-
1
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
0167-739X
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Gener. Comput. Syst. 0167-739X 25 6 June 2009 599 616
-
(2009)
Future Gener. Comput. Syst.
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
2
-
-
49149119622
-
Computing in the cloud
-
1091-3556
-
A. Weiss Computing in the cloud ACM Networker 1091-3556 11 4 December 2007 16 25
-
(2007)
ACM Networker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
3
-
-
68249129760
-
-
Berkeley, California, USA, 2010, accessed on January 21
-
M. Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, Berkeley, California, USA, 2010, http://www.eecs.berkeley.edu/Pubs/TechRpts/ 2009/EECS-2009-28.html, accessed on January 21, 2011.
-
(2011)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
-
4
-
-
71749102261
-
A privacy manager for cloud computing
-
Beijing, China, December 1-4
-
S. Pearson, Y. Shen, M. Mowbray, A privacy manager for cloud computing, in: Proceedings of The 1st International Conference on Cloud Computing, Beijing, China, December 1-4, 2009, pp. 90-106.
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
5
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
Vancouver, Canada, May 23
-
S. Pearson, Taking account of privacy when designing cloud computing services, in: Proceedings of the 2009 ICSE (International Conference on Software Engineering) Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 23, 2009, pp. 44-52.
-
(2009)
Proceedings of the 2009 ICSE (International Conference on Software Engineering) Workshop on Software Engineering Challenges of Cloud Computing
, pp. 44-52
-
-
Pearson, S.1
-
6
-
-
78650837743
-
Cloud computing privacy concerns on our doorstep
-
0001-0782
-
M. Ryan Cloud computing privacy concerns on our doorstep Commun. ACM 0001-0782 54 1 January 2011 36 38
-
(2011)
Commun. ACM
, vol.54
, Issue.1
, pp. 36-38
-
-
Ryan, M.1
-
7
-
-
78650804208
-
A firm foundation for private data analysis
-
0001-0782
-
C. Dwork A firm foundation for private data analysis Commun. ACM 0001-0782 54 1 January 2011 86 95
-
(2011)
Commun. ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
8
-
-
74249102450
-
Detecting Privacy infractions in applications: A framework and methodology
-
Macau, China, October 12-15
-
M. Smit, K. Lyons, M. McAllister, J. Slonim, Detecting Privacy infractions in applications: A framework and methodology, in: Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS09), Macau, China, October 12-15, 2009, pp. 694-701.
-
(2009)
Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS09)
, pp. 694-701
-
-
Smit, M.1
Lyons, K.2
McAllister, M.3
Slonim, J.4
-
9
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Beijing, China, December 1-4
-
L. Yan, C. Rong, G. Zhao, Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, in: Proceedings of The 1st International Conference on Cloud Computing, Beijing, China, December 1-4, 2009, pp. 167-177.
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
10
-
-
71749111158
-
Privacy of value-added context-aware service cloud
-
Beijing, China, December 1-4
-
X. Huang, Y. He, Y. Hou, L. Li, L. Sun, S. Zhang, Y. Jiang, T. Zhang, Privacy of value-added context-aware service cloud, in: Proceedings of The 1st International Conference on Cloud Computing, Beijing, China, December 1-4, 2009, pp. 547-552.
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing
, pp. 547-552
-
-
Huang, X.1
He, Y.2
Hou, Y.3
Li, L.4
Sun, L.5
Zhang, S.6
Jiang, Y.7
Zhang, T.8
-
11
-
-
70849121312
-
Usable privacy controls for Blogs
-
Vancouver, Canada, August 29-31
-
M. Hart, C. Castille, R. Johnson, A. Stent, Usable privacy controls for Blogs, in: Proceedings of 2009 International Conference on Computational Science and Engineering, vol. 4, Vancouver, Canada, August 29-31, 2009, pp. 401-408.
-
(2009)
Proceedings of 2009 International Conference on Computational Science and Engineering
, vol.4
, pp. 401-408
-
-
Hart, M.1
Castille, C.2
Johnson, R.3
Stent, A.4
-
12
-
-
70849105124
-
Adapting privacy-preserving computation to the service provider model
-
Vancouver, Canada, August 29-31
-
F. Kerschbaum, Adapting privacy-preserving computation to the service provider model, in: Proceedings of 2009 International Conference on Computational, Science and Engineering, vol. 3, Vancouver, Canada, August 29-31, 2009, pp. 34-41.
