-
1
-
-
77950347409
-
A view of cloud computing
-
10.1145/1721654.1721672
-
M Armbrust, et al. 2010 A view of cloud computing Commun ACM 53 50 58 10.1145/1721654.1721672
-
(2010)
Commun ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
-
2
-
-
70449877813
-
Cost-benefit analysis of cloud computing versus desktop grids
-
IEEE Computer Society Washington, DC. 10.1109/IPDPS.2009.5160911
-
Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: Proceedings of the 2009 IEEE international symposium on parallel&distributed processing. IEEE Computer Society, Washington, DC, pp 1-12
-
(2009)
Proceedings of the 2009 IEEE International Symposium on Parallel&distributed Processing
, pp. 1-12
-
-
Kondo, D.1
Javadi, B.2
Malecot, P.3
Cappello, F.4
Anderson, D.P.5
-
3
-
-
77955095511
-
A cost-benefit analysis of using cloud computing to extend the capacity of clusters
-
10.1007/s10586-010-0131-x
-
MD Assunção A Costanzo R Buyya 2010 A cost-benefit analysis of using cloud computing to extend the capacity of clusters Clust Comput 13 335 347 10.1007/s10586-010-0131-x
-
(2010)
Clust Comput
, vol.13
, pp. 335-347
-
-
Assunção, M.D.1
Costanzo, A.2
Buyya, R.3
-
4
-
-
84865624084
-
-
Amazon Web Services LLC, Amazon Simple Storage Service (2009)
-
Amazon Web Services LLC, Amazon Simple Storage Service (2009). http://aws.amazon.com/s3/
-
-
-
-
5
-
-
84865624083
-
-
Amazon Web Services LLC, Amazon Elastic Compute Cloud (2009)
-
Amazon Web Services LLC, Amazon Elastic Compute Cloud (2009). http://aws.amazon.com/ec2/
-
-
-
-
6
-
-
84871269023
-
The case for enterprise-ready virtual private clouds
-
Berkeley, CA, USA, HotCloud'09, USENIX Association
-
Wood T, Gerber A, Ramakrishnan KK, Shenoy P, Van der Merwe J (2009) The case for enterprise-ready virtual private clouds. In: Proceedings of the 2009 conference on Hot topics in cloud computing, Berkeley, CA, USA, HotCloud'09, USENIX Association, p 4
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing
, pp. 4
-
-
Wood, T.1
Gerber, A.2
Ramakrishnan, K.K.3
Shenoy, P.4
Van Der Merwe, J.5
-
7
-
-
77957945967
-
Towards self-assisted troubleshooting for the deployment of private clouds
-
IEEE Computer Society Washington, DC. 10.1109/CLOUD.2010.12
-
Head MR, Sailer A, Shaikh H, Shea DG (2010) Towards self-assisted troubleshooting for the deployment of private clouds. In: Proceedings of the 2010 IEEE 3rd international conference on cloud computing, CLOUD '10. IEEE Computer Society, Washington, DC, pp 156-163
-
(2010)
Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD '10
, pp. 156-163
-
-
Head, M.R.1
Sailer, A.2
Shaikh, H.3
Shea, D.G.4
-
8
-
-
84865655458
-
-
Gartner Rating 2011. http://www.gartner.com/it/page.jsp?id=1454221
-
Gartner Rating 2011
-
-
-
9
-
-
77955065034
-
Ibm research division cloud computing initiative
-
10.1147/JRD.2009.5429055
-
M Naghshineh, et al. 2009 Ibm research division cloud computing initiative IBM J Res Dev 53 499 508 10.1147/JRD.2009.5429055
-
(2009)
IBM J Res Dev
, vol.53
, pp. 499-508
-
-
Naghshineh, M.1
-
11
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
T Jaeger J Schiffman 2010 Outlook: Cloudy with a chance of security challenges and improvements IEEE Secur Priv 8 77 80
-
(2010)
IEEE Secur Priv
, vol.8
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
12
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM New York. 10.1145/1653662.1653687
-
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS '09. ACM, New York, pp 199-212
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
13
-
-
70350139817
-
In clouds shall we trust?
