-
1
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb.
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
27544476153
-
-
Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia
-
R. Ranjan, A. Harwood, R. Buyya, Grid federation: an economy based distributed resource management system for large-scale resource coupling, Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, 2004.
-
(2004)
Grid Federation: An Economy Based Distributed Resource Management System for Large-scale Resource Coupling
-
-
Ranjan, R.1
Harwood, A.2
Buyya, R.3
-
3
-
-
77955515023
-
Federated resource management in grid and cloud computing systems
-
R. Buyya, R. Ranjan, Federated resource management in grid and cloud computing systems, Future Generation Computer Systems 26 (8) (2006) 1189-1191.
-
(2006)
Future Generation Computer Systems
, vol.26
, Issue.8
, pp. 1189-1191
-
-
Buyya, R.1
Ranjan, R.2
-
4
-
-
70349456218
-
Virtual infrastructure management in private and hybrid clouds
-
B. Sotomayor, R.S. Montero, I.M. Lorente, I. Foster, Virtual infrastructure management in private and hybrid clouds, IEEE Internet Computing 13 (5) (2009) 14-22.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.5
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.S.2
Lorente, I.M.3
Foster, I.4
-
5
-
-
56349161277
-
Scientific cloud computing: Early definition and experience
-
L. Wang, J. Tao, M. Kunze, H. Von, D. Kramer, W. Karl, Scientific cloud computing: early definition and experience, in: Proc. 10th IEEE Int. Conference on High Performance Computing and Communications, HPCC '08, Dalian, China, Sep. 2008.
-
Proc. 10th IEEE Int. Conference on High Performance Computing and Communications, HPCC '08, Dalian, China, Sep. 2008
-
-
Wang, L.1
Tao, J.2
Kunze, M.3
Von, H.4
Kramer, D.5
Karl, W.6
-
6
-
-
84863337547
-
A review on cloud computing: Design challenges in architecture and security
-
F. Hu, M. Qiu, J. Li, T. Grant, D. Tylor, S. Mccaleb, L. Butler, R. Hamner, A review on cloud computing: design challenges in architecture and security, Journal of Computing and Information Technology 19 (1) (2011) 25-55.
-
(2011)
Journal of Computing and Information Technology
, vol.19
, Issue.1
, pp. 25-55
-
-
Hu, F.1
Qiu, M.2
Li, J.3
Grant, T.4
Tylor, D.5
Mccaleb, S.6
Butler, L.7
Hamner, R.8
-
7
-
-
80052799305
-
Policy based resource allocation in IaaS cloud
-
A. Nathani, S. Chaudhary, G. Somani, Policy based resource allocation in IaaS cloud, Future Generation Computer Systems 26 (1) (2012) 94-103.
-
(2012)
Future Generation Computer Systems
, vol.26
, Issue.1
, pp. 94-103
-
-
Nathani, A.1
Chaudhary, S.2
Somani, G.3
-
8
-
-
77954879049
-
Cloud computing: A perspective study
-
L. Wang, G.V. Laszewski, A. Younge, X. He, M. Kunze, J. Tao, C. Fu, Cloud computing: a perspective study, New Generation Computing 28 (2) (2010) 137-146.
-
(2010)
New Generation Computing
, vol.28
, Issue.2
, pp. 137-146
-
-
Wang, L.1
Laszewski, G.V.2
Younge, A.3
He, X.4
Kunze, M.5
Tao, J.6
Fu, C.7
-
9
-
-
74049087607
-
The reservoir model and architecture for open federated cloud computing
-
B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I.M. Lorente, R. Montero, Y. Wolfsthal, E. Elmroth, J. Caceres, M. Benyhuda, W. Emmerich, F. Galan, The reservoir model and architecture for open federated cloud computing, IBM Journal of Research and Development 53 (4) (2009) 1-11.
-
(2009)
IBM Journal of Research and Development
, vol.53
, Issue.4
, pp. 1-11
-
-
Rochwerger, B.1
Breitgand, D.2
Levy, E.3
Galis, A.4
Nagin, K.5
Lorente, I.M.6
Montero, R.7
Wolfsthal, Y.8
Elmroth, E.9
Caceres, J.10
Benyhuda, M.11
Emmerich, W.12
Galan, F.13
-
10
-
-
67650404318
-
-
O'Reilly Media
-
J. Murty, Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB, first ed., O'Reilly Media, 2008.
-
(2008)
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB, First Ed.
