메뉴 건너뛰기




Volumn , Issue , 2013, Pages 610-614

Proof-carrying cloud computation: The case of convex optimization

Author keywords

Cloud Computing; Computation Outsourcing; Convex Optimization; Security

Indexed keywords

CLOUD ENVIRONMENTS; COMPUTATIONAL SAVINGS; COMPUTING RESOURCE; ENGINEERING OPTIMIZATION PROBLEMS; INTEGRITY ASSURANCE; INTEGRITY VERIFICATIONS; OPTIMIZATION PROBLEMS; SECURITY;

EID: 84883084283     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6566845     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 77957312094 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • Cloud Security Alliance, Security guidance for critical areas of focus in cloud computing, 2009, online at http://www.cloudsecurityalliance.org.
    • (2009) Cloud Security Alliance
  • 2
    • 77956624528 scopus 로고    scopus 로고
    • Building customer trust in cloud computing with transparent security
    • Sun Microsystems, Inc., Building customer trust in cloud computing with transparent security, 2009, online at https://www.sun.com/offers/details/sun transparency.xml.
    • (2009) Sun Microsystems Inc
  • 3
    • 84862973844 scopus 로고    scopus 로고
    • Secure and verifiable outsourcing of large-scale biometric computations
    • M. Blanton, Y. Zhang, and K. Frikken, Secure and verifiable outsourcing of large-scale biometric computations, in Proc. of PASSAT, 2011.
    • (2011) Proc. of PASSAT
    • Blanton, M.1    Zhang, Y.2    Frikken, K.3
  • 6
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Springer
    • Y. Lindell and B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries, in Proc. of EUROCRYPT 2007. Springer, 2007, pp. 52-78.
    • (2007) Proc. of EUROCRYPT 2007 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 7
    • 80051894689 scopus 로고    scopus 로고
    • Harnessing the cloud for securely solving large-scale systems of linear equations
    • C. Wang, K. Ren, J. Wang, and K. M. R. Urs, Harnessing the cloud for securely solving large-scale systems of linear equations, in Proc. of ICDCS, 2011.
    • (2011) Proc. of ICDCS
    • Wang, C.1    Ren, K.2    Wang, J.3    Urs, K.M.R.4
  • 8
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • C. Wang, K. Ren, and J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in Proc. of INFOCOM. IEEE, 2011, pp. 820-828.
    • (2011) Proc. of INFOCOM IEEE , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 11
    • 0001168531 scopus 로고
    • Constraint qualifications revisited
    • M. Bazaraa, J. Goode, and C. Shetty, Constraint qualifications revisited, Management Science, vol. 18, no. 9, pp. 567-573, 1972.
    • (1972) Management Science , vol.18 , Issue.9 , pp. 567-573
    • Bazaraa, M.1    Goode, J.2    Shetty, C.3
  • 14
    • 77954521120 scopus 로고    scopus 로고
    • Securely outsourcing linear algebra computations
    • M. Atallah and K. Frikken, Securely outsourcing linear algebra computations, in Proc. of ASIACCS, 2010, pp. 48-59.
    • (2010) Proc. of ASIACCS , pp. 48-59
    • Atallah, M.1    Frikken, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.