-
2
-
-
70349967661
-
X as a service, cloud computing, and the need for good judgment
-
H.E. Schaffer X as a service, cloud computing, and the need for good judgment IT Professional 11 5 2009 4 5
-
(2009)
IT Professional
, vol.11
, Issue.5
, pp. 4-5
-
-
Schaffer, H.E.1
-
6
-
-
84867851862
-
Software & information industry association: Software as a service: Strategic backgrounder
-
Software & information industry association: software as a service: strategic backgrounder Whitepaper February 31 2001
-
(2001)
Whitepaper
-
-
-
7
-
-
26444442384
-
Security issues in querying encrypted data
-
Murat Kantarcioglu, and Chris Clifton Security issues in querying encrypted data Proc. DBSec 2005 325 337
-
(2005)
Proc. DBSec
, pp. 325-337
-
-
Kantarcioglu, M.1
Clifton, C.2
-
8
-
-
84967222929
-
Ensuring the integrity of encrypted databases in the database-as-a- service model
-
Hakan Hacigümüs, Balakrishna R. Iyer, and Sharad Mehrotra Ensuring the integrity of encrypted databases in the database-as-a-service model Proc. DBSec 2003 61 74
-
(2003)
Proc. DBSec
, pp. 61-74
-
-
Hacigümüs, H.1
Iyer, B.R.2
Mehrotra, S.3
-
9
-
-
13844271963
-
Selective and authentic third-party distribution of XML documents
-
Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, and Amar Gupta Selective and authentic third-party distribution of XML documents IEEE Transactions on Knowledge and Data Engineering 16 10 2004 1263 1278
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.M.4
Gupta, A.5
-
10
-
-
84867882649
-
-
Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham Security issues for cloud computing, UTD technical report, UTDCS-02-10 February 2010
-
(2010)
Security Issues for Cloud Computing, UTD Technical Report, UTDCS-02-10
-
-
Hamlen, K.1
Kantarcioglu, M.2
Khan, L.3
Thuraisingham, B.4
-
13
-
-
76949085352
-
Secure data objects replication in data grid
-
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thuraisingham, and Latifur Khan Secure data objects replication in data grid IEEE Transactions on Dependable and Secure Computing 7 1 2010 50 64
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 50-64
-
-
Tu, M.1
Li, P.2
Yen, I.-L.3
Thuraisingham, B.M.4
Khan, L.5
-
14
-
-
84867850111
-
-
Elisa Bertino, Gabriel Ghinita, Kevin Hamlen, Murat Kantarcioglu, Hsien-Hsin S. Lee, Ninghui Li, Calton Pu, Ravi Sandhu, Waleed Smari, Bhavani Thuraisingham, Gene Tsudik, Dongyan Xu, and Shouhuai Xu Securing the execution environment applications and data from multi-trusted components, UTD technical report, UTDCS-03-10 February 2010
-
(2010)
Securing the Execution Environment Applications and Data from Multi-trusted Components, UTD Technical Report, UTDCS-03-10
-
-
Bertino, E.1
Ghinita, G.2
Hamlen, K.3
Kantarcioglu, M.4
Lee, H.-H.S.5
Li, N.6
Pu, C.7
Sandhu, R.8
Smari, W.9
Thuraisingham, B.10
Tsudik, G.11
Xu, D.12
Xu, S.13
-
15
-
-
62949105495
-
Intent-driven insider threat detection in intelligence analyses
-
Eugene Santos, Hien Nguyen, Fei Yu, Keumjoo Kim, Deqing Li, J.T. Wilkinson, A. Olson, and R. Jacob Intent-driven insider threat detection in intelligence analyses Proc. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology 2008 345 349
-
(2008)
Proc. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 345-349
-
-
Santos, E.1
Nguyen, H.2
Yu, F.3
Kim, K.4
Li, D.5
Wilkinson, J.T.6
Olson, A.7
Jacob, R.8
-
16
-
-
85072967179
-
Data supply chain management: Supply chain management for incentive and risk-based assured information sharing
-
B. Thuraisingham Data supply chain management: supply chain management for incentive and risk-based assured information sharing UTD Technical Report 2010
-
(2010)
UTD Technical Report
-
-
Thuraisingham, B.1
-
17
-
-
84867868972
-
Using agency theory to guide the design of incentives
-
Priscilla R. Manatsa, Tim S. McLaren, and Information Sharing In a Supply Chain Using agency theory to guide the design of incentives Supply Chain Forum 9 1 2008
-
(2008)
Supply Chain Forum
, vol.9
, Issue.1
-
-
Manatsa, P.R.1
McLaren, T.S.2
-
19
-
-
84867871393
-
Security standards for outsourcing
-
Carter Santos Security standards for outsourcing Law Technology News May 2009
-
(2009)
Law Technology News
-
-
Santos, C.1
-
20
-
-
79952915211
-
Security issues for cloud computing
-
Kevin W. Hamlen, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham Security issues for cloud computing International Journal of Information Security and Privacy 4 2 2010 39 51
-
(2010)
International Journal of Information Security and Privacy
, vol.4
, Issue.2
, pp. 39-51
-
-
Hamlen, K.W.1
Kantarcioglu, M.2
Khan, L.3
Thuraisingham, B.4
|