-
1
-
-
24944574585
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications)
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). Official Journal of the European Union (L201), 0037-0047 (2002)
-
(2002)
Official Journal of the European Union
, Issue.L201
, pp. 0037-0047
-
-
-
4
-
-
77957936026
-
-
July
-
Google App Engine (July 2012), https://developers.google.com/appengine/
-
(2012)
Google App Engine
-
-
-
5
-
-
70349950116
-
-
July
-
Google Docs (July 2012), http://docs.google.com
-
(2012)
Google Docs
-
-
-
6
-
-
84883370239
-
-
Trusted GRUB website July
-
Trusted GRUB website (July 2012), http://projects.sirrix.com/trac/ trustedgrub
-
(2012)
-
-
-
7
-
-
84883408327
-
-
website July
-
Xen website (July 2012), http://xen.org/
-
(2012)
-
-
-
8
-
-
79957737703
-
Managing data access on clouds: A generic framework for enforcing security policies
-
IEEE Computer Society
-
Basescu, C., Carpen-Amarie, A., Leordeanu, C., Costan, A., Antoniu, G.: Managing data access on clouds: A generic framework for enforcing security policies. In: AINA, pp. 459-466. IEEE Computer Society (2011)
-
(2011)
AINA
, pp. 459-466
-
-
Basescu, C.1
Carpen-Amarie, A.2
Leordeanu, C.3
Costan, A.4
Antoniu, G.5
-
9
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
ACM
-
Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 400-409. ACM (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
10
-
-
39349094046
-
Pharos: A decentralized and hierarchical network coordinate system for internet distance prediction
-
Chen, Y., Xiong, Y., Shi, X., Deng, B., Li, X.: Pharos: A decentralized and hierarchical network coordinate system for internet distance prediction. In: GLOBECOM, pp. 421-426 (2007)
-
(2007)
GLOBECOM
, pp. 421-426
-
-
Chen, Y.1
Xiong, Y.2
Shi, X.3
Deng, B.4
Li, X.5
-
11
-
-
21844440623
-
Vivaldi: A decentralized network coordinate system
-
Dabek, F., Cox, R., Kaashoek, F., Morris, R.: Vivaldi: A decentralized network coordinate system. In: SIGCOMM, pp. 15-26 (2004)
-
(2004)
SIGCOMM
, pp. 15-26
-
-
Dabek, F.1
Cox, R.2
Kaashoek, F.3
Morris, R.4
-
12
-
-
78649245892
-
-
ENISA. Technical report, European Network and Information Security Agency, ENISA
-
ENISA. Cloud computing security risk assessment. Technical report, European Network and Information Security Agency, ENISA (2009)
-
(2009)
Cloud Computing Security Risk Assessment
-
-
-
13
-
-
34948877584
-
The canadian response to the USA Patriot Act
-
Fraser, D.: The canadian response to the USA Patriot Act. IEEE Security Privacy 5(5), 66-68 (2007)
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.5
, pp. 66-68
-
-
Fraser, D.1
-
16
-
-
80052402569
-
Enforcing policy and data consistency of cloud transactions
-
IEEE Computer Society, Washington, DC
-
Iskander, M.K., Wilkinson, D.W., Lee, A.J., Chrysanthis, P.K.: Enforcing policy and data consistency of cloud transactions. In: Proceedings of the Second International Workshop on Security and Privacy in Cloud Computing, ICDCS-SPCC 2011. IEEE Computer Society, Washington, DC (2011)
-
(2011)
Proceedings of the Second International Workshop on Security and Privacy in Cloud Computing, ICDCS-SPCC 2011
-
-
Iskander, M.K.1
Wilkinson, D.W.2
Lee, A.J.3
Chrysanthis, P.K.4
-
18
-
-
84880237695
-
A position paper on data sovereignty: The importance of geolocating data in the cloud
-
Peterson, Z.N.J., Gondree, M., Beverly, R.: A position paper on data sovereignty: the importance of geolocating data in the cloud. In: Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing, HotCloud 2011 (2011)
-
(2011)
Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing, HotCloud 2011
-
-
Peterson, Z.N.J.1
Gondree, M.2
Beverly, R.3
-
19
-
-
84856349455
-
Verification of data location in cloud networking
-
IEEE Computer Society
-
Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Proceedings of the First International Workshop on Cloud Service Quality Measurement and Comparison, CSQMC 2011. IEEE Computer Society (2011)
-
(2011)
Proceedings of the First International Workshop on Cloud Service Quality Measurement and Comparison, CSQMC 2011
-
-
Ries, T.1
Fusenig, V.2
Vilbois, C.3
Engel, T.4
-
20
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the 13th Usenix Security Symposium (2004)
-
Proceedings of the 13th Usenix Security Symposium (2004)
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
21
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
84864868892
-
-
Trusted Computing Group. Technical report, Trusted Computing Group
-
Trusted Computing Group. Cloud computing and security - a natural match. Technical report, Trusted Computing Group (2010)
-
(2010)
Cloud Computing and Security - A Natural Match
-
-
-
23
-
-
80053625618
-
-
Trusted Computing Group
-
Trusted Computing Group. TPM Main Specification (2011)
-
(2011)
TPM Main Specification
-
-
-
24
-
-
79952021726
-
Encryption-based policy enforcement for cloud storage
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. In: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, ICDCSW 2010, pp. 42-51 (2010)
-
(2010)
Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, ICDCSW 2010
, pp. 42-51
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Pelosi, G.5
Samarati, P.6
-
25
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society, Washington, DC
-
Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982, pp. 160-164. IEEE Computer Society, Washington, DC (1982)
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982
, pp. 160-164
-
-
Yao, A.C.1
|