-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia A view of cloud computing Commun. ACM 53 4 2010 50 58
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Comput. Syst. 25 6 2009 599 616
-
(2009)
Future Generation Comput. Syst.
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
3
-
-
77954879049
-
Cloud computing: A perspective study
-
L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao, and C. Fu Cloud computing: A perspective study New Generation Comput. 28 2 2010 137 146
-
(2010)
New Generation Comput.
, vol.28
, Issue.2
, pp. 137-146
-
-
Wang, L.1
Von Laszewski, G.2
Younge, A.3
He, X.4
Kunze, M.5
Tao, J.6
Fu, C.7
-
4
-
-
84855349233
-
In cloud, can scientific communities benefit from the economies of scale?
-
L. Wang, J. Zhan, W. Shi, and Y. Liang In cloud, can scientific communities benefit from the economies of scale? IEEE Trans. Parallel Distrib. Syst. 23 2 2012 296 303
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.2
, pp. 296-303
-
-
Wang, L.1
Zhan, J.2
Shi, W.3
Liang, Y.4
-
5
-
-
70450267381
-
Recent research advances in e-science
-
X. Yang, L. Wang, and G. Laszewski Recent research advances in e-science Cluster Comput. 12 4 2009 353 356
-
(2009)
Cluster Comput.
, vol.12
, Issue.4
, pp. 353-356
-
-
Yang, X.1
Wang, L.2
Laszewski, G.3
-
6
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J.B.D. Joshi, and G. Ahn Security and privacy challenges in cloud computing environments IEEE Secur. Privacy 8 6 2010 24 31
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
7
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Generation Comput. Syst. 28 3 2011 583 592
-
(2011)
Future Generation Comput. Syst.
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
8
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
G. Bernd, W. Tobias, and S. Elmar Understanding cloud computing vulnerabilities IEEE Secur. Privacy 9 2 2010 50 57
-
(2010)
IEEE Secur. Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Bernd, G.1
Tobias, W.2
Elmar, S.3
-
10
-
-
34447521488
-
A secure information service for monitoring large scale grids
-
W. Jie, W. Cai, L. Wang, and R. Procter A secure information service for monitoring large scale grids Parallel Comput. 33 7-8 2007 572 591
-
(2007)
Parallel Comput.
, vol.33
, Issue.78
, pp. 572-591
-
-
Jie, W.1
Cai, W.2
Wang, L.3
Procter, R.4
-
11
-
-
84875230591
-
-
Microsoft HealthVault accessed on February 10, 2012
-
Microsoft HealthVault http://www.microsoft.com/health/ww/products/Pages/ healthvault.aspx accessed on February 10, 2012
-
-
-
-
12
-
-
84860512062
-
A secure erasure code-based cloud storage system with secure data forwarding
-
H. Lin, and W. Tzeng A secure erasure code-based cloud storage system with secure data forwarding IEEE Trans. Parallel Distrib. Syst. 23 6 2011 995 1003
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 995-1003
-
-
Lin, H.1
Tzeng, W.2
-
13
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, in: Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM'11), 2011, pp. 829-837.
-
(2011)
Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM'11)
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
14
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, W. Lou, Authorized private keyword search over encrypted data in cloud computing, in: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS'11), 2011, pp. 383-392.
-
(2011)
Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS'11)
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
15
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in: Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM'11), 2010, pp. 1-5.
-
(2010)
Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM'11)
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
17
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, V. Vaikuntanathan, Fully homomorphic encryption over the integers, in: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'10), 2010, pp. 24-43.
-
(2010)
Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'10)
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
18
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Incognito: Efficient full-domain k-anonymity, in: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD'05), 2005, pp. 49-60.
