-
2
-
-
78650535610
-
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
-
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., and Lilien, L. 2010. "An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing, " 29th IEEE Symposium on Reliable Distributed Systems, pp. 177-183.
-
(2010)
29th IEEE Symposium on Reliable Distributed Systems
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Ben Othmane, L.6
Lilien, L.7
-
3
-
-
84862933095
-
Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud
-
Chen, L., and Hoang, D.B. 2011. "Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud, " 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 126-133.
-
(2011)
2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 126-133
-
-
Chen, L.1
Hoang, D.B.2
-
4
-
-
0035183926
-
The Hl7 Clinical Document Architecture
-
Dolin, R.H., Alschuler, L., Beebe, C., Biron, P.V., Boyer, S.L., Essin, D., Kimber, E., Lincoln, T., and Mattison, J.E. 2001. "The Hl7 Clinical Document Architecture, " Journal of the American Medical Informatics Association (8:6), p 552.
-
(2001)
Journal of the American Medical Informatics Association
, vol.8
, Issue.6
, pp. 552
-
-
Dolin, R.H.1
Alschuler, L.2
Beebe, C.3
Biron, P.V.4
Boyer, S.L.5
Essin, D.6
Kimber, E.7
Lincoln, T.8
Mattison, J.E.9
-
5
-
-
33745915342
-
-
American Medical Informatics Association
-
Dolin, R.H., Alschuler, L., Boyer, S., and Beebe, C. 2000. "An Update on Hl7's Xml-Based Document Representation Standards, " American Medical Informatics Association.
-
(2000)
An Update on Hl7's Xml-Based Document Representation Standards
-
-
Dolin, R.H.1
Alschuler, L.2
Boyer, S.3
Beebe, C.4
-
6
-
-
80054878180
-
A Trust Computing Mechanism for Cloud Computing with Multilevel Thresholding
-
Firdhous, M., Ghazali, O., and Hassan, S. 2011. "A Trust Computing Mechanism for Cloud Computing with Multilevel Thresholding, " 6th IEEE International Conference on Industrial and Information Systems (ICIIS), pp. 457-461.
-
(2011)
6th IEEE International Conference on Industrial and Information Systems (ICIIS)
, pp. 457-461
-
-
Firdhous, M.1
Ghazali, O.2
Hassan, S.3
-
7
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
2008. GCE '08
-
Foster, I., Yong, Z., Raicu, I., and Lu, S. 2008. "Cloud Computing and Grid Computing 360-Degree Compared, " Grid Computing Environments Workshop, 2008. GCE '08, pp. 1-10.
-
(2008)
Grid Computing Environments Workshop
, pp. 1-10
-
-
Foster, I.1
Yong, Z.2
Raicu, I.3
Lu, S.4
-
8
-
-
2342499830
-
Sirius: Securing Remote Untrusted Storage
-
Goh, E.J., Shacham, H., Modadugu, N., and Boneh, D. 2003. "Sirius: Securing Remote Untrusted Storage, " Citeseer, pp. 131-145.
-
(2003)
Citeseer
, pp. 131-145
-
-
Goh, E.J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
9
-
-
74349121876
-
Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation Management
-
Goyal, P., and Mikkilineni, R. 2009. "Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation Management, " IEEE International Conference on Cloud Computing (CLOUD), pp. 135-138.
-
(2009)
IEEE International Conference on Cloud Computing (CLOUD)
, pp. 135-138
-
-
Goyal, P.1
Mikkilineni, R.2
-
12
-
-
33746329517
-
Using Self-Defending Objects to Develop Security Aware Applications in Java\&Trade
-
Dunedin, New Zealand: Australian Computer Society, Inc
-
Holford, J.W., Caelli, W.J., and Rhodes, A.W. 2004. "Using Self-Defending Objects to Develop Security Aware Applications in Java\&Trade, " Proceedings of the 27th Australasian conference on Computer science-Volume 26, Dunedin, New Zealand: Australian Computer Society, Inc., pp. 341-349.
-
(2004)
Proceedings of the 27th Australasian conference on Computer science-Volume 26
, pp. 341-349
-
-
Holford, J.W.1
Caelli, W.J.2
Rhodes, A.W.3
-
13
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
03
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu, K. 2003. "Plutus: Scalable Secure File Sharing on Untrusted Storage, " 03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies pp. 29-42.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
14
-
-
84878285062
-
-
Retrieved September, 2011, from
-
Kallambella, A. 2006. "Advanced Ant Techniques, Part I. " Retrieved September, 2011, from http://www.javaranch.com/journal/200603/AntPart1.html
-
(2006)
Advanced Ant Techniques, Part I.