-
-
Murty, J.1
-
11
-
-
77955876115
-
Virtual smartphone over IP
-
E.Y. Chen, M. Itoh, Virtual smartphone over IP, in: Proc. IEEE Int. Symposium on A World of Wireless Mobile and Multimedia Networks, WoWMoM '10, Montreal, QC Canada, June 2010.
-
Proc. IEEE Int. Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM '10, Montreal, QC Canada, June 2010
-
-
Chen, E.Y.1
Itoh, M.2
-
12
-
-
77957936026
-
-
September 02
-
Google App Engine, September 02, 2011. https://developers.google.com/ appengine/.
-
(2011)
Google App Engine
-
-
-
13
-
-
84888016274
-
-
September 06
-
Force.com Apex Code Developer's Guide, September 06, 2011. http://www.salesforce.com/us/developer/docs/apexcode/index.htm.
-
(2011)
Force.Com Apex Code Developer's Guide
-
-
-
14
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
B.P. Rimal, E. Choi, I. Lumb, A taxonomy and survey of cloud computing systems, in: Proc. 5th Int. Joint Conference of INC, IMS and IDC, NCM '09, Seoul, Korea, Nov. 2009.
-
Proc. 5th Int. Joint Conference of INC, IMS and IDC, NCM '09, Seoul, Korea, Nov. 2009
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
15
-
-
77955010908
-
A virtual cloud computing provider for mobile devices
-
H. Canepa, D. Lee, A virtual cloud computing provider for mobile devices, in: Proc. 1st ACM Workshop on Mobile Cloud Computing & Services Social Networks and Beyond, MCS '10, San Francisco, USA, June 2010.
-
Proc. 1st ACM Workshop on Mobile Cloud Computing & Services Social Networks and Beyond, MCS '10, San Francisco, USA, June 2010
-
-
Canepa, H.1
Lee, D.2
-
16
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar, Y.H. Lu, Cloud computing for mobile users: can offloading computation save energy? IEEE Journal Computer 43 (4) (2010) 51-56.
-
(2010)
IEEE Journal Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
18
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications 34 (1) (2011) 1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
19
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems 25 (6) (2009) 599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
20
-
-
80055006726
-
Scalable and energy-efficient scheduling techniques for large-scale systems
-
C.O. Diaz, M. Guzek, J.E. Pecero, P. Bouvry, S.U. Khan, Scalable and energy-efficient scheduling techniques for large-scale systems, in: Proc. 11th IEEE Int. Conference on Computer and Information Technology, CIT '11, Pafos, Cyprus, Sep. 2011.
-
Proc. 11th IEEE Int. Conference on Computer and Information Technology, CIT '11, Pafos, Cyprus, Sep. 2011
-
-
Diaz, C.O.1
Guzek, M.2
Pecero, J.E.3
Bouvry, P.4
Khan, S.U.5
-
21
-
-
84863057877
-
Energy-aware high performance computing: A taxonomy study
-
C. Cai, L. Wang, S.U. Khan, J. Tao, Energy-aware high performance computing: a taxonomy study, in: Proc. 17th IEEE Int. Conference on Parallel and Distributed Systems, ICPADS '11, Tainan, Taiwan, Dec. 2011.
-
Proc. 17th IEEE Int. Conference on Parallel and Distributed Systems, ICPADS '11, Tainan, Taiwan, Dec. 2011
-
-
Cai, C.1
Wang, L.2
Khan, S.U.3
Tao, J.4
-
22
-
-
84857361344
-
Energy-efficient and multifaceted resource management for profit-driven virtualized data centers
-
I. Goiri, J.L. Berral, J.O. Fitó, F. Julià, R. Nou, J. Guitart, R. Gavaldà, J. Torres, Energy-efficient and multifaceted resource management for profit-driven virtualized data centers, Future Generation Computer Systems 28 (5) (2012) 718-731.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.5
, pp. 718-731
-
-
Goiri, I.1
Berral, J.L.2
Fitó, J.O.3
Julià, F.4
Nou, R.5
Guitart, J.6
Gavaldà, R.7
Torres, J.8
-
23
-
-
79953099261
-
DENS: Data center energy-efficient network-aware scheduling
-
D. Kliazovich, P. Bouvry, S.U. Khan, DENS: data center energy-efficient network-aware scheduling, in: Proc. ACM/IEEE Int. Conference on Green Computing and Communications, GreenCom '10, Hangzhou, China, Dec. 2010.
