메뉴 건너뛰기




Volumn , Issue , 2012, Pages 389-410

Data security in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84884004936     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-415815-3.00015-7     Document Type: Chapter
Times cited : (14)

References (63)
  • 1
    • 68249129760 scopus 로고    scopus 로고
    • Above the clouds: a Berkeley view of cloud computing
    • Tech. rep., University of California, Berkeley (February 2009).
    • M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, et al., Above the clouds: a Berkeley view of cloud computing. Tech. rep., University of California, Berkeley (February 2009).
    • Armbrust, M.1    Fox, A.2    Griffith, R.3    Joseph, A.D.4    Katz, R.H.5    Konwinski, A.6
  • 2
    • 84856090651 scopus 로고    scopus 로고
    • The nist definition of cloud computing.
    • The nist definition of cloud computing. http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc.
  • 4
    • 0004320806 scopus 로고    scopus 로고
    • The health insurance portability and accountability act of 1996 (hipaa)
    • (accessed October, 2011).
    • The health insurance portability and accountability act of 1996 (hipaa)., 1996, (accessed October, 2011). http://www.hhs.gov/ocr/privacy/.
    • (1996)
  • 6
    • 34547941727 scopus 로고    scopus 로고
    • Introducing Blue Pill
    • (accessed October, 2011).
    • Introducing Blue Pill., (accessed October, 2011). http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.htm l.
  • 7
    • 84884000101 scopus 로고    scopus 로고
    • Blue Pill (malware)
    • (accessed October, 2011).
    • Blue Pill (malware)., (accessed October, 2011). http://en.wikipedia.org/wiki/Blue_Pill_(malware).
  • 23
    • 84870514331 scopus 로고    scopus 로고
    • Homomorphic Encryption
    • (accessed October, 2011).
    • Homomorphic Encryption. (accessed October, 2011). http://en.wikipedia.org/wiki/Homomorphic_encryption.
  • 25
    • 77649261628 scopus 로고    scopus 로고
    • A fully homomorphic encryption scheme
    • PhD Thesis.
    • C. Gentry, A fully homomorphic encryption scheme (2009), PhD Thesis.
    • (2009)
    • Gentry, C.1
  • 29
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati P. Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 2001, 13(6):1010-1027.
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 31
    • 84884069293 scopus 로고    scopus 로고
    • Emc, information-centric security, (accessed October, 2011)
    • Emc, information-centric security, (accessed October, 2011). http://www.idc.pt/resources/PPTs/2007/IT&Internet_Security/12.EMC.pd f.
  • 34
    • 84883952780 scopus 로고    scopus 로고
    • Hash Tree
    • (accessed October, 2011).
    • Hash Tree., (accessed October, 2011). http://en.wikipedia.org/wiki/Hash_tree.
  • 40
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. Cryptology 2004, 17(4):297-319.
    • (2004) Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 46
    • 21144450607 scopus 로고    scopus 로고
    • Role Based Access Control
    • (accessed October, 2011).
    • Role Based Access Control. (accessed October, 2011). http://csrc.nist.gov/rbac/rbac-std-ncits.pdf.
  • 54
    • 85046650967 scopus 로고    scopus 로고
    • The HIPAA privacy rule and electronic health information exchange in a networked environment: individual choice
    • (accessed October, 2011).
    • The HIPAA privacy rule and electronic health information exchange in a networked environment: individual choice. 2008, (accessed October, 2011). http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/indi vidualchoice.pdf.
    • (2008)
  • 55
    • 84860929188 scopus 로고    scopus 로고
    • Federal Information Security Management Act
    • (accessed October, 2011).
    • Federal Information Security Management Act. (accessed October, 2011). http://csrc.nist.gov/drivers/documents/FISMA-final.pdf.
  • 56
    • 1342336867 scopus 로고    scopus 로고
    • Sarbanes-Oxley Act
    • (accessed October, 2011).
    • Sarbanes-Oxley Act. (accessed October, 2011). http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act.
  • 57
    • 84873359496 scopus 로고    scopus 로고
    • SAS 70 Overview
    • (accessed October, 2011).
    • SAS 70 Overview. ,(accessed October, 2011). http://sas70.com/sas70_overview.html.
  • 58
    • 70349752533 scopus 로고    scopus 로고
    • Amazon Web Services
    • (accessed October, 2011).
    • Amazon Web Services., (accessed October, 2011). http://aws.amazon.com.
  • 59
    • 84870639734 scopus 로고    scopus 로고
    • Microsoft Azure
    • (accessed October, 2011).
    • Microsoft Azure. (accessed October, 2011). http://www.microsoft.com/windowsazure.
  • 60
    • 77957936026 scopus 로고    scopus 로고
    • Google App Engine
    • (accessed October, 2011).
    • Google App Engine. (accessed October, 2011). http://code.google.com/appengine.
  • 61
    • 70349752533 scopus 로고    scopus 로고
    • Amazon Web Services: Overview of Security Processes
    • (accessed October, 2011).
    • Amazon Web Services: Overview of Security Processes., (accessed October, 2011). http://awsmedia.s3.amazonaws.com/pdf/AWS_Security_Whitepaper.pdf.
  • 63
    • 84884053694 scopus 로고    scopus 로고
    • Security Whitepaper: Google Apps Messaging and Collaboration Products
    • (accessed October, 2011).
    • Security Whitepaper: Google Apps Messaging and Collaboration Products. (accessed October, 2011). http://static.googleusercontent.com/external_content/untrusted_dlcp/www. google.com/en/us/a/help/intl/en-GB/admins/pdf/ds_gsa_apps_whitepaper_020 7.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.