메뉴 건너뛰기




Volumn 35, Issue 6, 2012, Pages 1831-1838

A combined approach to ensure data security in cloud computing

Author keywords

Cloud security; Encryption; Message authentication code; Secured socket layer; Virtualization

Indexed keywords

APPLICATION SOFTWARES; CLASSIFICATION OF DATA; ENCRYPTED DATA; FRAME-WORK; INTEGRITY CHECK; LARGE DATA; LOW COSTS; MESSAGE AUTHENTICATION CODES; SECURE SOCKET LAYERS; SECURED SOCKET LAYER; VIRTUALIZATIONS;

EID: 84867509247     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.07.007     Document Type: Article
Times cited : (179)

References (19)
  • 3
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • LNCS Springer Verlag
    • Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication, LNCS Springer Verlag, Advances in Cryptology- EUROCRYPT'99, 1592, p. 402-414, 1999.
    • (1999) Advances in Cryptology- EUROCRYPT'99 , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 6
    • 1442303741 scopus 로고    scopus 로고
    • The role of dynamic capabilities in e-business transformation
    • EM Daniel, and HN Wilson The role of dynamic capabilities in e-business transformation European Journal of Information Systems 4 12 2003 282 296
    • (2003) European Journal of Information Systems , vol.4 , Issue.12 , pp. 282-296
    • Daniel, E.M.1    Wilson, H.N.2
  • 17
    • 79251600218 scopus 로고    scopus 로고
    • A secure dynamic identity based authentication protocol for multi-server architecture
    • SK Sood, AK Sarje, and K Singh A secure dynamic identity based authentication protocol for multi-server architecture Journal of Network and Computer Applications 34 2 2011 609 618
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.2 , pp. 609-618
    • Sood, S.K.1    Sarje, A.K.2    Singh, K.3
  • 18
    • 84867538058 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • C Wang, N Cao, J Li, K Ren, and W Lou Secure ranked keyword search over encrypted cloud data Journal of the ACM 43 3 2010 431 473
    • (2010) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.