-
Proc. ACM/IEEE Int. Conference on Green Computing and Communications, GreenCom '10, Hangzhou, China, Dec. 2010
-
-
Kliazovich, D.1
Bouvry, P.2
Khan, S.U.3
-
24
-
-
84863944102
-
Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and makespan in large-scale distributed systems
-
P. Lindberg, J. Leingang, D. Lysaker, S.U. Khan, J. Li, Comparison and analysis of eight scheduling heuristics for the optimization of energy consumption and makespan in large-scale distributed systems, Journal of Supercomputing 59 (1) (2012) 323-360.
-
(2012)
Journal of Supercomputing
, vol.59
, Issue.1
, pp. 323-360
-
-
Lindberg, P.1
Leingang, J.2
Lysaker, D.3
Khan, S.U.4
Li, J.5
-
25
-
-
84857368698
-
T-alloc: A practical energy efficient resource allocation algorithm for traditional data centers
-
D.M. Quan, F. Mezza, D. Sannenli, R. Giafreda, T-alloc: a practical energy efficient resource allocation algorithm for traditional data centers, Future Generation Computer Systems 28 (5) (2012) 791-800.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.5
, pp. 791-800
-
-
Quan, D.M.1
Mezza, F.2
Sannenli, D.3
Giafreda, R.4
-
26
-
-
80053039860
-
Energy-aware fast scheduling heuristics in heterogeneous computing systems
-
C.O. Diaz, M. Guzek, J.E. Pecero, G. Danoy, P. Bouvry, S.U. Khan, Energy-aware fast scheduling heuristics in heterogeneous computing systems, in: Proc. ACM/IEEE/IFIP Int. Conference on High Performance Computing and Simulation, HPCS '11, Istanbul, Turkey, July 2011.
-
Proc. ACM/IEEE/IFIP Int. Conference on High Performance Computing and Simulation, HPCS '11, Istanbul, Turkey, July 2011
-
-
Diaz, C.O.1
Guzek, M.2
Pecero, J.E.3
Danoy, G.4
Bouvry, P.5
Khan, S.U.6
-
27
-
-
79960305908
-
A weighted sum technique for the joint optimization of performance and power consumption in data centers
-
S.U. Khan, C. Ardil, A weighted sum technique for the joint optimization of performance and power consumption in data centers, International Journal of Electrical, Computer, and Systems Engineering 3 (1) (2009) 35-40.
-
(2009)
International Journal of Electrical, Computer, and Systems Engineering
, vol.3
, Issue.1
, pp. 35-40
-
-
Khan, S.U.1
Ardil, C.2
-
28
-
-
85014794141
-
A self-adaptive weighted sum technique for the joint optimization of performance and power consumption in data centers
-
S.U. Khan, A self-adaptive weighted sum technique for the joint optimization of performance and power consumption in data centers, in: Proc. 22nd Int. Conference on Parallel and Distributed Computing and Communication Systems, PDCCS '09, Louisville, KY, USA, Sep 2009.
-
Proc. 22nd Int. Conference on Parallel and Distributed Computing and Communication Systems, PDCCS '09, Louisville, KY, USA, Sep 2009
-
-
Khan, S.U.1
-
29
-
-
80053551895
-
Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
-
W. Ren, L. Yu, R. Gao, F. Xiong, Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing, Journal of Tsinghua Science and Technology 16 (5) (2011) 520-528.
-
(2011)
Journal of Tsinghua Science and Technology
, vol.16
, Issue.5
, pp. 520-528
-
-
Ren, W.1
Yu, L.2
Gao, R.3
Xiong, F.4
-
30
-
-
84867264126
-
Mobile cloud computing: A comparison of application models
-
vol. abs/1009.3088
-
D. Kovachev, Y. Cao, R. Klamma, Mobile cloud computing: a comparison of application models, Computing Research Repository, CoRR, vol. abs/1009.3088, 2010.
