메뉴 건너뛰기




Volumn , Issue , 2012, Pages 506-514

GeoProof: Proofs of geographic location for cloud computing environment

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD DATA; CLOUD PROVIDERS; COMPUTING ENVIRONMENTS; GEOGRAPHIC LOCATION; GLOBAL ACCEPTANCE;

EID: 84866363554     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2012.50     Document Type: Conference Paper
Times cited : (46)

References (45)
  • 3
    • 84866382434 scopus 로고    scopus 로고
    • cth, schedule 3, Available at
    • Privacy act 1998, cth, schedule 3, 1998. Available at: http://www.privacy.gov.au/materials/types/infosheets/view/6583.
    • (1998) Privacy Act 1998
  • 4
    • 84866417846 scopus 로고    scopus 로고
    • Amazon EC2 crosses the atlantic, 2008. http://aws.amazon.com/about-aws/ whats-new/2008/12/10/amazon-ec2-crosses-the-atlantic/.
    • (2008) Amazon EC2 Crosses the Atlantic
  • 5
    • 81055144596 scopus 로고    scopus 로고
    • A note on a privacy-preserving distance-bounding protocol
    • Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, Information and Communications Security, Springer Berlin - Heidelberg
    • Jean-Philippe Aumasson, Aikaterini Mitrokotsa, and Pedro Peris-Lopez. A note on a privacy-preserving distance-bounding protocol. In Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, Information and Communications Security, volume 7043 of Lecture Notes in Computer Science, pages 78-92. Springer Berlin - Heidelberg, 2011.
    • (2011) Lecture Notes in Computer Science , vol.7043 , pp. 78-92
    • Aumasson, J.-P.1    Mitrokotsa, A.2    Peris-Lopez, P.3
  • 7
    • 84976295016 scopus 로고
    • Distance bounding protocols
    • Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT 93, Springer Berlin - Heidelberg
    • Stefan Brands and David Chaum. Distance bounding protocols. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT 93, volume 765 of Lecture Notes in Computer Science, pages 344-359. Springer Berlin - Heidelberg, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 12
    • 80455157134 scopus 로고    scopus 로고
    • Available at
    • Cloud Security Alliance. Cloud controls matrix, 2010. Available at: www.cloudsecurityalliance.org.
    • (2010) Cloud Controls Matrix
  • 13
    • 79959462113 scopus 로고    scopus 로고
    • Distance hijacking attacks on distance bounding protocols
    • Technical report, ePrint Archive: Report 2011/129
    • C. Cremers, K. Rasmussen, and S. Capkun. Distance hijacking attacks on distance bounding protocols. Technical report, Cryptology ePrint Archive: Report 2011/129, 2011.
    • (2011) Cryptology
    • Cremers, C.1    Rasmussen, K.2    Capkun, S.3
  • 14
    • 79955670036 scopus 로고    scopus 로고
    • What is the future of disk drives, death or rebirth?
    • April
    • Yuhui Deng. What is the future of disk drives, death or rebirth? ACM Comput. Surv., 43:23:1-23:27, April 2011.
    • (2011) ACM Comput. Surv. , vol.43
    • Deng, Y.1
  • 17
    • 77954931916 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. The World Privacy Forum, 23:1-26, 2009.
    • (2009) The World Privacy Forum , vol.23 , pp. 1-26
    • Gellman, R.1
  • 18
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • IEEE Computer Society Press
    • G. Hancke and M. Kuhn. An RFID distance bounding protocol. In IEEE/Create-Net SecureComm, pages 67-73. IEEE Computer Society Press, 2005.
    • (2005) IEEE/Create-Net SecureComm , pp. 67-73
    • Hancke, G.1    Kuhn, M.2
  • 20
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography and Data Security, Springer Berlin / Heidelberg
    • Seny Kamara and Kristin Lauter. Cryptographic cloud storage. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography and Data Security, volume 6054 of Lecture Notes in Computer Science, pages 136-149. Springer Berlin / Heidelberg, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 21
    • 78650125351 scopus 로고    scopus 로고
    • Optimal security limits of RFID distance bounding protocols
    • Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, Springer Berlin / Heidelberg
    • Orhun Kara, Süleyman Kardas, Muhammed Bingöl, and Gildas Avoine. Optimal security limits of RFID distance bounding protocols. In Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, volume 6370 of Lecture Notes in Computer Science, pages 220-238. Springer Berlin / Heidelberg, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6370 , pp. 220-238
    • Kara, O.1    Kardas, S.2    Bingöl, M.3    Avoine, G.4
  • 24
    • 71549138804 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • Juan Garay, Atsuko Miyaji, and Akira Otsuka, editors, Cryptology and Network Security, Springer Berlin / Heidelberg
