-
1
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic, "Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation Comput. Syst., vol. 25, pp. 599-616, 2009.
-
(2009)
Future Generation Comput. Syst.
, vol.25
, pp. 599-616
-
-
Buyya, R.1
ShinYeo, C.2
Broberg, J.3
Brandic, I.4
-
3
-
-
70349752533
-
-
[Online]. Available
-
Amazon Web Services (AWS) [Online]. Available: https://s3.amazonaws.com/
-
Amazon Web Services (AWS)
-
-
-
4
-
-
84863347475
-
IBM brings cloud computing to earth with massive new data centers
-
Aug. [Online]. Available
-
R. Martin, "IBM brings cloud computing to earth with massive new data centers," InformationWeek Aug. 2008 [Online]. Available: http://www.informationweek.com/news/hardware/data-centers/209901523
-
(2008)
InformationWeek
-
-
Martin, R.1
-
5
-
-
77957936026
-
-
[Online]. Available
-
Google App Engine [Online]. Available: http://code.google.com/appengine/
-
Google App Engine
-
-
-
6
-
-
41149174785
-
Like technology from an advanced alien culture: Google apps for education at ASU
-
Orlando, FL
-
K. Barlow and J. Lane, "Like technology from an advanced alien culture: Google apps for education at ASU," in Proc. ACM SIGUCCS User Services Conf., Orlando, FL, 2007.
-
(2007)
Proc. ACM SIGUCCS User Services Conf.
-
-
Barlow, K.1
Lane, J.2
-
7
-
-
84863388766
-
Salesforce.com: Raising the level of networking
-
B. Barbara, "Salesforce.com: Raising the level of networking," Inf. Today, vol. 27, pp. 45-45, 2010.
-
(2010)
Inf. Today
, vol.27
, pp. 45-45
-
-
Barbara, B.1
-
9
-
-
66149125939
-
Technical perspective: A chilly sense of security
-
A. Ross, "Technical perspective: A chilly sense of security," Commun. ACM, vol. 52, pp. 90-90, 2009.
-
(2009)
Commun. ACM
, vol.52
, pp. 90-90
-
-
Ross, A.1
-
12
-
-
85086639439
-
Principles of policy in secure groups
-
San Diego, CA
-
H. Harney, A. Colgrove, and P. D. McDaniel, "Principles of policy in secure groups," in Proc. NDSS, San Diego, CA, 2001.
-
(2001)
Proc. NDSS
-
-
Harney, H.1
Colgrove, A.2
McDaniel, P.D.3
-
14
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
Berkeley, CA
-
T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. IEEE Symp. Security and Privacy, Berkeley, CA, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
15
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Alexandria, VA
-
J. Li, N. Li, and W. H. Winsborough, "Automated trust negotiation using cryptographic credentials," in Proc. ACM Conf. Computer and Communications Security (CCS), Alexandria, VA, 2005.
-
(2005)
Proc. ACM Conf. Computer and Communications Security (CCS)
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
16
-
-
34547273527
-
Attibute-based encryption for fine-grained access control of encrypted data
-
Alexandria, VA
-
V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attibute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.
-
(2006)
Proc. ACM Conf. Computer and Communications Security (ACM CCS)
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
77953310709
-
Achiving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achiving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM 2010, 2010, pp. 534-542.
-
(2010)
Proc. IEEE INFOCOM 2010
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
18
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
Oakland, CA
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
70350409834
-
Attribute-sets: A practically motivated enhancement to attribute-based encryption
-
Saint Malo, France
-
R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute-sets: A practically motivated enhancement to attribute-based encryption," in Proc. ESORICS, Saint Malo, France, 2009.
-
(2009)
Proc. ESORICS
-
-
Bobba, R.1
Khurana, H.2
Prabhakaran, M.3
-
20
-
-
24944554962
-
Fuzzy identity based encryption
-
LNCS
-
A. Sahai and B. Waters, "Fuzzy identity based encryption," in Proc. Acvances in Cryptology-Eurocrypt, 2005, vol. 3494, LNCS, pp. 457-473.
-
(2005)
Proc. Acvances in Cryptology-Eurocrypt
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
21
-
-
78649998200
-
Hierachical attibute-based encryption for fine-grained access control in cloud storage services
-
Chicago, IL
-
G.Wang, Q. Liu, and J.Wu, "Hierachical attibute-based encryption for fine-grained access control in cloud storage services," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010.
-
(2010)
Proc. ACM Conf. Computer and Communications Security (ACM CCS)
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
|