-
(2010)
Computing Research Repository, CoRR
-
-
Kovachev, D.1
Cao, Y.2
Klamma, R.3
-
31
-
-
84055190116
-
A survey of research on mobile cloud computing
-
L. Guan, X. Ke, M. Song, J. Song, A survey of research on mobile cloud computing, in: Proc. 10th IEEE/ACIS International Conference on Computer and Information Science, ICIS '11, Sanya, China, Nov. 2011.
-
Proc. 10th IEEE/ACIS International Conference on Computer and Information Science, ICIS '11, Sanya, China, Nov. 2011
-
-
Guan, L.1
Ke, X.2
Song, M.3
Song, J.4
-
32
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
in press
-
H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Wireless Communication and Mobile Computing. http://dx.doi.org/10.1002/wcm.1203 (in press).
-
Wireless Communication and Mobile Computing
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
33
-
-
84929445167
-
Towards trusted cloud computing
-
N. Santos, K.P. Gummadi, R. Rodrigues, Towards trusted cloud computing, in: Proc. Hot Topics in Cloud Computing, HotCloud '09, San Diego, CA, June 2009.
-
Proc. Hot Topics in Cloud Computing, HotCloud '09, San Diego, CA, June 2009
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
34
-
-
74049110034
-
Securing elastic applications on mobile devices for cloud computing
-
X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, S. Jeong, Securing elastic applications on mobile devices for cloud computing, in: Proc. ACM workshop on Cloud computing security, CCSW '09, Chicago, IL, USA, Nov. 2009.
-
Proc. ACM Workshop on Cloud Computing Security, CCSW '09, Chicago, IL, USA, Nov. 2009
-
-
Zhang, X.1
Schiffman, J.2
Gibbs, S.3
Kunjithapatham, A.4
Jeong, S.5
-
35
-
-
84893475005
-
Augmented smartphone applications through clone cloud execution
-
B.G. Chun, P. Maniatis, Augmented smartphone applications through clone cloud execution, in: Proc. 12th Workshop on Hot Topics in Operating Systems, HotOS '09, Monte Verità, Switzerland, May 2009.
-
Proc. 12th Workshop on Hot Topics in Operating Systems, HotOS '09, Monte Verità, Switzerland, May 2009
-
-
Chun, B.G.1
Maniatis, P.2
-
36
-
-
85014791274
-
Calling the cloud: Enabling mobile phones as interfaces to cloud applications
-
I. Giurgiu, O. Riva, D. Juric, I. Krivulev, G. Alonso, Calling the cloud: enabling mobile phones as interfaces to cloud applications, in: Proc. 10th ACM/IFIP/USENIX Int. Conference on Middleware, Middleware '09, Champaign, IL, USA, Nov. 2009.
-
Proc. 10th ACM/IFIP/USENIX Int. Conference on Middleware, Middleware '09, Champaign, IL, USA, Nov. 2009
-
-
Giurgiu, I.1
Riva, O.2
Juric, D.3
Krivulev, I.4
Alonso, G.5
-
37
-
-
85014773599
-
Alfredo: An architecture for flexible interaction with electronic devices
-
J. Rellermeyer, O. Riva, G. Alonso, Alfredo: an architecture for flexible interaction with electronic devices, in: Proc. 9th ACM/IFIP/USENIX Int. Conference on Middleware, Middleware '08, Leuven, Belgium, Dec. 2008.
-
Proc. 9th ACM/IFIP/USENIX Int. Conference on Middleware, Middleware '08, Leuven, Belgium, Dec. 2008
-
-
Rellermeyer, J.1
Riva, O.2
Alonso, G.3
-
38
-
-
79952030338
-
Energy-efficient incremental integrity for securing storage in mobile cloud computing
-
W. Itani, A. Kayssi, A. Chehab, Energy-efficient incremental integrity for securing storage in mobile cloud computing, in: Proc. Int. Conference on Energy Aware Computing, ICEAC '10, Cairo, Egypt, Dec. 2010.
