-
2
-
-
84866417060
-
Information processing systems-Open Systems Interconnection
-
ISO and ISO 7498-2:1989, "Information processing systems-Open Systems Interconnection," 1989.
-
(1989)
ISO and ISO 7498-2:1989
-
-
-
4
-
-
85089345747
-
Internet of People, Things and Services - The Convergence of Security, Trust and Privacy
-
M. T. Dlamini, M. M. Eloff, and J. H. P. Eloff, "Internet of People, Things and Services - The Convergence of Security, Trust and Privacy," in Proc. of 3rd Annual Companionable Consortium Workshop, 2009.
-
Proc. of 3rd Annual Companionable Consortium Workshop, 2009
-
-
Dlamini, M.T.1
Eloff, M.M.2
Eloff, J.H.P.3
-
7
-
-
84866414525
-
-
GoGrid API, http://www.gogrid.com/company/press-releases/gogrid-moves- api-specification-to-creativecommons.php, 2011.
-
(2011)
-
-
-
8
-
-
84861959172
-
Privacy-Preserving Public Auditing for Secure Cloud Storage
-
C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers, 2011.
-
(2011)
IEEE Transactions on Computers
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
9
-
-
84866414526
-
-
Storage Network Industry Alliance, http://www.snia.org, 2011.
-
(2011)
-
-
-
11
-
-
78649317113
-
Forrester report
-
H. Lo, R. Wang, J. P. Garbani, E. Daley, R. Iqbal, and C. Green, Forrester report, The State of Enterprise Software: 2009, 2009.
-
(2009)
The State of Enterprise Software: 2009
-
-
Lo, H.1
Wang, R.2
Garbani, J.P.3
Daley, E.4
Iqbal, R.5
Green, C.6
-
17
-
-
78650558794
-
Secure Virtualization for Cloud Computing
-
Academic Press Ltd. London
-
F. Lombardi and R. D. Pietro, "Secure Virtualization for Cloud Computing," Journal of Network and Computer Applications, vol. 34, issue. 4, pp. 1113-1122, Academic Press Ltd. London, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1113-1122
-
-
Lombardi, F.1
Pietro, R.D.2
-
18
-
-
79952671882
-
Network Security for Virtual Machines in Cloud Computing
-
H. Wu, Y. Ding, C. Winer, and L. Yao, "Network Security for Virtual Machines in Cloud Computing," in Proc. of 5th Int. Conf. on Computer Sciences and Convergence Information Technology, 2010.
-
Proc. of 5th Int. Conf. on Computer Sciences and Convergence Information Technology, 2010
-
-
Wu, H.1
Ding, Y.2
Winer, C.3
Yao, L.4
-
20
-
-
77949669849
-
-
Google, "Browser security handbook," http://code.google.com/p/ browsersec/, 2009.
-
(2009)
Browser Security Handbook
-
-
-
22
-
-
74349113474
-
On Technical Security Issues in Cloud Computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical Security Issues in Cloud Computing," in Proc. of IEEE International Conference on Cloud Computing, 2009.
-
Proc. of IEEE International Conference on Cloud Computing, 2009
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
23
-
-
84866414532
-
-
Hacker4Lease, "Backdoor and Debug Options," http://www.hacker4lease.com/attack-methods/backdoor/, 2011.
-
(2011)
Backdoor and Debug Options
-
-
-
24
-
-
43049179369
-
Securing Web Applications
-
Elsevier Advanced Technology Publications Oxford
-
D. Gollmann, "Securing Web Applications," Information Security Technical Report, vol. 13, issue. 1, Elsevier Advanced Technology Publications Oxford, 2008.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.1
-
-
Gollmann, D.1
-
25
-
-
77955905009
-
Secure Ranked Keyword Search over Encrypted Cloud Data
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure Ranked Keyword Search over Encrypted Cloud Data," in Proc. of ICDCS'10, 2010.
-
Proc. of ICDCS'10, 2010
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
26
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in Proc. of IEEE INFOCOM, 2010.
-
Proc. of IEEE INFOCOM, 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
27
-
-
79960850152
-
Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data," in Proc. of IEEE INFOCOM, 2011.
-
Proc. of IEEE INFOCOM, 2011
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
28
-
-
77953308681
-
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," in Proc. of IEEE INFOCOM'10 Mini-Conference, 2010.
-
Proc. of IEEE INFOCOM'10 Mini-Conference, 2010
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
29
-
-
79953294892
-
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
31
-
-
84921683893
-
Authorized private keyword search over encrypted personal health records in cloud computing
-
M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," in Proc. of ICDCS, 2011.
-
Proc. of ICDCS, 2011
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
32
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
|