB SERVICES;

EID: 84861176850     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.26     Document Type: Article
Times cited : (159)

References (46)
  • 1
    • 0027649548 scopus 로고
    • Distributed timestamp generation in planar lattice networks ACM
    • Aug.
    • P. Ammann and S. Jajodia, "Distributed Timestamp Generation in Planar Lattice Networks," ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
    • (1993) Trans. Computer Systems , vol.11 , pp. 205-225
    • Ammann, P.1    Jajodia, S.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Int'l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 24344453002 scopus 로고    scopus 로고
    • Lineage retrieval for scientific data processing: A survey
    • DOI 10.1145/1057977.1057978
    • R. Bose and J. Frew, "Lineage Retrieval for Scientific Data Processing: A Survey," ACM Computing Surveys, vol. 37, pp. 1-28, Mar. 2005. (Pubitemid 41246320)
    • (2005) ACM Computing Surveys , vol.37 , Issue.1 , pp. 1-28
    • Bose, R.1    Frew, J.2
  • 8
    • 84861175256 scopus 로고    scopus 로고
    • OASIS Security Services Technical Committee
    • OASIS Security Services Technical Committee, "Security Assertion Markup Language (saml) 2.0," http://www.oasis-open.org/committees/tc home.php?wg abbrev=security, 2012.
    • (2012) Security Assertion Markup Language (Saml) 2.0
  • 10
    • 84956993751 scopus 로고    scopus 로고
    • Reasoning about Accountability within Delegation
    • Information and Communications Security
    • B. Crispo and G. Ruffo, "Reasoning about Accountability within Delegation," Proc. Third Int'l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001. (Pubitemid 33361975)
    • (2001) Lecture Notes in Computer Science , Issue.2229 , pp. 251-260
    • Crispo, B.1    Ruffo, G.2
  • 11
    • 35248822611 scopus 로고    scopus 로고
    • Oblivious hashing: A stealthy software integrity verification primitive
    • F. Petitcolas, ed.
    • Y. Chen et al., "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive," Proc. Int'l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003.
    • (2003) Proc. Int'l Workshop Information Hiding , pp. 400-414
    • Chen, Y.1
  • 14
    • 84861153374 scopus 로고    scopus 로고
    • Flickr
    • Flickr, http://www.flickr.com/, 2012.
    • (2012)
  • 16
    • 0035424017 scopus 로고    scopus 로고
    • Location systems for ubiquitous computing
    • DOI 10.1109/2.940014
    • J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001. (Pubitemid 32742945)
    • (2001) Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Borriello, G.2
  • 19
    • 69949171348 scopus 로고    scopus 로고
    • Cloud computing and information policy: Computing in a policy cloud?
    • P.T. Jaeger, J. Lin, and J.M. Grimes, "Cloud Computing and Information Policy: Computing in a Policy Cloud?," J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
    • (2009) J. Information Technology and Politics , vol.5 , Issue.3 , pp. 269-283
    • Jaeger, P.T.1    Lin, J.2    Grimes, J.M.3
  • 21
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. Software Eng., vol. 22, no. 5, pp. 313-328, May 1996. (Pubitemid 126771673)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 24
  • 32
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
    • A. Pretschner, M. Hilty, and D. Basin, "Distributed Usage Control," Comm. ACM, vol. 49, no. 9, pp. 39-44, Sept. 2006. (Pubitemid 44371759)
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 35
    • 84861166049 scopus 로고    scopus 로고
    • NTP: The Network Time Protocol
    • NTP: The Network Time Protocol, http://www.ntp.org/, 2012.
    • (2012)
  • 38
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • T.J.E. Schwarz and E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Proc. IEEE Int'l Conf. Distributed Systems, p. 12, 2006.
    • (2006) Proc. IEEE Int'l Conf. Distributed Systems , pp. 12
    • Schwarz, T.J.E.1    Miller, E.L.2
  • 41
  • 46
    • 34548043501 scopus 로고    scopus 로고
    • Towards a VMM-based usage control framework for OS kernel integrity protection
    • DOI 10.1145/1266840.1266852, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
    • M. Xu, X. Jiang, R. Sandhu, and X. Zhang, "Towards a VMMBased Usage Control Framework for OS Kernel Integrity Protection," SACMAT '07: Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 71-80, 2007. (Pubitemid 47281539)
    • (2007) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 71-80
    • Xu, M.1    Jiang, X.2    Sandhu, R.3    Zhang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.