-
1
-
-
68249129760
-
Above the clouds: a Berkeley view of cloud computing
-
Tech. rep., University of California, Berkeley (February 2009).
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, et al., Above the clouds: a Berkeley view of cloud computing. Tech. rep., University of California, Berkeley (February 2009).
-
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
-
2
-
-
84856090651
-
The nist definition of cloud computing.
-
The nist definition of cloud computing. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc.
-
-
-
-
4
-
-
0004320806
-
The health insurance portability and accountability act of 1996 (hipaa)
-
(accessed October, 2011).
-
The health insurance portability and accountability act of 1996 (hipaa)., 1996, (accessed October, 2011). http://www.hhs.gov/ocr/privacy/.
-
(1996)
-
-
-
5
-
-
77955193464
-
-
Ristenpart T., Tromer E., Shacham H., Savage S. Hey, you, get offof my cloud: exploring information leakage in third-party compute clouds November 2009.
-
(2009)
Hey, you, get offof my cloud: exploring information leakage in third-party compute clouds
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
6
-
-
34547941727
-
Introducing Blue Pill
-
(accessed October, 2011).
-
Introducing Blue Pill., (accessed October, 2011). http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.htm l.
-
-
-
-
7
-
-
84884000101
-
Blue Pill (malware)
-
(accessed October, 2011).
-
Blue Pill (malware)., (accessed October, 2011). http://en.wikipedia.org/wiki/Blue_Pill_(malware).
-
-
-
-
23
-
-
84870514331
-
Homomorphic Encryption
-
(accessed October, 2011).
-
Homomorphic Encryption. (accessed October, 2011). http://en.wikipedia.org/wiki/Homomorphic_encryption.
-
-
-
-
25
-
-
77649261628
-
A fully homomorphic encryption scheme
-
PhD Thesis.
-
C. Gentry, A fully homomorphic encryption scheme (2009), PhD Thesis.
-
(2009)
-
-
Gentry, C.1
-
27
-
-
79960907469
-
K-Anonymity
-
Springer-Verlag, T. Yu, S. Jajodia (Eds.)
-
Ciriani V., De Capitani di Vimercati S., Foresti S., Samarati P. k-Anonymity. Secure Data Management in Decentralized Systems 2007, Springer-Verlag. T. Yu, S. Jajodia (Eds.).
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
29
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati P. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 2001, 13(6):1010-1027.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
31
-
-
84884069293
-
-
Emc, information-centric security, (accessed October, 2011)
-
Emc, information-centric security, (accessed October, 2011). http://www.idc.pt/resources/PPTs/2007/IT&Internet_Security/12.EMC.pd f.
-
-
-
-
34
-
-
84883952780
-
Hash Tree
-
(accessed October, 2011).
-
Hash Tree., (accessed October, 2011). http://en.wikipedia.org/wiki/Hash_tree.
-
-
-
-
36
-
-
60349119580
-
-
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D. Provable data possession at untrusted stores October 2007.
-
(2007)
Provable data possession at untrusted stores
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
40
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. Cryptology 2004, 17(4):297-319.
-
(2004)
Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
46
-
-
21144450607
-
Role Based Access Control
-
(accessed October, 2011).
-
Role Based Access Control. (accessed October, 2011). http://csrc.nist.gov/rbac/rbac-std-ncits.pdf.
-
-
-
-
51
-
-
77953310709
-
-
Yu S., Wang C., Ren K., Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing March 2010.
-
(2010)
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
54
-
-
85046650967
-
The HIPAA privacy rule and electronic health information exchange in a networked environment: individual choice
-
(accessed October, 2011).
-
The HIPAA privacy rule and electronic health information exchange in a networked environment: individual choice. 2008, (accessed October, 2011). http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/indi vidualchoice.pdf.
-
(2008)
-
-
-
55
-
-
84860929188
-
Federal Information Security Management Act
-
(accessed October, 2011).
-
Federal Information Security Management Act. (accessed October, 2011). http://csrc.nist.gov/drivers/documents/FISMA-final.pdf.
-
-
-
-
56
-
-
1342336867
-
Sarbanes-Oxley Act
-
(accessed October, 2011).
-
Sarbanes-Oxley Act. (accessed October, 2011). http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act.
-
-
-
-
57
-
-
84873359496
-
SAS 70 Overview
-
(accessed October, 2011).
-
SAS 70 Overview. ,(accessed October, 2011). http://sas70.com/sas70_overview.html.
-
-
-
-
58
-
-
70349752533
-
Amazon Web Services
-
(accessed October, 2011).
-
Amazon Web Services., (accessed October, 2011). http://aws.amazon.com.
-
-
-
-
59
-
-
84870639734
-
Microsoft Azure
-
(accessed October, 2011).
-
Microsoft Azure. (accessed October, 2011). http://www.microsoft.com/windowsazure.
-
-
-
-
60
-
-
77957936026
-
Google App Engine
-
(accessed October, 2011).
-
Google App Engine. (accessed October, 2011). http://code.google.com/appengine.
-
-
-
-
61
-
-
70349752533
-
Amazon Web Services: Overview of Security Processes
-
(accessed October, 2011).
-
Amazon Web Services: Overview of Security Processes., (accessed October, 2011). http://awsmedia.s3.amazonaws.com/pdf/AWS_Security_Whitepaper.pdf.
-
-
-
-
63
-
-
84884053694
-
Security Whitepaper: Google Apps Messaging and Collaboration Products
-
(accessed October, 2011).
-
Security Whitepaper: Google Apps Messaging and Collaboration Products. (accessed October, 2011). http://static.googleusercontent.com/external_content/untrusted_dlcp/www. google.com/en/us/a/help/intl/en-GB/admins/pdf/ds_gsa_apps_whitepaper_020 7.pdf.
-
-
-
|