메뉴 건너뛰기




Volumn 4, Issue 4, 2013, Pages 265-277

A privacy-friendly architecture for future cloud computing

Author keywords

Anonymous payment; Digital rights management; Future cloud computing; Privacy protection

Indexed keywords

CLOUD COMPUTING; COMPUTER ARCHITECTURE; CRYPTOGRAPHY;

EID: 84886912082     PISSN: 1741847X     EISSN: 17418488     Source Type: Journal    
DOI: 10.1504/IJGUC.2013.057120     Document Type: Article
Times cited : (36)

References (22)
  • 3
    • 85174220922 scopus 로고    scopus 로고
    • The basic economic theory of copying
    • Digital Rights Management Technological, Economic, Legal and Political Aspects
    • Bauckhage, T. (2003) 'The basic economic theory of copying', in Becker, E., Buhse, W., Gunnewig, D. and Rump, N. (Eds): Digital Rights Management - Technological, Economic, Legal and Political Aspects, Springer, Vol. 2770, pp.234-249. (Pubitemid 37434467)
    • (2003) Lecture Notes in Computer Science , Issue.2770 , pp. 234-249
    • Bauckhage, T.1
  • 5
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • Chaum, D. (1985) 'Security without identification: transaction systems to make big brother obsolete', Communications of the ACM, Vol. 28, No. 10, pp.1030-1044. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 6
  • 7
    • 0003975349 scopus 로고
    • Directive 95/46/EC (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, November, No. L 281/31
    • Directive 95/46/EC (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Official Journal of the European Communities, November 1995, No. L 281/31.
    • (1995) Official Journal of the European Communities
  • 12
  • 16
    • 84871374598 scopus 로고    scopus 로고
    • Proxy re-encryption in a privacy-preserving cloud computing DRM scheme
    • Xiang, Y., Lopez, J. and Kuo, C-C.J. (Eds)
    • Petrlic, R. (2012b) 'Proxy re-encryption in a privacy-preserving cloud computing DRM scheme', in Xiang, Y., Lopez, J. and Kuo, C-C.J. (Eds): Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Vol. 7672, pp.194-211.
    • (2012) Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012) , vol.7672 , pp. 194-211
    • Petrlic, R.1
  • 18
    • 0242426092 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • Federrath, H. (Ed.)
    • Pfitzmann, A. and Kohntopp, M. (2009) 'Anonymity, unobservability, and pseudonymity - a proposal for terminology', in Federrath, H. (Ed.): Workshop on Design Issues in Anonymity and Unobservability, Vol. 2009, pp.1-9.
    • (2009) Workshop on Design Issues in Anonymity and Unobservability , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Kohntopp, M.2
  • 20
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • Rivest, R.L., Shamir, A. and Adleman, L. (1978) 'A method for obtaining digital signatures and publickey cryptosystems', Communications of the ACM, Vol. 21, No. 2, pp.120-126. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A. (1979) 'How to share a secret', Communications of the ACM, Vol. 22, No. 11, pp.612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.