-
Proc. Int. Conference on Energy Aware Computing, ICEAC '10, Cairo, Egypt, Dec. 2010
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
39
-
-
0343751638
-
Incremental cryptography: The case of hashing and signing
-
M. Bellare, O. Goldreicha, S. Goldwasser, Incremental cryptography: the case of hashing and signing, in: Proc. 14th Annual Int. Cryptology Conference on Advances in Cryptology, Santa Barbara, California, USA, Aug. 1994.
-
Proc. 14th Annual Int. Cryptology Conference on Advances in Cryptology, Santa Barbara, California, USA, Aug. 1994
-
-
Bellare, M.1
Goldreicha, O.2
Goldwasser, S.3
-
40
-
-
85014804373
-
Incremental cryptography and application to virus protection
-
M. Bellare, O. Goldreich, S. Goldwasser, Incremental cryptography and application to virus protection, in: Proc. 27th Annual ACM Symposium on Theory of Computing, STOC '95, Las Vegas, NV, USA, May 1995.
-
Proc. 27th Annual ACM Symposium on Theory of Computing, STOC '95, Las Vegas, NV, USA, May 1995
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
41
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
W. Jia, H. Zhu, Z. Cao, L. Wei, X. Lin, SDSM: a secure data service mechanism in mobile cloud computing, in: Proc. IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr. 2011.
-
Proc. IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr. 2011
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
42
-
-
85014772221
-
CCA-secure proxy re-encryption without pairings in public key cryptography
-
J. Shao, Z. Cao, CCA-secure proxy re-encryption without pairings in public key cryptography, in: Proc. 12th Int. Conference on Practice and Theory in Public Key Cryptography, PKC '09, Irvine, CA, USA, Mar. 2009.
-
Proc. 12th Int. Conference on Practice and Theory in Public Key Cryptography, PKC '09, Irvine, CA, USA, Mar. 2009
-
-
Shao, J.1
Cao, Z.2
-
43
-
-
77953310709
-
Achieving secure scalable and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure scalable and fine-grained data access control in cloud computing, in: Proc. IEEE INFOCOM, INFOCOM '10, San Diego, CA, USA, Mar. 2010.
-
Proc. IEEE INFOCOM, INFOCOM '10, San Diego, CA, USA, Mar. 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
44
-
-
85014746354
-
Identity-based proxy re-encryption
-
M. Green, G. Ateniese, Identity-based proxy re-encryption, in: Proc. 5th Int. Conference on Applied Cryptography and Network Security, ACNS '07, Zhuhai, China, June 2007.
-
Proc. 5th Int. Conference on Applied Cryptography and Network Security, ACNS '07, Zhuhai, China, June 2007
-
-
Green, M.1
Ateniese, G.2
-
45
-
-
80052421238
-
Secure cloud storage for conventional data archive of smart phones
-
S.C. Hsueh, J.Y. Lin, M.Y. Lin, Secure cloud storage for conventional data archive of smart phones, in: Proc. 15th IEEE Int. Symposium on Consumer Electronics, ISCE '11, Singapore, June 2011.
-
Proc. 15th IEEE Int. Symposium on Consumer Electronics, ISCE '11, Singapore, June 2011
-
-
Hsueh, S.C.1
Lin, J.Y.2
Lin, M.Y.3
-
46
-
-
79961227180
-
Provable data possession of resource constrained mobile devices in cloud computing
-
J. Yang, H. Wang, J. Wang, C. Tan, D. Yu1, Provable data possession of resource constrained mobile devices in cloud computing, Journal of Networks 6 (7) (2011) 1033-1040.
-
(2011)
Journal of Networks
, vol.6
, Issue.7
, pp. 1033-1040
-
-
Yang, J.1
Wang, H.2
Wang, J.3
Tan, C.4
Yu, D.5
-
47
-
-
85016014408
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in: Proc. 14th European Conference on Research in Computer Security, ESORICS '09, Saint Malo, France, Sep. 2009.
-
Proc. 14th European Conference on Research in Computer Security, ESORICS '09, Saint Malo, France, Sep. 2009
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
49
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, Aggregate and verifiably encrypted signatures from bilinear maps, in: Proc. 22nd Int. Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT '03, Warsaw, Poland, May 2003.
