-
1
-
-
78650065157
-
Security and Privacy Challenges in Cloud Computing Environments
-
nov
-
H. Takabi, J. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, nov 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
2
-
-
74049093526
-
Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling Data in the Cloud: Outsourcing Computation Without Outsourcing Control," in Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM, 2009, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
4
-
-
80755168326
-
Proofs of Ownership in Remote Storage Systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," in Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011, pp. 491-500.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
5
-
-
57649174994
-
Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence
-
D. Boyd, "Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence," Convergence: The International Journal of Research into New Media Technologies, vol. 14, no. 1, pp. 13-20, 2008.
-
(2008)
Convergence: The International Journal of Research into New Media Technologies
, vol.14
, Issue.1
, pp. 13-20
-
-
Boyd, D.1
-
6
-
-
84863932631
-
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, "Dark Clouds On The Horizon: Using Cloud Storage as Attack Vector And Online Slack Space," in Proceedings of the 20th USENIX Conference on Security, 2011, p. 5.
-
Proceedings of the 20th USENIX Conference on Security, 2011
, pp. 5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
8
-
-
70450257780
-
Persona: An Online Social Network with User-defined Privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: An Online Social Network With User-defined Privacy," in Proceedings of the ACM SIGCOMM Conference on Data Communication, 2009, pp. 135-146.
-
Proceedings of the ACM SIGCOMM Conference on Data Communication, 2009
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
9
-
-
79961189950
-
Scramble! Your Social Network Data
-
Springer
-
F. Beato, M. Kohlweiss, and K. Wouters, "Scramble! Your Social Network Data," in Proceedings of the 11th International Conference on Privacy Enhancing Technologies. Springer, 2011, pp. 211-225.
-
(2011)
Proceedings of the 11th International Conference on Privacy Enhancing Technologies
, pp. 211-225
-
-
Beato, F.1
Kohlweiss, M.2
Wouters, K.3
-
10
-
-
84868144564
-
-
Hush Communications Canada Inc., last access: 14.10.11.
-
Hush Communications Canada Inc., "Hushmail - A Secure Web-based Free Email Service," http://www.hushmail.com/, last access: 14.10.11.
-
Hushmail - A Secure Web-based Free Email Service
-
-
-
11
-
-
84868123219
-
-
"encipher.it," last access 14.11.2011
-
A. Ermak, "encipher.it," http://encipher.it - last access 14.11.2011.
-
-
-
Ermak, A.1
-
12
-
-
84868126698
-
-
Reputation.com Inc., last access: 11.11.2011
-
Reputation.com Inc., http://uprotect.it - last access: 11.11.2011.
-
-
-
-
13
-
-
84868101135
-
-
last access: 14.11.2011
-
R. Freudenreich, "Boxcryptor," http://www.boxcryptor.com/ - last access: 14.11.2011.
-
Boxcryptor
-
-
Freudenreich, R.1
-
14
-
-
85084161247
-
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
-
A. Whitten and J. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in USENIX Security, 1999.
-
(1999)
USENIX Security
-
-
Whitten, A.1
Tygar, J.2
-
16
-
-
12844272841
-
In Search of Usable Security: Five Lessons from the Field
-
D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, "In Search of Usable Security: Five Lessons From the Field," IEEE Security & Privacy, vol. 2, no. 5, pp. 19-24, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.3
Grinter, R.4
-
18
-
-
84861290223
-
How to Make Secure Email Easier to Use
-
S. L. Garfinkel, D. Margrave, J. I. Schiller, E. Nordlander, and R. C. Miller, "How To Make Secure Email Easier to Use," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2005, pp. 701-710.
-
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2005
, pp. 701-710
-
-
Garfinkel, S.L.1
Margrave, D.2
Schiller, J.I.3
Nordlander, E.4
Miller, R.C.5
-
19
-
-
80052629674
-
Not Reinventing PKI until We Have Something Better
-
S. Farrell, "Not Reinventing PKI Until We Have Something Better," IEEE Internet Computing, vol. 15, no. 5, pp. 95-98, 2011.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.5
, pp. 95-98
-
-
Farrell, S.1
-
20
-
-
84859800820
-
A Research Agenda Acknowledging the Persistence of Passwords
-
C. Herley and P. Van Oorschot, "A Research Agenda Acknowledging the Persistence of Passwords," Security & Privacy, IEEE, vol. 10, no. 1, pp. 28-36, 2012.
-
(2012)
Security & Privacy, IEEE
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
21
-
-
3042823619
-
Email-based Identification and Authentication: An Alternative to PKI?
-
Nov.
-
S. Garfinkel, "Email-based Identification And Authentication: An Alternative to PKI?" IEEE Security and Privacy, vol. 1, no. 6, pp. 20-26, Nov. 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.1
-
24
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.11
-
ACM
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11," in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking. ACM, 2001, pp. 180-189.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
25
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
26
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST), October
-
National Institute of Standards and Technology (NIST), "Advanced Encryption Standard (AES) (FIPS PUB 197)," October 2001.
-
(2001)
Advanced Encryption Standard (AES) (FIPS PUB 197)
-
-
-
28
-
-
77956137294
-
Cryptographic Cloud Storage
-
Financial Cryptography and Data Security, ser. Springer
-
S. Kamara and K. Lauter, "Cryptographic Cloud Storage," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science. Springer, 2010, vol. 6054, pp. 136-149.
-
(2010)
Lecture Notes in Computer Science
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
29
-
-
78649998200
-
Hierarchical Attribute-based Encryption for Fine-grained Access Control in Cloud Storage Services
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical Attribute-based Encryption For Fine-grained Access Control in Cloud Storage Services," in Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010, pp. 735-737.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
30
-
-
77950587463
-
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
-
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," in Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.
-
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
31
-
-
84868092236
-
-
last access: 11.11.2011
-
"Amazon S3," http://aws.amazon.com/s3/ - last access: 11.11.2011.
-
Amazon S3
-
-
-
32
-
-
84868117638
-
-
last access: 11.11.2011
-
"Wuala," http://www.wuala.com - last access: 11.11.2011.
-
Wuala
-
-
-
34
-
-
0005893506
-
-
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and T. R., "RFC 4880: OpenPGP Message Format," 2007.
-
(2007)
RFC 4880: OpenPGP Message Format
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
R, T.5
|