-
1
-
-
77950347409
-
A view of cloud computing
-
10.1145/1721654.1721672
-
Armbrust M et al (2010) A view of cloud computing. Commun ACM 53:50-58
-
(2010)
Commun ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
-
2
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
10.1016/j.future.2008.12.001
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25:599-616
-
(2009)
Future Gener Comput Syst
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
4
-
-
63149159223
-
The case for cloud computing
-
March 11
-
Grossman RL (2009) The case for cloud computing. In: IT professional, March, vol 11, pp 23-27
-
(2009)
IT Professional
, pp. 23-27
-
-
Grossman, R.L.1
-
7
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
SIGMOD '02 New York, NY, USA ACM New York 10.1145/564691.564717
-
Hacigümüş H, Iyer B, Li C, Mehrotra S (2002) Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD international conference on management of data, SIGMOD '02, New York, NY, USA. ACM, New York, pp 216-227
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
8
-
-
70349309706
-
-
Piscataway, NJ, USA July 7 IEEE Educational Activities Department
-
Kaufman LM (2009) In: Data security in the world of cloud computing, Piscataway, NJ, USA, July, vol 7, pp 61-64. IEEE Educational Activities Department
-
(2009)
Data Security in the World of Cloud Computing
, pp. 61-64
-
-
Kaufman, L.M.1
-
9
-
-
80053161148
-
Relational cloud: A database service for the cloud
-
Asilomar, CA January
-
Curino C, Jones E, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database service for the cloud. In: 5th biennial conference on innovative data systems research, Asilomar, CA, January
-
(2011)
5th Biennial Conference on Innovative Data Systems Research
-
-
Curino, C.1
Jones, E.2
Popa, R.A.3
Malviya, N.4
Wu, E.5
Madden, S.6
Balakrishnan, H.7
Zeldovich, N.8
-
10
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
CCSW '09 New York, NY, USA ACM New York 10.1145/1655008.1655020
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM workshop on cloud computing security, CCSW '09, New York, NY, USA. ACM, New York, pp 85-90
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
13
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
June 10.1109/ICDCS.2011.55
-
Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st international conference on distributed computing systems (ICDCS), June, pp 383-392
-
(2011)
2011 31st International Conference on Distributed Computing Systems (ICDCS)
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
14
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
June 10.1109/ICDCS.2010.34
-
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th international conference on distributed computing systems (ICDCS), June, pp 253-262
-
(2010)
2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
16
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
10.1145/1127345.1127346
-
Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9:1-30
-
(2006)
ACM Trans Inf Syst Secur
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
17
-
-
84886728452
-
-
Google App Engine - run your web applications on Google's infrastructure
-
Google App Engine - run your web applications on Google's infrastructure
-
-
-
-
18
-
-
84886717385
-
-
Google Docs - create and share your work online
-
Google Docs - create and share your work online
-
-
-
-
19
-
-
84886728749
-
-
Google App Engine - using the datastore
-
Google App Engine - using the datastore
-
-
-
-
24
-
-
84925452156
-
Search-as-a-service: Outsourced search over outsourced storage
-
10.1145/1594173.1594175
-
Singh A, Srivatsa M, Liu L (2009) Search-as-a-service: outsourced search over outsourced storage. ACM Trans Web 3:13:1-13:33
-
(2009)
ACM Trans Web
, vol.3
, pp. 131-1333
-
-
Singh, A.1
Srivatsa, M.2
Liu, L.3
-
27
-
-
77953310709
-
Achieving secure, scalable, and Fine-grained data access control in cloud computing
-
INFOCOM'10 Piscataway, NJ, USA IEEE Press New York
-
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and Fine-grained data access control in cloud computing. In: Proceedings of the 29th conference on information communications, INFOCOM'10, Piscataway, NJ, USA. IEEE Press, New York, pp 534-542
-
(2010)
Proceedings of the 29th Conference on Information Communications
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
30
-
-
3142716056
-
Order preserving encryption for numeric data
-
SIGMOD '04 New York, NY, USA ACM New York 10.1145/1007568.1007632
-
Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data, SIGMOD '04, New York, NY, USA. ACM, New York, pp 563-574
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
|