    • Chong Kim and Gildas Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In Juan Garay, Atsuko Miyaji, and Akira Otsuka, editors, Cryptology and Network Security, volume 5888 of Lecture Notes in Computer Science, pages 119-133. Springer Berlin / Heidelberg, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5888 , pp. 119-133
    • Kim, C.1    Avoine, G.2
  • 25
    • 67049155493 scopus 로고    scopus 로고
    • The swiss-knife RFID distance bounding protocol
    • Pil Lee and Jung Cheon, editors, Information Security and Cryptology ICISC 2008, Springer Berlin / Heidelberg
    • Chong Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The swiss-knife RFID distance bounding protocol. In Pil Lee and Jung Cheon, editors, Information Security and Cryptology ICISC 2008, volume 5461 of Lecture Notes in Computer Science, pages 98-115. Springer Berlin / Heidelberg, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5461 , pp. 98-115
    • Kim, C.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 27
    • 0034836987 scopus 로고    scopus 로고
    • Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet
    • feb
    • Feng-Li Lian, J.R. Moyne, and D.M. Tilbury. Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet. Control Systems, IEEE, 21(1):66-83, feb 2001.
    • (2001) Control Systems, IEEE , vol.21 , Issue.1 , pp. 66-83
    • Lian, F.-L.1    Moyne, J.R.2    Tilbury, D.M.3
  • 28
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 30
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • Jorge Munilla and Alberto Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, 8(9):1227-1232, 2008.
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.9 , pp. 1227-1232
    • Munilla, J.1    Peinado, A.2
  • 31
    • 79952275571 scopus 로고    scopus 로고
    • Nov Available at
    • European Network and information Security Agency (ENISA). Cloud computing information assurance framework, Nov 2009. Available at: http://www.enisa. europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance- framework.
    • (2009) Cloud Computing Information Assurance Framework
  • 39
    • 34748825630 scopus 로고    scopus 로고
    • Detecting relay attacks with timing-based protocols
    • Feng Bao and Steven Miller, editors, Singapore, Association for Computing Machinery (ACM)
    • Jason F. Reid, Juan M. Gonzalez Nieto, Tee Tang, and Bouchra Senadji. Detecting relay attacks with timing-based protocols. In Feng Bao and Steven Miller, editors, ASIAN ACM Symposium on Information, Computer and Communications Security, pages 204-213, Singapore, 2007. Association for Computing Machinery (ACM).
    • (2007) ASIAN ACM Symposium on Information, Computer and Communications Security , pp. 204-213
    • Jason, F.1    Gonzalez Nieto, R.J.M.2    Tang, T.3    Senadji, B.4
  • 40
    • 38149028509 scopus 로고    scopus 로고
    • Distance bounding in noisy environments
    • Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks, Springer Berlin / Heidelberg
    • Dave Singelée and Bart Preneel. Distance bounding in noisy environments. In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks, volume 4572 of Lecture Notes in Computer Science, pages 101-115. Springer Berlin / Heidelberg, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4572 , pp. 101-115
    • Singelée, D.1    Preneel, B.2
  • 42
    • 80052911841 scopus 로고    scopus 로고
    • Survey and analysis of disk scheduling methods
    • August
    • Alexander Thomasian. Survey and analysis of disk scheduling methods. SIGARCH Comput. Archit. News, 39:8-25, August 2011.
    • (2011) SIGARCH Comput. Archit. News , vol.39 , pp. 8-25
    • Thomasian, A.1
  • 43
    • 78650079491 scopus 로고    scopus 로고
    • The poulidor distance-bounding protocol
    • Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, Springer Berlin / Heidelberg
    • Rolando Trujillo-Rasua, Benjamin Martin, and Gildas Avoine. The poulidor distance-bounding protocol. In Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, volume 6370 of Lecture Notes in Computer Science, pages 239-257. Springer Berlin / Heidelberg, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6370 , pp. 239-257
    • Trujillo-Rasua, R.1    Martin, B.2    Avoine, G.3
  • 45
    • 85094324868 scopus 로고    scopus 로고
    • Octant: A comprehensive framework for the geolocalization of internet hosts
    • B. Wong, I. Stoyanov, and E.G. Sirer. Octant: A comprehensive framework for the geolocalization of internet hosts. In Proceedings of the NSDI, volume 7, 2007.
    • (2007) Proceedings of the NSDI , vol.7
    • Wong, B.1    Stoyanov, I.2    Sirer, E.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.