-
1
-
-
84881572840
-
Google discloses privacy glitch
-
2012.8.31
-
Jessica E V. Google discloses privacy glitch[OL]. http://blogs.wsj.com/digits/2009/03/08/1214/, 2012.8.31.
-
-
-
Jessica, E.V.1
-
2
-
-
84881577195
-
MediaMax/the linkup: When the cloud fails
-
2012.8.31
-
Michael K. MediaMax/the linkup: when the cloud fails [OL]. http://www.zdnet.com/blog/projectfailures/mediamax-the- linkup-when-the-cloud-fails/999, 2012.8.31.
-
-
-
Michael, K.1
-
3
-
-
71749089487
-
Cloud computing's stormy side
-
2012.8.31
-
Greenberg A. cloud computing's stormy side[OL]. http://www.forbes.com/2008/02/17/web-application- cloud-tech-intel-cx_ag_ 0219cloud.html, 2012.8.31.
-
-
-
Greenberg, A.1
-
7
-
-
84860377061
-
Privacy enhanced data outsourcing in the cloud
-
Zhou Miao, Mu Yi, Susilo W, et al.. Privacy enhanced data outsourcing in the cloud[J]. Journal of Network and Computer Applications, 2012, 35(4): 1367-1373.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.4
, pp. 1367-1373
-
-
Zhou, M.1
Mu, Y.2
Susilo, W.3
-
9
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
New York
-
Chow R, Golle P, Jakobsson M, et al.. Controlling data in the cloud: outsourcing computation without outsourcing control [C]. ACM Workshop on Cloud Computing Security, New York, 2009: 85-90.
-
(2009)
ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
-
10
-
-
71749093343
-
Towards automated security policy enforcement in multi-tenant virtual data centers
-
Cabuk S, Dalton C I, Eriksson K, et al.. Towards automated security policy enforcement in multi-tenant virtual data centers[J]. Journal of Computer Security, 2010, 18(1): 89-121.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.1
, pp. 89-121
-
-
Cabuk, S.1
Dalton, C.I.2
Eriksson, K.3
-
11
-
-
84861470705
-
Executing SQL with preserving privacy on outsourced database using secure coprocessors
-
Ma Sha, Yang Bo, and Li Kang-shun. Executing SQL with preserving privacy on outsourced database using secure coprocessors[J]. Journal of Computational Information Systems, 2012, 8(6): 2387-2400.
-
(2012)
Journal of Computational Information Systems
, vol.8
, Issue.6
, pp. 2387-2400
-
-
Ma, S.1
Yang, B.2
Li, K.-S.3
-
12
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet B. Automatic verification of correspondences for security protocols[J]. Journal of Computer Security, 2009, 17(4): 363-434.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
13
-
-
78149387551
-
Research of platform anonymous identity management based on trusted chip
-
Yu Ai-min, Chu Xiao-bo, and Feng Deng-guo. Research of platform anonymous identity management based on trusted chip[J]. Chinese Journal of Computers, 2010, 33(9): 1703-1712.
-
(2010)
Chinese Journal of Computers
, vol.33
, Issue.9
, pp. 1703-1712
-
-
Yu, A.-M.1
Chu, X.-B.2
Feng, D.-G.3
-
14
-
-
84874532797
-
Remote attestation mechanism of platform configuration based on dynamic Huffman tree
-
Fu Dong-lai, Peng Xin-guang, Chen Gou-xi, et al.. Remote attestation mechanism of platform configuration based on dynamic Huffman tree[J]. Journal of Computer Applications, 2012, 32(8): 2275-2279, 2282.
-
(2012)
Journal of Computer Applications,
, vol.32
, Issue.8
-
-
Fu, D.-L.1
Peng, X.-G.2
Chen, G.-X.3
-
15
-
-
77954674606
-
Design and validation for a remote attestation security protocol
-
Wang Dan, Wei Jin-feng, and Zhou Xiao-dong. Design and validation for a remote attestation security protocol[J]. Journal on Communications, 2009, 30(11A): 29-35.
-
(2009)
Journal on Communications
, vol.30
, Issue.11 A
, pp. 29-35
-
-
Wang, D.1
Wei, J.-F.2
Zhou, X.-D.3
-
16
-
-
77953795310
-
Granite: A scientific database model and implementation
-
University of New Hampshire
-
Rhodes P J. Granite: a scientific database model and implementation[D]. [Ph.D. dissertation], University of New Hampshire, 2004.
-
(2004)
-
-
Rhodes, P.J.1
-
17
-
-
0037266458
-
An efficient implementation of a drug candidate database
-
Miled Z, Liu Y, Powers D, et al.. An efficient implementation of a drug candidate database[J]. Journal of Chemical Information and Computer Sciences, 2003, 43(1): 25-35.
-
(2003)
Journal of Chemical Information and Computer Sciences
, vol.43
, Issue.1
, pp. 25-35
-
-
Miled, Z.1
Liu, Y.2
Powers, D.3
|