메뉴 건너뛰기




Volumn 35, Issue 7, 2013, Pages 1766-1773

Trusted platform module-based scheme for secure access to outsourced data

Author keywords

Access control; Cloud computing; Data outsourcing; Trusted computing

Indexed keywords

AUTOMATED REASONING TOOLS; COMPUTER ENVIRONMENTS; DATA OUTSOURCING; KEY MANAGEMENT SCHEMES; OUTSOURCED DATUM; TRUSTED COMPUTING; TRUSTED PLATFORM MODULE; TRUSTED PLATFORMS;

EID: 84881582001     PISSN: 10095896     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1146.2012.01321     Document Type: Article
Times cited : (8)

References (17)
  • 1
    • 84881572840 scopus 로고    scopus 로고
    • Google discloses privacy glitch
    • 2012.8.31
    • Jessica E V. Google discloses privacy glitch[OL]. http://blogs.wsj.com/digits/2009/03/08/1214/, 2012.8.31.
    • Jessica, E.V.1
  • 2
    • 84881577195 scopus 로고    scopus 로고
    • MediaMax/the linkup: When the cloud fails
    • 2012.8.31
    • Michael K. MediaMax/the linkup: when the cloud fails [OL]. http://www.zdnet.com/blog/projectfailures/mediamax-the- linkup-when-the-cloud-fails/999, 2012.8.31.
    • Michael, K.1
  • 3
    • 71749089487 scopus 로고    scopus 로고
    • Cloud computing's stormy side
    • 2012.8.31
    • Greenberg A. cloud computing's stormy side[OL]. http://www.forbes.com/2008/02/17/web-application- cloud-tech-intel-cx_ag_ 0219cloud.html, 2012.8.31.
    • Greenberg, A.1
  • 9
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: Outsourcing computation without outsourcing control
    • New York
    • Chow R, Golle P, Jakobsson M, et al.. Controlling data in the cloud: outsourcing computation without outsourcing control [C]. ACM Workshop on Cloud Computing Security, New York, 2009: 85-90.
    • (2009) ACM Workshop on Cloud Computing Security , pp. 85-90
    • Chow, R.1    Golle, P.2    Jakobsson, M.3
  • 10
    • 71749093343 scopus 로고    scopus 로고
    • Towards automated security policy enforcement in multi-tenant virtual data centers
    • Cabuk S, Dalton C I, Eriksson K, et al.. Towards automated security policy enforcement in multi-tenant virtual data centers[J]. Journal of Computer Security, 2010, 18(1): 89-121.
    • (2010) Journal of Computer Security , vol.18 , Issue.1 , pp. 89-121
    • Cabuk, S.1    Dalton, C.I.2    Eriksson, K.3
  • 11
    • 84861470705 scopus 로고    scopus 로고
    • Executing SQL with preserving privacy on outsourced database using secure coprocessors
    • Ma Sha, Yang Bo, and Li Kang-shun. Executing SQL with preserving privacy on outsourced database using secure coprocessors[J]. Journal of Computational Information Systems, 2012, 8(6): 2387-2400.
    • (2012) Journal of Computational Information Systems , vol.8 , Issue.6 , pp. 2387-2400
    • Ma, S.1    Yang, B.2    Li, K.-S.3
  • 12
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet B. Automatic verification of correspondences for security protocols[J]. Journal of Computer Security, 2009, 17(4): 363-434.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 13
    • 78149387551 scopus 로고    scopus 로고
    • Research of platform anonymous identity management based on trusted chip
    • Yu Ai-min, Chu Xiao-bo, and Feng Deng-guo. Research of platform anonymous identity management based on trusted chip[J]. Chinese Journal of Computers, 2010, 33(9): 1703-1712.
    • (2010) Chinese Journal of Computers , vol.33 , Issue.9 , pp. 1703-1712
    • Yu, A.-M.1    Chu, X.-B.2    Feng, D.-G.3
  • 14
    • 84874532797 scopus 로고    scopus 로고
    • Remote attestation mechanism of platform configuration based on dynamic Huffman tree
    • Fu Dong-lai, Peng Xin-guang, Chen Gou-xi, et al.. Remote attestation mechanism of platform configuration based on dynamic Huffman tree[J]. Journal of Computer Applications, 2012, 32(8): 2275-2279, 2282.
    • (2012) Journal of Computer Applications, , vol.32 , Issue.8
    • Fu, D.-L.1    Peng, X.-G.2    Chen, G.-X.3
  • 15
    • 77954674606 scopus 로고    scopus 로고
    • Design and validation for a remote attestation security protocol
    • Wang Dan, Wei Jin-feng, and Zhou Xiao-dong. Design and validation for a remote attestation security protocol[J]. Journal on Communications, 2009, 30(11A): 29-35.
    • (2009) Journal on Communications , vol.30 , Issue.11 A , pp. 29-35
    • Wang, D.1    Wei, J.-F.2    Zhou, X.-D.3
  • 16
    • 77953795310 scopus 로고    scopus 로고
    • Granite: A scientific database model and implementation
    • University of New Hampshire
    • Rhodes P J. Granite: a scientific database model and implementation[D]. [Ph.D. dissertation], University of New Hampshire, 2004.
    • (2004)
    • Rhodes, P.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.