메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Active data-centric framework for data protection in cloud environment

Author keywords

Active data centric; Cloud computing; Tamper proof; Transformation; Zero knowledge proof

Indexed keywords

DATA CENTRIC; EVOLUTIONARY COMPUTING; HIGH SPEED INTERNET; PROTECTION CAPABILITIES; TAMPERPROOF; TRANSFORMATION; TRIGGERABLE DATA FILE STRUCTURES; ZERO KNOWLEDGE PROOF;

EID: 84878299236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (31)
  • 8
    • 2342499830 scopus 로고    scopus 로고
    • Sirius: Securing Remote Untrusted Storage
    • Goh, E.J., Shacham, H., Modadugu, N., and Boneh, D. 2003. "Sirius: Securing Remote Untrusted Storage, " Citeseer, pp. 131-145.
    • (2003) Citeseer , pp. 131-145
    • Goh, E.J.1    Shacham, H.2    Modadugu, N.3    Boneh, D.4
  • 9
    • 74349121876 scopus 로고    scopus 로고
    • Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation Management
    • Goyal, P., and Mikkilineni, R. 2009. "Policy-Based Event-Driven Services-Oriented Architecture for Cloud Services Operation Management, " IEEE International Conference on Cloud Computing (CLOUD), pp. 135-138.
    • (2009) IEEE International Conference on Cloud Computing (CLOUD) , pp. 135-138
    • Goyal, P.1    Mikkilineni, R.2
  • 12
    • 33746329517 scopus 로고    scopus 로고
    • Using Self-Defending Objects to Develop Security Aware Applications in Java\&Trade
    • Dunedin, New Zealand: Australian Computer Society, Inc
    • Holford, J.W., Caelli, W.J., and Rhodes, A.W. 2004. "Using Self-Defending Objects to Develop Security Aware Applications in Java\&Trade, " Proceedings of the 27th Australasian conference on Computer science-Volume 26, Dunedin, New Zealand: Australian Computer Society, Inc., pp. 341-349.
    • (2004) Proceedings of the 27th Australasian conference on Computer science-Volume 26 , pp. 341-349
    • Holford, J.W.1    Caelli, W.J.2    Rhodes, A.W.3
  • 14
    • 84878285062 scopus 로고    scopus 로고
    • Retrieved September, 2011, from
    • Kallambella, A. 2006. "Advanced Ant Techniques, Part I. " Retrieved September, 2011, from http://www.javaranch.com/journal/200603/AntPart1.html
    • (2006) Advanced Ant Techniques, Part I.
    • Kallambella, A.1
  • 19
    • 77954893896 scopus 로고    scopus 로고
    • Data Protection Models for Service Provisioning in the Cloud
    • Pittsburgh, Pennsylvania, USA: ACM
    • Lin, D., and Squicciarini, A. 2010. "Data Protection Models for Service Provisioning in the Cloud, " 15th ACM symposium on Access control models and technologies, Pittsburgh, Pennsylvania, USA: ACM, pp. 183-192.
    • (2010) 15th ACM symposium on Access control models and technologies , pp. 183-192
    • Lin, D.1    Squicciarini, A.2
  • 27
    • 84857960811 scopus 로고    scopus 로고
    • Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment
    • Takabi, H., and Joshi, J.B.D. 2012. "Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment, " 45th Hawaii International Conference on System Science (HICSS), pp. 5500-5508.
    • (2012) 45th Hawaii International Conference on System Science (HICSS) , pp. 5500-5508
    • Takabi, H.1    Joshi, J.B.D.2
  • 29
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • Wang, C., Wang, Q., Ren, K., and Lou, W. 2010. "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, " 2010 IEEE Proceedings on INFOCOM, pp. 1-9.
    • (2010) 2010 IEEE Proceedings on INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.