-
(2005)
Proceedings of 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD'05)
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
20
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowl. Data Engrg. 13 6 2001 1010 1027
-
(2001)
IEEE Trans. Knowl. Data Engrg.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
22
-
-
82155187187
-
Incoop: Mapreduce for incremental computations
-
P. Bhatotia, A. Wieder, R. Rodrigues, U.A. Acar, R. Pasquin, Incoop: Mapreduce for incremental computations, in: Proceedings of Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC'11), 2011, pp. 1-14.
-
(2011)
Proceedings of Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC'11)
, pp. 1-14
-
-
Bhatotia, P.1
Wieder, A.2
Rodrigues, R.3
Acar, U.A.4
Pasquin, R.5
-
23
-
-
79959939881
-
A platform for scalable one-pass analytics using mapreduce
-
B. Li, E. Mazur, Y. Diao, A. McGregor, P. Shenoy, A platform for scalable one-pass analytics using mapreduce, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'11), 2011, pp. 985-996.
-
(2011)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'11)
, pp. 985-996
-
-
Li, B.1
Mazur, E.2
Diao, Y.3
McGregor, A.4
Shenoy, P.5
-
24
-
-
84869007066
-
Stream as you go: The case for incremental data access and processing in the cloud
-
R. Kienzler, R. Bruggmann, A. Ranganathan, N. Tatbul, Stream as you go: The case for incremental data access and processing in the cloud, in: IEEE ICDE International Workshop on Data Management in the Cloud (DMC'12), 2012.
-
(2012)
IEEE ICDE International Workshop on Data Management in the Cloud (DMC'12)
-
-
Kienzler, R.1
Bruggmann, R.2
Ranganathan, A.3
Tatbul, N.4
-
25
-
-
79959962180
-
Nova: Continuous Pig/Hadoop workflows
-
C. Olston, G. Chiou, L. Chitnis, F. Liu, Y. Han, M. Larsson, A. Neumann, V.B.N. Rao, V. Sankarasubramanian, S. Seth, C. Tian, T. ZiCornell, X. Wang, Nova: Continuous Pig/Hadoop workflows, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'11), 2011, pp. 1081-1090.
-
(2011)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'11)
, pp. 1081-1090
-
-
Olston, C.1
Chiou, G.2
Chitnis, L.3
Liu, F.4
Han, Y.5
Larsson, M.6
Neumann, A.7
Rao, V.B.N.8
Sankarasubramanian, V.9
Seth, S.10
Tian, C.11
Zicornell, T.12
Wang, X.13
-
26
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean, and S. Ghemawat Mapreduce: Simplified data processing on large clusters Commun. ACM 51 1 2008 107 113
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
28
-
-
43349106146
-
Anonymity for continuous data publishing
-
B.C.M. Fung, K. Wang, A.W.-C. Fu, J. Pei, Anonymity for continuous data publishing, in: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology (EDBT'08), 2008, pp. 264-275.
-
(2008)
Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology (EDBT'08)
, pp. 264-275
-
-
Fung, B.C.M.1
Wang, K.2
Fu, A.W.-C.3
Pei, J.4
-
29
-
-
79957817790
-
Preventing equivalence attacks in updated, anonymized data
-
Y. He, S. Barman, J.F. Naughton, Preventing equivalence attacks in updated, anonymized data, in: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE'11), 2011, pp. 529-540.
-
(2011)
Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE'11)
, pp. 529-540
-
-
He, Y.1
Barman, S.2
Naughton, J.F.3
-
30
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
J. Pei, J. Xu, Z. Wang, W. Wang, K. Wang, Maintaining k-anonymity against incremental updates, in: Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSBDM'07), 2007, pp. 5-5.
-
(2007)
Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSBDM'07)
, pp. 5-5
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
31
-
-
70349134605
-
Continuous privacy preserving publishing of data streams
-
B. Zhou, Y. Han, J. Pei, B. Jiang, Y. Tao, Y. Jia, Continuous privacy preserving publishing of data streams, in: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT'09), 2009, pp. 648-659.