-
(2009)
Proceedings of 2009 International Conference on Computational, Science and Engineering
, vol.3
, pp. 34-41
-
-
Kerschbaum, F.1
-
13
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
Oakland, California, USA, May 17-20
-
K. Simoens, P. Tuyls, B. Preneel, Privacy weaknesses in biometric sketches, in: Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 17-20, 2009, pp. 188-203.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
14
-
-
57849106781
-
Data collection with self-enforcing privacy
-
1094-9224 Article 9, 24 pages
-
P. Golle, F. Mcsherry, and I. Mironov Data collection with self-enforcing privacy ACM Trans. Inform. Syst. Secur. 1094-9224 12 2 December 2008 Article 9, 24 pages
-
(2008)
ACM Trans. Inform. Syst. Secur.
, vol.12
, Issue.2
-
-
Golle, P.1
McSherry, F.2
Mironov, I.3
-
15
-
-
0041783510
-
Privacy-preserving data mining
-
0163-5808
-
R. Agrawal, and R. Srikant Privacy-preserving data mining ACM SIGMOD Record 0163-5808 29 2 June 2000 439 450
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
17
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, California, USA, June 09-11
-
A. Evfimievski, J. Gehrke, R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proceedings of the 22nd, ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, San Diego, California, USA, June 09-11, 2003, pp. 211-222.
-
(2003)
Proceedings of the 22nd, ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
18
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
0169-023X
-
L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data and Knowledge Engineering 0169-023X 65 1 April 2008 5 21
-
(2008)
Data and Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
20
-
-
0032201622
-
Private information retrieval
-
0004-5411
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan Private information retrieval J. ACM 0004-5411 45 6 November 1998 965 981
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
21
-
-
21144453606
-
General constructions for information-theoretic private information retrieval
-
0022-0000
-
A. Beimel, Y. Ishai, and E. Kushilevitz General constructions for information-theoretic private information retrieval J. Comput. System Sci. 0022-0000 71 2 August 2005 213 247
-
(2005)
J. Comput. System Sci.
, vol.71
, Issue.2
, pp. 213-247
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
22
-
-
0036957230
-
Breaking the O (n 1 / (2 k - 1)) barrier for information-theoretic private information retrieval
-
Vancouver, Canada, November 16-19
-
A. Beimel, Y. Ishai, E. Kushilevitz, J. Raymond, Breaking the O (n 1 / (2 k - 1)) barrier for information-theoretic private information retrieval, in: Proceedings of the 43rd Annual Symposium on Foundations of Computer Science, Vancouver, Canada, November 16-19, 2002, pp. 261-270.
-
(2002)
Proceedings of the 43rd Annual Symposium on Foundations of Computer Science
, pp. 261-270
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Raymond, J.4
-
23
-
-
34548787882
-
Improving the robustness of private information retrieval
-
Oakland, California, USA, May 20-23
-
I. Goldberg, Improving the robustness of private information retrieval, in: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 20-23, 2007, pp. 131-148.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 131-148
-
-
Goldberg, I.1
-
24
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Miami Beach, Florida, USA, October 19-22
-
E. Kushilevitz, R. Ostrovsky, Replication is not needed: Single database, computationally-private information retrieval, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, Florida, USA, October 19-22, 1997, pp. 364-373.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
25
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
January ISSN 0302-9743, ISBN 978-3-540-65889-4
-
C. Cachin, S. Micali, M. Stadler, Computationally private information retrieval with polylogarithmic communication, in: Advances in Cryptology - EUROCRYPT99, January 1999, pp. 402-414, ISSN 0302-9743, ISBN 978-3-540-65889-4.
-
(1999)
Advances in Cryptology - EUROCRYPT99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
26
-
-
74249119947
-
Extended attribute based encryption for private information retrieval
-
Macau, China, October 12-15
-
S. Yinan, Z. Cao, Extended attribute based encryption for private information retrieval, in: Proceedings of IEEE 6th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS09), Macau, China, October 12-15, 2009, pp. 702-707.
-
(2009)
Proceedings of IEEE 6th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS09)
, pp. 702-707
-
-
Yinan, S.1
Cao, Z.2
-
27
-
-
70849099175
-
Distributed proxies for browsing privacy: A simulation of flocks
-
White River, South Africa, September 20-22
-
M.S. Olivier, Distributed proxies for browsing privacy: a simulation of flocks, in: Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, White River, South Africa, September 20-22, 2005, pp. 104-112.
