-
4
-
-
34547196300
-
A protocol for property-based attestation
-
ACM
-
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, and C. Stüble A protocol for property-based attestation Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06) 2006 ACM pp. 7-16
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06)
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
6
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
M. Christodorescu, R. Sailer, D.L. Schales, D. Sgandurra, and D. Zamboni Cloud security is not (just) virtualization security: a short paper Proceedings of the 2009 ACM Workshop on Cloud Computing Security 2009 pp. 97-102
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
7
-
-
79952065844
-
-
Cloud Security Alliance
-
Cloud Security Alliance, 2010. Top threats to cloud computing v1.0. http://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
-
(2010)
Top Threats to Cloud Computing v1.0
-
-
-
10
-
-
84881470615
-
-
Discovers method to fully process encrypted data without knowing its content; could greatly further data privacy and strengthen cloud computing security
-
IBM researcher solves longstanding cryptographic challenge. Discovers method to fully process encrypted data without knowing its content; could greatly further data privacy and strengthen cloud computing security. http://www-03.ibm.com/press/us/en/pressrelease/27840.wss.
-
IBM Researcher Solves Longstanding Cryptographic Challenge
-
-
-
11
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
J.M. McCune, B. Parno, A. Perrig, M.K. Reiter, and H. Isozaki Flicker: an execution infrastructure for TCB minimization Proceedings of the ACM European Conference in Computer Systems (EuroSys), April 2008
-
(2008)
Proceedings of the ACM European Conference in Computer Systems (EuroSys), April
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
12
-
-
77955186544
-
Trustvisor: Efficient TCB reduction and attestation
-
J.M. McCune, N. Qu, Y. Li, A. Datta, V.D. Gligor, and A. Perrig Trustvisor: efficient TCB reduction and attestation Proceedings of the IEEE Symposium on Security and Privacy 2010 http://people.csail.mit.edu/costan/ readings/oakland-papers/CMUCylab09003.pdf
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Qu, N.2
Li, Y.3
Datta, A.4
Gligor, V.D.5
Perrig, A.6
-
14
-
-
70349732504
-
-
Technical report
-
Nurmi, D.; Wolski, R.; Grzegorczyk, C.; Obertelli, G.; Soman, S.; Youseff, L.; Zagorodnov, D.; 2008. Eucalyptus: a technical report on an elastic utility computing architecture linking your programs to useful systems. Technical report.
-
(2008)
Eucalyptus: A Technical Report on An Elastic Utility Computing Architecture Linking Your Programs to Useful Systems
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
15
-
-
84865653421
-
CryptDB: Processing queries on an encrypted database
-
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan CryptDB: processing queries on an encrypted database Communications of the ACM 55 9 2012 103 111
-
(2012)
Communications of the ACM
, vol.55
, Issue.9
, pp. 103-111
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
16
-
-
78650837743
-
Cloud computing privacy concerns on our doorstep
-
M.D. Ryan Cloud computing privacy concerns on our doorstep Communications of the ACM 54 1 2011 36 38
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 36-38
-
-
Ryan, M.D.1
-
17
-
-
77955860144
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Springer
-
N.P. Smart, and F. Vercauteren Fully homomorphic encryption with relatively small key and ciphertext sizes Public Key Cryptography (PKC 2010) 2010 Springer
-
(2010)
Public Key Cryptography (PKC 2010)
-
-
Smart, N.P.1
Vercauteren, F.2
-
18
-
-
84881429662
-
-
Trusted Computing Group
-
Trusted Computing Group, 2007. TPM Specification version 1.2. Parts 1-3. http://www.trustedcomputinggroup.org/resources/tpm-main-specification.
-
(2007)
TPM Specification Version 1.2
, Issue.PARTS 1-3
-
-
|