-
Proc. 22nd Int. Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT '03, Warsaw, Poland, May 2003
-
-
Boneh, D.1
Gentry, C.2
-
50
-
-
0009554659
-
Protocols for public key cryptosystems
-
R.C. Merkle, Protocols for public key cryptosystems, in: Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, Apr. 1980.
-
Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, Apr. 1980
-
-
Merkle, R.C.1
-
51
-
-
84862956001
-
Efficient and secure data storage operations for mobile cloud computing
-
Z. Zhou, D. Huang, Efficient and secure data storage operations for mobile cloud computing, IACR Cryptology ePrint Archive: 185, 2011.
-
(2011)
IACR Cryptology ePrint Archive
, vol.185
-
-
Zhou, Z.1
Huang, D.2
-
52
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: Proc. 28th IEEE Symposium on Security and Privacy, SP '07, California, USA, May 2007.
-
Proc. 28th IEEE Symposium on Security and Privacy, SP '07, California, USA, May 2007
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
53
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM 22 (11) (1979) 612-616.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-616
-
-
Shamir, A.1
-
54
-
-
77953294995
-
An optimal key distribution scheme for secure multicast group communication
-
Z. Zhou, D. Huang, An optimal key distribution scheme for secure multicast group communication, in: Proc. 29th Conference on Information Communications, INFOCOM '10, San Diego, USA, Mar. 2010.
-
Proc. 29th Conference on Information Communications, INFOCOM '10, San Diego, USA, Mar. 2010
-
-
Zhou, Z.1
Huang, D.2
-
55
-
-
79956070044
-
Towards an elastic application model for augmenting computing capabilities of mobile platforms
-
X. Zhang, S. Jeong, A. Kunjithapatham, S. Gibbs, Towards an elastic application model for augmenting computing capabilities of mobile platforms, Journal of Mobile Networks and Applications 16 (3) (2011) 270-284.
-
(2011)
Journal of Mobile Networks and Applications
, vol.16
, Issue.3
, pp. 270-284
-
-
Zhang, X.1
Jeong, S.2
Kunjithapatham, A.3
Gibbs, S.4
-
56
-
-
77955209580
-
Mobility can help: Protect user identity with dynamic credential
-
S. Xiao, W. Gong, Mobility can help: protect user identity with dynamic credential, in: Proc. 11th Int. Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010.
-
Proc. 11th Int. Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010
-
-
Xiao, S.1
Gong, W.2
-
57
-
-
77955180436
-
In-device spatial cloaking for mobile user privacy assisted by the cloud
-
S. Wang, X.S. Wang, In-device spatial cloaking for mobile user privacy assisted by the cloud, in: Proc. 11th Int. Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010.
-
Proc. 11th Int. Conference on Mobile Data Management, MDM '10, Missouri, USA, May 2010
-
-
Wang, S.1
Wang, X.S.2
-
58
-
-
0025406340
-
Efficient processing of window queries in the pyramid data structure
-
W.G. Aref, H. Samet, Efficient processing of window queries in the pyramid data structure, in: Proc. 9th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS '90, Nashville, TN, USA, April 1990.
-
Proc. 9th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, PODS '90, Nashville, TN, USA, April 1990
-
-
Aref, W.G.1
Samet, H.2
-
59
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M.F. Mokbel, C. Chow, W.G. Aref, The new casper: query processing for location services without compromising privacy, in: Proc. 32nd Int. Conference on Very Large Databases, VLDB '06, Seoul, Korea, Sep. 2006.
-
Proc. 32nd Int. Conference on Very Large Databases, VLDB '06, Seoul, Korea, Sep. 2006
-
-
Mokbel, M.F.1
Chow, C.2
Aref, W.G.3
-
60
-
-
78449236807
-
MobiCloud: Building secure cloud framework for mobile computing and communication
-
D. Huan, X. Zhang, M. Kang, J. Luo, MobiCloud: building secure cloud framework for mobile computing and communication, in: Proc. 5th IEEE Int. Symposium on Service Oriented System Engineering, SOSE '10, Nanjing, China, June 2010.
-
Proc. 5th IEEE Int. Symposium on Service Oriented System Engineering, SOSE '10, Nanjing, China, June 2010
-
-
Huan, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
61
-
-
34548775145
-
NetFPGa-an open platform for gigabitrate network switching and routing
-
J. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous, R. Raghuraman, J. Luo, NetFPGa-an open platform for gigabitrate network switching and routing, in: Proc. IEEE Int. Conference on Microelectronic Systems Education, MSE '07, San Diego, California, June 2007.