-
(2005)
Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries
, pp. 104-112
-
-
Olivier, M.S.1
-
29
-
-
85084161366
-
Tor: The second generation onion router
-
San Diego, California, USA, August 9-13
-
R. Dingledine, N. Mathewson, P. Syverson, Tor: The second generation onion router, in: Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, California, USA, August 9-13, 2004, pp. 21-21.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
30
-
-
84937578170
-
Web mixes: A system for anonymous and unobservable internet access
-
January ISSN: 0302-9743, ISBN 978-3-540-41724-8
-
O. Berthold, H. Federrath, S. Köpsell, Web mixes: A system for anonymous and unobservable internet access, Designing Privacy Enhancing Technologies, January 2001, pp. 115-129, ISSN: 0302-9743, ISBN 978-3-540-41724-8.
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 115-129
-
-
O. Berthold1
-
31
-
-
70449632682
-
De-anonymizing social networks
-
Oakland, California, USA, May 17-20
-
A. Narayanan, V. Shmatikov, De-anonymizing social networks, in: Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 17-20, 2009, pp. 173-187.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
32
-
-
70849118924
-
Examining the shifting nature of privacy, identities, and impression management with Web 2.0
-
Vancouver, Canada, August 29-31
-
K. Hawkey, Examining the shifting nature of privacy, identities, and impression management with Web 2.0, in: Proceedings of 2009 International Conference on Computational, Science and Engineering, vol. 4, Vancouver, Canada, August 29-31, 2009, pp. 990-995.
-
(2009)
Proceedings of 2009 International Conference on Computational, Science and Engineering
, vol.4
, pp. 990-995
-
-
Hawkey, K.1
-
33
-
-
0027307382
-
On introducing noise into the bus-contention channel
-
Oakland, California, USA, May 24-26
-
I. James, W. Gray, On introducing noise into the bus-contention channel, in: Proceedings of the 1993 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 24-26, 1993, pp. 90-98.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 90-98
-
-
James, I.1
Gray, W.2
-
34
-
-
70849130158
-
Noise injection for search privacy protection
-
Vancouver, Canada, August 29-31
-
S. Ye, F. Wu, R. Pandey, H. Chen, Noise injection for search privacy protection, in: Proceedings of 2009 International Conference on Computational, Science and Engineering, vol. 3, Vancouver, Canada, August 29-31, 2009, pp. 1-8.
-
(2009)
Proceedings of 2009 International Conference on Computational, Science and Engineering
, vol.3
, pp. 1-8
-
-
Ye, S.1
Wu, F.2
Pandey, R.3
Chen, H.4
-
35
-
-
33745432342
-
Access control to people location information
-
1094-9224
-
U. Hengartner, and P. Steenkiste Access control to people location information ACM Trans. Inform. Syst. Secur. 1094-9224 8 4 November 2005 424 456
-
(2005)
ACM Trans. Inform. Syst. Secur.
, vol.8
, Issue.4
, pp. 424-456
-
-
Hengartner, U.1
Steenkiste, P.2
-
36
-
-
70749108546
-
Obfuscation mechanism in conjunction with tamper-proof module
-
Vancouver, Canada, August 29-31
-
K. Fukushima, S. Kiyomoto, T. Tanaka, Obfuscation mechanism in conjunction with tamper-proof module, in: Proceedings of 2009 International Conference on Computational, Science and Engineering, vol. 2, Vancouver, Canada, August 29-31, 2009, pp. 665-670.
-
(2009)
Proceedings of 2009 International Conference on Computational, Science and Engineering
, vol.2
, pp. 665-670
-
-
Fukushima, K.1
Kiyomoto, S.2
Tanaka, T.3
-
37
-
-
84860390205
-
A trust-based noise injection strategy for privacy protection in cloud computing
-
doi:10.1002/spe.1052 ISSN 1097-024X, in press
-
G. Zhang, Y. Yang, D. Yuan, J. Chen, A trust-based noise injection strategy for privacy protection in cloud computing, Softw. Pract. Exp. (ISSN 1097-024X), doi:10.1002/spe.1052, in press.
-
Softw. Pract. Exp.
-
-
Zhang, G.1
Yang, Y.2
Yuan, D.3
Chen, J.4
-
38
-
-
78951488046
-
SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications
-
Springer 978-1-4419-6523-3
-
X. Liu, D. Yuan, G. Zhang, J. Chen, and Y. Yang SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications Handbook of Cloud Computing 2010 Springer 978-1-4419-6523-3 309 332
-
(2010)
Handbook of Cloud Computing
, pp. 309-332
-
-
Liu, X.1
Yuan, D.2
Zhang, G.3
Chen, J.4
Yang, Y.5
|