-
1
-
-
78650535610
-
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
-
P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. Ben Othmane, and L. Lilien, "An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing" in Reliable Distributed Systems, 2010 29th IEEE Symposium, pp. 177-183, 2010.
-
(2010)
Reliable Distributed Systems, 2010 29th IEEE Symposium
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Othmane, L.B.6
Lilien, L.7
-
2
-
-
70449569012
-
Ensuring data storage security in Cloud Computing
-
W. Cong, W. Qian, R. Kui, and L. Wenjing, "Ensuring data storage security in Cloud Computing" in Quality of Service, 2009 IWQoS 17th International Workshop, pp. 1-9, 2009.
-
(2009)
Quality of Service, 2009 IWQoS 17th International Workshop
, pp. 1-9
-
-
Cong, W.1
Qian, W.2
Kui, R.3
Wenjing, L.4
-
3
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
W. Cong, W. Qian, R. Kui, and L. Wenjing, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing" in INFOCOM, 2010 IEEE Proceedings, pp. 1-9, 2010.
-
(2010)
INFOCOM, 2010 IEEE Proceedings
, pp. 1-9
-
-
Cong, W.1
Qian, W.2
Kui, R.3
Wenjing, L.4
-
4
-
-
84946228500
-
SITAR: A scalable intrusion-tolerant architecture for distributed services
-
W. Feiyi, F. Jou, G. Fengmin, C. Sargor, K. Goseva-Popstojanova, and K. Trivedi, "SITAR: a scalable intrusion-tolerant architecture for distributed services" in Foundations of Intrusion Tolerant Systems, 2003 Organically Assured and Survivable Information Systems, pp. 359-367, 2003.
-
(2003)
Foundations of Intrusion Tolerant Systems, 2003 Organically Assured and Survivable Information Systems
, pp. 359-367
-
-
Feiyi, W.1
Jou, F.2
Fengmin, G.3
Sargor, C.4
Goseva-Popstojanova, K.5
Trivedi, K.6
-
5
-
-
38949178401
-
-
E. J. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing remote untrusted storage" pp. 131-145, 2003.
-
(2003)
SiRiUS: Securing Remote Untrusted Storage
, pp. 131-145
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
8
-
-
77649257848
-
A Binary String Approach for Updates in Dynamic Ordered XML Data
-
K. Hye-Kyeong and L. SangKeun, "A Binary String Approach for Updates in Dynamic Ordered XML Data" Knowledge and Data Engineering, IEEE Transactions, vol. 22, pp. 602-607, 2010.
-
(2010)
Knowledge and Data Engineering, IEEE Transactions
, vol.22
, pp. 602-607
-
-
Hye-Kyeong, K.1
SangKeun, L.2
-
9
-
-
85033460636
-
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage" pp. 29-42, 2003.
-
(2003)
Plutus: Scalable Secure File Sharing on Untrusted Storage
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
10
-
-
79952020799
-
SecCloud: Bridging Secure Storage and Computation in Cloud
-
W. Lifei, Z. Haojin, C. Zhenfu, J. Weiwei, and A. V. Vasilakos, "SecCloud: Bridging Secure Storage and Computation in Cloud" in Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference, pp. 52-61, 2010.
-
(2010)
Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference
, pp. 52-61
-
-
Lifei, W.1
Haojin, Z.2
Zhenfu, C.3
Weiwei, J.4
Vasilakos, A.V.5
-
11
-
-
77954893896
-
Data protection models for service provisioning in the cloud
-
D. Lin and A. Squicciarini, "Data protection models for service provisioning in the cloud" in the Proceeding of the 15th ACM symposium on access control models and technologies, Pittsburgh, Pennsylvania, USA, 2010.
-
The Proceeding of the 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, Pennsylvania, USA, 2010
-
-
Lin, D.1
Squicciarini, A.2
-
12
-
-
78650536265
-
-
R. Ranchal, B. Bhargava, L. Othmane, L. Lilien, A. Kim, M. Kang, and M. Linderman, "Protection of Identity Information in Cloud Computing without Trusted Third Party", pp. 368-372, 2010.
-
(2010)
Protection of Identity Information in Cloud Computing Without Trusted Third Party
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.3
Lilien, L.4
Kim, A.5
Kang, M.6
Linderman, M.7
-
13
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models" Computer, vol. 29, pp. 38-47, 1996.
-
(1996)
Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Y. Shucheng, W. Cong, R. Kui, and L. Wenjing, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing" in INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Shucheng, Y.1
Cong, W.2
Kui, R.3
Wenjing, L.4
-
15
-
-
77957933159
-
Preventing Information Leakage from Indexing in the Cloud
-
A. Squicciarini, S. Sundareswaran, and L. Dan, "Preventing Information Leakage from Indexing in the Cloud" in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, pp. 188-195, 2010.
-
(2010)
Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference
, pp. 188-195
-
-
Squicciarini, A.1
Sundareswaran, S.2
Dan, L.3
-
17
-
-
2442552824
-
A prime number labeling scheme for dynamic ordered XML trees
-
X. Wu, M. L. Lee, and W. Hsu, "A prime number labeling scheme for dynamic ordered XML trees," in Data Engineering Proceedings, 2004, 20th International Conference, pp. 66-78, 2004.
-
(2004)
Data Engineering Proceedings, 2004, 20th International Conference
, pp. 66-78
-
-
Wu, X.1
Lee, M.L.2
Hsu, W.3
-
19
-
-
84862936870
-
-
Available
-
Jpathwatch, 2011. Available: http://jpathwatch.wordpress.com/ documentation/features/.
-
(2011)
-
-
-
20
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow et al. "Controlling data in the cloud: Outsourcing computation without outsourcing control", In CCSW, 2009.
-
(2009)
CCSW
-
-
Chow, R.1
-
22
-
-
84862914504
-
-
Available
-
Openstack, 2011, Available: http://www.openstack.org/.
-
(2011)
-
-
|