-
(2009)
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT'09)
, pp. 648-659
-
-
Zhou, B.1
Han, Y.2
Pei, J.3
Jiang, B.4
Tao, Y.5
Jia, Y.6
-
32
-
-
84884796868
-
Preserving k-anonymity over distributed data
-
K. Doka, D. Tsoumakos, N. Koziris Kanis, Preserving k-anonymity over distributed data, in: The 5th International Workshop on Personalized Access, Profile Management, and Context Awareness in Databases (PersDB'11), 2011.
-
(2011)
The 5th International Workshop on Personalized Access, Profile Management, and Context Awareness in Databases (PersDB'11)
-
-
Doka, K.1
Tsoumakos, D.2
Koziris Kanis, N.3
-
33
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
B.C.M. Fung, K. Wang, and P.S. Yu Anonymizing classification data for privacy preservation IEEE Trans. Knowl. Data Engrg. 19 5 2007 711 725
-
(2007)
IEEE Trans. Knowl. Data Engrg.
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
34
-
-
84863162233
-
Parallel data processing with mapreduce: A survey
-
K.H. Lee, Y.J. Lee, H. Choi, Y.D. Chung, and B. Moon Parallel data processing with mapreduce: A survey ACM SIGMOD Record 40 4 2012 11 20
-
(2012)
ACM SIGMOD Record
, vol.40
, Issue.4
, pp. 11-20
-
-
Lee, K.H.1
Lee, Y.J.2
Choi, H.3
Chung, Y.D.4
Moon, B.5
-
35
-
-
84875224185
-
-
Hadoop, accessed on June 01, 2012
-
Hadoop http://hadoop.apache.org accessed on June 01, 2012
-
-
-
-
36
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu Privacy-preserving data publishing: A survey of recent developments ACM Computer Survey 42 4 2010 1 53
-
(2010)
ACM Computer Survey
, vol.42
, Issue.4
, pp. 1-53
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
38
-
-
33750732631
-
Secure anonymization for incremental datasets
-
J.-W. Byun, Y. Sohn, E. Bertino, N. Li, Secure anonymization for incremental datasets, in: Proceedings of the VLDB Workshop on Secure Data Management (SDM'06), 2006, pp. 48-63.
-
(2006)
Proceedings of the VLDB Workshop on Secure Data Management (SDM'06)
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
40
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A.W.C. Fu, Utility-based anonymization using local recoding, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data (KDD'06), 2006, pp. 785-790.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data (KDD'06)
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.C.6
-
41
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of 22nd International Conference on Data Engineering (ICDE'06), 2006, pp. 25-25.
-
(2006)
Proceedings of 22nd International Conference on Data Engineering (ICDE'06)
, pp. 25-25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
44
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, V.S. Mirrokni, Locality-sensitive hashing scheme based on p-stable distributions, in: Proceedings of the 20th Annual Symposium on Computational Geometry (SOCG'04), 2004, pp. 253-262.
-
(2004)
Proceedings of the 20th Annual Symposium on Computational Geometry (SOCG'04)
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
45
-
-
51849158061
-
-
E2LSH accessed on February 10, 2012
-
E2LSH LSH algorithm and implementation http://web.mit.edu/andoni/www/LSH/ accessed on February 10, 2012
-
LSH Algorithm and Implementation
-
-
-
47
-
-
84875219219
-
-
KVM, accessed on February 10, 2012
-
KVM http://www.linux-kvm.org/page/Main-Page accessed on February 10, 2012
-
-
-
-
48
-
-
84875218007
-
-
accessed on February 10, 2012
-
OpenStack http://openstack.org/ accessed on February 10, 2012
-
-
-
-
49
-
-
84875225388
-
-
U.C.I. Machine accessed on June 01
-
U.C.I. Machine, Learning repository, ftp://ftp.ics.uci.edu/pub/machine- learning-databases/, accessed on June 01, 2012.
-
(2012)
Learning Repository
-
-
|