-
-
Kallambella, A.1
-
15
-
-
84862907652
-
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments
-
Ko, R.K.L., Jagadpramana, P., and Bu Sung, L. 2011a. "Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments, " 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 765-771.
-
(2011)
2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 765-771
-
-
Ko, R.K.L.1
Jagadpramana, P.2
Bu Sung, L.3
-
16
-
-
80051570703
-
-
A. Abraham, J.L. Mauri, J.F. Buford, J. Suzuki and S.M. Thampi (eds.). Springer Berlin Heidelberg
-
Ko, R.K.L., Lee, B.S., and Pearson, S. 2011b. "Towards Achieving Accountability, Auditability and Trust in Cloud Computing, " A. Abraham, J.L. Mauri, J.F. Buford, J. Suzuki and S.M. Thampi (eds.). Springer Berlin Heidelberg, pp. 432-444.
-
(2011)
Towards Achieving Accountability, Auditability and Trust in Cloud Computing
, pp. 432-444
-
-
Ko, R.K.L.1
Lee, B.S.2
Pearson, S.3
-
19
-
-
77954893896
-
Data Protection Models for Service Provisioning in the Cloud
-
Pittsburgh, Pennsylvania, USA: ACM
-
Lin, D., and Squicciarini, A. 2010. "Data Protection Models for Service Provisioning in the Cloud, " 15th ACM symposium on Access control models and technologies, Pittsburgh, Pennsylvania, USA: ACM, pp. 183-192.
-
(2010)
15th ACM symposium on Access control models and technologies
, pp. 183-192
-
-
Lin, D.1
Squicciarini, A.2
-
25
-
-
80053159713
-
Promoting Distributed Accountability in the Cloud
-
Sundareswaran, S., Squicciarini, A., Dan, L., and Shuo, H. 2011. "Promoting Distributed Accountability in the Cloud, " 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 113-120.
-
(2011)
2011 IEEE International Conference on Cloud Computing (CLOUD)
, pp. 113-120
-
-
Sundareswaran, S.1
Squicciarini, A.2
Dan, L.3
Shuo, H.4
-
26
-
-
84861176850
-
Ensuring Distributed Accountability for Data Sharing in the Cloud
-
Sundareswaran, S., Squicciarini, A., and Lin, D. 2012. "Ensuring Distributed Accountability for Data Sharing in the Cloud, " IEEE Transactions on Dependable and Secure Computing (9:4), pp 556-568.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.4
, pp. 556-568
-
-
Sundareswaran, S.1
Squicciarini, A.2
Lin, D.3
-
27
-
-
84857960811
-
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment
-
Takabi, H., and Joshi, J.B.D. 2012. "Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment, " 45th Hawaii International Conference on System Science (HICSS), pp. 5500-5508.
-
(2012)
45th Hawaii International Conference on System Science (HICSS)
, pp. 5500-5508
-
-
Takabi, H.1
Joshi, J.B.D.2
-
28
-
-
70449569012
-
-
17th International Workshop on Quality of Service (IWQoS)
-
Wang, C., Wang, Q., Ren, K., and Lou, W. 2009. "Ensuring Data Storage Security in Cloud Computing, " 17th International Workshop on Quality of Service (IWQoS) pp. 1-9.
-
(2009)
Ensuring Data Storage Security in Cloud Computing
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
29
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
Wang, C., Wang, Q., Ren, K., and Lou, W. 2010. "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, " 2010 IEEE Proceedings on INFOCOM, pp. 1-9.
-
(2010)
2010 IEEE Proceedings on INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
30
-
-
80052699824
-
A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud
-
Seattle, WA
-
Wang, S., Agrawal, D., and El Abbadi, A. 2011. "A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud, " 8th VLDB international conference on Secure data management, Seattle, WA, pp. 52-69.
-
(2011)
8th VLDB international conference on Secure data management
, pp. 52-69
-
-
Wang, S.1
Agrawal, D.2
El Abbadi, A.3
-
31
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing
-
Yu, S., Wang, C., Ren, K., and Lou, W. 2010. "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, " INFOCOM'10 Proceedings of the 29th conference on Information communications, pp. 534-542
-
(2010)
INFOCOM'10 Proceedings of the 29th conference on Information communications
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|