-
1
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop (GCE 2008), Austin, Texas, pp. 1-10 (2008)
-
(2008)
Grid Computing Environments Workshop (GCE 2008), Austin, Texas
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
2
-
-
68649086619
-
-
version 3.0., (accessed July 20, 2012)
-
Alliance, C.S.: Security guidance for critical areas of cloud computing version 3.0., https://cloudsecurityalliance.org/research/securityguidance/ (accessed July 20, 2012)
-
Security Guidance for Critical Areas of Cloud Computing
-
-
-
3
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Proceedings of the 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, China, pp. 157-166 (2009)
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing (CloudCom 2009), Beijing, China
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
4
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. Springer, Heidelberg
-
Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 167-177. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5931
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
5
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), New York, NY, USA, pp. 735-737 (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), New York, NY, USA
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
6
-
-
77954051808
-
-
15 ed. (accessed July 20, 2012)
-
Grance, P.M.T.: The nist definition of cloud computing (15 ed.) National Institute of Standards and Technology (NIST), http://csrc.nist.gov/groups/SNS/ cloud-computing (accessed July 20, 2012)
-
The Nist Definition of Cloud Computing
-
-
Grance, P.M.T.1
-
7
-
-
77954051808
-
-
(Draft). accessed July 20, 2012
-
Grance, P.M.T.: The NIST Definition of Cloud Computing (Draft). National Institute of Standards and Technology (NIST), http://csrc.nist.gov/publications/ drafts/800-145/Draft-SP-800-145-cloud-definition.pdf (accessed July 20, 2012)
-
The NIST Definition of Cloud Computing
-
-
Grance, P.M.T.1
-
8
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
9
-
-
78349299500
-
-
Information Security for South Africa (ISSA). University of Johannesburg, Johannesburg, South Africa
-
Ramgovind, S., Eloff, M., Smith, E.: The management of security in cloud computing. Information Security for South Africa (ISSA). University of Johannesburg, Johannesburg, South Africa, pp.1-7 (2010)
-
(2010)
The Management of Security in Cloud Computing
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.2
Smith, E.3
-
10
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
11
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
13
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
14
-
-
84863081471
-
Efficient identity-based key management for configurable hierarchical cloud computing environment
-
December
-
Huang, J.-Y., Liao, I.-E., Chiang, C.-K.: Efficient identity-based key management for configurable hierarchical cloud computing environment. In: IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011), Tainan, Taiwan, pp. 883-887 (December 2011)
-
(2011)
IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011), Tainan, Taiwan
, pp. 883-887
-
-
Huang, J.-Y.1
Liao, I.-E.2
Chiang, C.-K.3
-
15
-
-
80054993681
-
An efficient role based access control system for cloud computing
-
Tianyi, Z., Weidong, L., Jiaxing, S.: An efficient role based access control system for cloud computing. In: IEEE 11th International Conference on Computer and Information Technology (CIT), pp. 97-102 (2011)
-
(2011)
IEEE 11th International Conference on Computer and Information Technology (CIT)
, pp. 97-102
-
-
Tianyi, Z.1
Weidong, L.2
Jiaxing, S.3
-
17
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
18
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, New York, NY, USA, pp. 89-98 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, New York, NY, USA
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
19
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, Washington, DC, USA, pp. 321-334 (2007)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP 2007, Washington, DC, USA
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
20
-
-
84883395507
-
-
CertiVox.: MIRACL Crypto SDK, http://certivox.com/index.php/solutions/ miracl-crypto-sdk/
-
MIRACL Crypto SDK
-
-
|