-
1
-
-
62949106749
-
-
SYS-CON Media Inc
-
"Twenty Experts Define Cloud Computing", SYS-CON Media Inc, http://cloudcomputing.sys-con.com/read/612375-p.htm, 2008.
-
(2008)
Twenty Experts Define Cloud Computing
-
-
-
2
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
Foster, I. and Yong Zhao and Raicu, I. and Lu, S., "Cloud Computing and Grid Computing 360-Degree Compared," in Grid Computing Environments Workshop, 2008. GCE '08, November 2008, pp. 1-10.
-
Grid Computing Environments Workshop, 2008. GCE '08, November 2008
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
3
-
-
84862873683
-
IDENTITY MANAGEMENT for CLOUD COMPUTING:DEVELOPMENTS and DIRECTIONS
-
ACM New York, USA Article No. 32
-
K. Hamlen, and Peng Liu and M. Kantarcioglu, and B. Thuraisingham, and Ting Yu, "IDENTITY MANAGEMENT FOR CLOUD COMPUTING:DEVELOPMENTS AND DIRECTIONS," in CSIIRW '11 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, ACM New York, USA 2011, Article No. 32, pp. 1-5.
-
(2011)
CSIIRW '11 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
, pp. 1-5
-
-
Hamlen, K.1
Liu, P.2
Kantarcioglu, M.3
Thuraisingham, B.4
Yu, T.5
-
4
-
-
78650535610
-
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
-
doi: 10.1109/SRDS.2010.28
-
P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. B. Othmane, L. Lilien, and M. Linderman, "An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing," Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS 10), pp. 177-183, doi: 10.1109/SRDS.2010.28.
-
Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS 10)
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Othmane, L.B.5
Lilien, L.6
Linderman, M.7
-
6
-
-
84856677194
-
Open ID Authentication As a Service in OpenStack
-
R. H. Khan and J. Ylitalot and A. S. Ahmed, "Open ID Authentication As A Service in OpenStack," Information Assurance and Security (IAS), 2011 7th International Conference on, 5-8 Dec. 2011, pp. 372-377.
-
Information Assurance and Security (IAS), 2011 7th International Conference On, 5-8 Dec. 2011
, pp. 372-377
-
-
Khan, R.H.1
Ylitalot, J.2
Ahmed, A.S.3
-
7
-
-
84874633287
-
-
Wikipedia, Last Accessed: May 24
-
Wikipedia, "Single sign-on", [Online], http://en.wikipedia.org/ w/index.php?title=Single-sign-on&oldid=492585709, Last Accessed: May 24, 2012
-
(2012)
"Single Sign-on", [Online]
-
-
-
8
-
-
55849093822
-
Trust Requirements in Identity Management
-
1
-
A. Jøsang, J. Fabre, B. Hay, J. Dalziel, S. Pope1, "Trust Requirements in Identity Management", Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44, 2005
-
(2005)
Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research
, vol.44
-
-
Jøsang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
9
-
-
47949126506
-
Distributed Identity Management Model for Digital Ecosystems
-
H. Koshutanski, M. Ion, and L. Telesca, "Distributed Identity Management Model for Digital Ecosystems" in International Conference on Emerging Security Information, Systems and Technologies (Securware'07) Valencia, 2007.
-
International Conference on Emerging Security Information, Systems and Technologies (Securware'07) Valencia, 2007
-
-
Koshutanski, H.1
Ion, M.2
Telesca, L.3
-
10
-
-
77955905901
-
Security and Cloud Computing: InterCloud Identity Management Infrastructure
-
A. Celesti, F. Tusa, M. Villari, A Puliafito, "Security and Cloud Computing: InterCloud Identity Management Infrastructure", 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010, Pp 263-265.
-
19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
11
-
-
0037002475
-
Intrusion detection: A b rief history and overview
-
R. A. Kemmerer and G. Vigna, "Intrusion detection: a b rief history and overview," Computer, vol. 35, no. 4, pp. 27-30, 2002.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
12
-
-
74049112206
-
Cloud Security Issues
-
B. R. Kandukuri, R. Paturi, and A. Rakshit, "Cloud Security Issues,"in IEEE International Conference on Services Computing, 2009, pp. 517-520.
-
IEEE International Conference on Services Computing, 2009
, pp. 517-520
-
-
Kandukuri, B.R.1
Paturi, R.2
Rakshit, A.3
-
13
-
-
77954931494
-
Intrusion Detection for Grid and Cloud Computing
-
July/August
-
K. Vieira, A. Schulter, C. B. Westphall, and C. M. Westphall, "Intrusion Detection for Grid and Cloud Computing," IT Professionals, pp. 38-43, July/August 2010.
-
(2010)
IT Professionals
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
14
-
-
77950559014
-
Intrusion Detection in the Cloud
-
S. Roschke, F. Cheng, and Ch. Meinel, "Intrusion Detection in the Cloud," in Eighth IEEE International Conference on Dependable, Autonomic, and Secure Computing, 2009, pp. 729-734.
-
Eighth IEEE International Conference on Dependable, Autonomic, and Secure Computing, 2009
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, Ch.3
-
16
-
-
84867422076
-
A Preventing Fraud Trust Model in P2P Networks
-
S. Liu, Y. Yu, J. Xu, Z. Huang, "A Preventing Fraud Trust Model in P2P Networks", in IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012, pp 2299-2305.
-
IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
, pp. 2299-2305
-
-
Liu, S.1
Yu, Y.2
Xu, J.3
Huang, Z.4
|