-
10.1109/MSP.2009.4
-
B Michael 2009 In clouds shall we trust? IEEE Secur Priv 7 3 10.1109/MSP.2009.4
-
(2009)
IEEE Secur Priv
, vol.7
, pp. 3
-
-
Michael, B.1
-
14
-
-
70349309706
-
Data security in the world of cloud computing
-
10.1109/MSP.2009.87
-
LM Kaufman 2009 Data security in the world of cloud computing IEEE Secur Priv 7 61 64 10.1109/MSP.2009.87
-
(2009)
IEEE Secur Priv
, vol.7
, pp. 61-64
-
-
Kaufman, L.M.1
-
16
-
-
84865655457
-
-
U.S. Department of Health and Human Services
-
U.S. Department of Health and Human Services, http://www.hhs.gov/ocr/ privacy/ (2003) Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
-
-
-
-
17
-
-
77950365227
-
Private information retrieval
-
10.1145/1721654.1721674
-
S Yekhanin 2010 Private information retrieval Commun ACM 53 68 73 10.1145/1721654.1721674
-
(2010)
Commun ACM
, vol.53
, pp. 68-73
-
-
Yekhanin, S.1
-
19
-
-
70349599015
-
Crust: Cryptographic remote untrusted storage without public keys
-
10.1007/s10207-009-0081-6
-
E Geron A Wool 2009 Crust: cryptographic remote untrusted storage without public keys Int J Inf Secur 8 357 377 10.1007/s10207-009-0081-6
-
(2009)
Int J Inf Secur
, vol.8
, pp. 357-377
-
-
Geron, E.1
Wool, A.2
-
21
-
-
33947130171
-
Lazy revocation in cryptographic file systems
-
DOI 10.1109/SISW.2005.7, 1628477, Proceedings - Third IEEE International Security in Storage Workshop, SISW 2005
-
Backes M, Oprea A (2005) Lazy revocation in cryptographic file systems. In: Proceedings of the third IEEE international security in storage workshop. IEEE Computer Society, Washington, DC, pp 1-11 (Pubitemid 46402455)
-
(2005)
Proceedings - Third IEEE International Security in Storage Workshop, SISW 2005
, vol.2005
, pp. 1-11
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
22
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
ACM New York. 10.1145/1655008.1655024
-
Benaloh J, Chase M, Horvitz E, Lauter K (2009) Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM workshop on cloud computing security, CCSW '09. ACM, New York, pp 103-114
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
23
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy, SP '07. IEEE Computer Society, Washington, DC, pp 321-334 (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
24
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
10.1145/1127345.1127346
-
G Ateniese K Fu M Green S Hohenberger 2006 Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans Inf Syst Secur 9 1 30 10.1145/1127345.1127346
-
(2006)
ACM Trans Inf Syst Secur
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
25
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE Press Piscataway
-
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th conference on information communications, INFOCOM'10. IEEE Press, Piscataway, pp 534-542
-
(2010)
Proceedings of the 29th Conference on Information Communications, INFOCOM'10
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
26
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS '06. ACM, New York, pp 89-98 (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
27
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
USENIX Association Berkeley
-
Kallahalla M, Riedel E, Swaminathan R, Wang Q, Fu K (2003) Plutus: Scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX conference on file and storage technologies. USENIX Association, Berkeley, pp 29-42
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
28
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
VLDB Endowment, VLDB '07
-
di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd international conference on very large data bases, VLDB Endowment, VLDB '07, pp. 123-134
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
29
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM New York. 10.1145/1755688.1755720
-
Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS '10. ACM, New York, pp 261-270
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
30
-
-
56649119348
-
Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities
-
ACM New York. 10.1145/1314333.1314337
-
Brickell E, Li J (2007) Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. In: Proceedings of the 2007 ACM workshop on privacy in electronic society, WPES '07. ACM, New York, pp 21-30
-
(2007)
Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, WPES '07
, pp. 21-30
-
-
Brickell, E.1
Li, J.2
-
36
-
-
0018545449
-
How to share a secret
-
DOI 10.1145/359168.359176
-
A Shamir 1979 How to share a secret Commun ACM 22 612 613 549252 0414.94021 10.1145/359168.359176 (Pubitemid 10431338)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir Adi1
-
38
-
-
84865639423
-
Privacy disclosure and preservation in learning with multi-relational databases
-
10.5626/JCSE.2011.5.3.183
-
H Guo H Viktor E Paquet 2011 Privacy disclosure and preservation in learning with multi-relational databases J Comput Sci Eng 5 3 183 196 10.5626/JCSE.2011.5.3.183
-
(2011)
J Comput Sci Eng
, vol.5
, Issue.3
, pp. 183-196
-
-
Guo, H.1
Viktor, H.2
Paquet, E.3
|