-
Proc. IEEE Int. Conference on Microelectronic Systems Education, MSE '07, San Diego, California, June 2007
-
-
Lockwood, J.1
McKeown, N.2
Watson, G.3
Gibb, G.4
Hartke, P.5
Naous, J.6
Raghuraman, R.7
Luo, J.8
-
62
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, Z. Song, Authentication in the clouds: a framework and its application to mobile users, in: Proc. ACM Cloud Computing Security Workshop, CCSW '10, Chicago, USA, Oct. 2010.
-
Proc. ACM Cloud Computing Security Workshop, CCSW '10, Chicago, USA, Oct. 2010
-
-
Chow, R.1
Jakobsson, M.2
Masuoka, R.3
Molina, J.4
Niu, Y.5
Shi, E.6
Song, Z.7
-
63
-
-
79960590319
-
Secure data processing framework for mobilecloud computing
-
D. Huang, Z. Zhou, L. Xu, T. Xing, Y. Zhong, Secure data processing framework for mobilecloud computing, in: Proc. IEEE INFOCOM Workshop on Cloud Computing, INFOCOM '11, Shanghai, China, June 2011.
-
Proc. IEEE INFOCOM Workshop on Cloud Computing, INFOCOM '11, Shanghai, China, June 2011
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
64
-
-
2342484676
-
Location-based services for mobile telephony: A study of user's privacy concerns
-
L. Barkhuus, A. Dey, Location-based services for mobile telephony: a study of user's privacy concerns, in: Proc. Int. Conference on Human-Computer Interaction, INTERACT '03, Zurich, Switzerland, Sep. 2003.
-
Proc. Int. Conference on Human-Computer Interaction, INTERACT '03, Zurich, Switzerland, Sep. 2003
-
-
Barkhuus, L.1
Dey, A.2
-
65
-
-
80155167231
-
A security framework of group location-based mobile applications in cloud computing
-
Y.J. Chen, L.C. Wang, A security framework of group location-based mobile applications in cloud computing, in: Proc. Int. Conference on Parallel Processing Workshops, ICPPW '11, Taipei, Taiwan, Sep. 2011.
-
Proc. Int. Conference on Parallel Processing Workshops, ICPPW '11, Taipei, Taiwan, Sep. 2011
-
-
Chen, Y.J.1
Wang, L.C.2
-
66
-
-
80052758369
-
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
-
Special Issue on Mobile Applications: Status and Trends
-
I. Bilogrevica, M. Jadliwalaa, P. Kumarb, S.S. Waliab, J.P. Hubauxa, I. Aadc, V. Niemic, Meetings through the cloud: privacy-preserving scheduling on mobile devices, Journal of Systems and Software 84 (11) (2011) 1910-1927. (Special Issue on Mobile Applications: Status and Trends).
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.11
, pp. 1910-1927
-
-
Bilogrevica, I.1
Jadliwalaa, M.2
Kumarb, P.3
Waliab, S.S.4
Hubauxa, J.P.5
Aadc, I.6
Niemic, V.7
-
67
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (4) (1985) 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
68
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proc. 7th Int. Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT '99, Prague, Czech Republic, May 1999.
-
Proc. 7th Int. Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT '99, Prague, Czech Republic, May 1999
-
-
Paillier, P.1
-
70
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, in: Proc. 5th Int. Conference on Information Security Practice and Experience, ISPEC '09, Xi'an, China, Apr. 2009.
-
Proc. 5th Int. Conference on Information Security Practice and Experience, ISPEC '09, Xi'an, China, Apr. 2009
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
71
-
-
85014743975
-
Towards a DL-based additively homomorphic encryption scheme
-
G. Castagnos, B.C. Mames, Towards a DL-based additively homomorphic encryption scheme, in: Proc. 10th Int. Information Security Conference, ISC '07, Valparaíso, Chile, Oct. 2007.
-
Proc. 10th Int. Information Security Conference, ISC '07, Valparaíso, Chile, Oct. 2007
-
-
Castagnos, G.1
Mames, B.C.2
|