메뉴 건너뛰기




Volumn , Issue , 2012, Pages 153-162

Confidentiality as a service - Usable security for the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD SERVICES; CORPORATE USERS; DATA PROTECTION; FACEBOOK; KEY-MANAGEMENT; NON-TECHNICAL USERS; SECURITY MECHANISM; SYMMETRIC ENCRYPTION; USABLE SECURITY; WORK-FLOWS;

EID: 84868107467     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.112     Document Type: Conference Paper
Times cited : (33)

References (34)
  • 1
    • 78650065157 scopus 로고    scopus 로고
    • Security and Privacy Challenges in Cloud Computing Environments
    • nov
    • H. Takabi, J. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, nov 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 10
    • 84868144564 scopus 로고    scopus 로고
    • Hush Communications Canada Inc., last access: 14.10.11.
    • Hush Communications Canada Inc., "Hushmail - A Secure Web-based Free Email Service," http://www.hushmail.com/, last access: 14.10.11.
    • Hushmail - A Secure Web-based Free Email Service
  • 11
    • 84868123219 scopus 로고    scopus 로고
    • "encipher.it," last access 14.11.2011
    • A. Ermak, "encipher.it," http://encipher.it - last access 14.11.2011.
    • Ermak, A.1
  • 12
    • 84868126698 scopus 로고    scopus 로고
    • Reputation.com Inc., last access: 11.11.2011
    • Reputation.com Inc., http://uprotect.it - last access: 11.11.2011.
  • 13
    • 84868101135 scopus 로고    scopus 로고
    • last access: 14.11.2011
    • R. Freudenreich, "Boxcryptor," http://www.boxcryptor.com/ - last access: 14.11.2011.
    • Boxcryptor
    • Freudenreich, R.1
  • 14
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    • A. Whitten and J. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in USENIX Security, 1999.
    • (1999) USENIX Security
    • Whitten, A.1    Tygar, J.2
  • 16
    • 12844272841 scopus 로고    scopus 로고
    • In Search of Usable Security: Five Lessons from the Field
    • D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, "In Search of Usable Security: Five Lessons From the Field," IEEE Security & Privacy, vol. 2, no. 5, pp. 19-24, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 19-24
    • Balfanz, D.1    Durfee, G.2    Smetters, D.3    Grinter, R.4
  • 19
    • 80052629674 scopus 로고    scopus 로고
    • Not Reinventing PKI until We Have Something Better
    • S. Farrell, "Not Reinventing PKI Until We Have Something Better," IEEE Internet Computing, vol. 15, no. 5, pp. 95-98, 2011.
    • (2011) IEEE Internet Computing , vol.15 , Issue.5 , pp. 95-98
    • Farrell, S.1
  • 20
    • 84859800820 scopus 로고    scopus 로고
    • A Research Agenda Acknowledging the Persistence of Passwords
    • C. Herley and P. Van Oorschot, "A Research Agenda Acknowledging the Persistence of Passwords," Security & Privacy, IEEE, vol. 10, no. 1, pp. 28-36, 2012.
    • (2012) Security & Privacy, IEEE , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.2
  • 21
    • 3042823619 scopus 로고    scopus 로고
    • Email-based Identification and Authentication: An Alternative to PKI?
    • Nov.
    • S. Garfinkel, "Email-based Identification And Authentication: An Alternative to PKI?" IEEE Security and Privacy, vol. 1, no. 6, pp. 20-26, Nov. 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.6 , pp. 20-26
    • Garfinkel, S.1
  • 25
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 26
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), October
    • National Institute of Standards and Technology (NIST), "Advanced Encryption Standard (AES) (FIPS PUB 197)," October 2001.
    • (2001) Advanced Encryption Standard (AES) (FIPS PUB 197)
  • 28
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic Cloud Storage
    • Financial Cryptography and Data Security, ser. Springer
    • S. Kamara and K. Lauter, "Cryptographic Cloud Storage," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science. Springer, 2010, vol. 6054, pp. 136-149.
    • (2010) Lecture Notes in Computer Science , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 31
    • 84868092236 scopus 로고    scopus 로고
    • last access: 11.11.2011
    • "Amazon S3," http://aws.amazon.com/s3/ - last access: 11.11.2011.
    • Amazon S3
  • 32
    • 84868117638 scopus 로고    scopus 로고
    • last access: 11.11.2011
    • "Wuala," http://www.wuala.com - last access: 11.11.2011.
    • Wuala


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.