-
1
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, USA
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. (2009) Above the Clouds: A Berkeley View of Cloud Computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, USA.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M. and Hohenberger, S. (2006) 'Improved proxy re-encryption schemes with applications to secure distributed storage', ACM Transactions on Information and System Security, Vol. 9, No. 1, pp.1-30.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
85174220922
-
The basic economic theory of copying
-
Digital Rights Management Technological, Economic, Legal and Political Aspects
-
Bauckhage, T. (2003) 'The basic economic theory of copying', in Becker, E., Buhse, W., Gunnewig, D. and Rump, N. (Eds): Digital Rights Management - Technological, Economic, Legal and Political Aspects, Springer, Vol. 2770, pp.234-249. (Pubitemid 37434467)
-
(2003)
Lecture Notes in Computer Science
, Issue.2770
, pp. 234-249
-
-
Bauckhage, T.1
-
4
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.25, 1540992, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
Castelluccia, C., Mykletun, E. and Tsudik, G. (2005) 'Efficient aggregation of encrypted data in wireless sensor networks', 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, 17-21 July, San Diego, CA, USA, pp.109-117. (Pubitemid 44523269)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
5
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
Chaum, D. (1985) 'Security without identification: transaction systems to make big brother obsolete', Communications of the ACM, Vol. 28, No. 10, pp.1030-1044. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
6
-
-
33750274436
-
Privacy-preserving digital rights management
-
Conrado, C., Petkovic, M. and Jonker, W. (2004) 'Privacy-preserving digital rights management', Secure Data Management, Vol. 3178, pp.83-99
-
(2004)
, Secure Data Management
, vol.3178
, pp. 83-99
-
-
Conrado, C.1
Petkovic, M.2
Jonker, W.3
-
7
-
-
0003975349
-
-
Directive 95/46/EC (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, November, No. L 281/31
-
Directive 95/46/EC (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Official Journal of the European Communities, November 1995, No. L 281/31.
-
(1995)
Official Journal of the European Communities
-
-
-
8
-
-
4243136065
-
Fair use, DRM, and trusted computing
-
Erickson, J.S. (2003) 'Fair use, DRM, and trusted computing', Communications of the ACM - Digital Rights Management, Vol. 46, No. 4, pp.34-39.
-
(2003)
Communications of the ACM - Digital Rights Management
, vol.46
, Issue.4
, pp. 34-39
-
-
Erickson, J.S.1
-
10
-
-
84876001614
-
Towards practical privacy-preserving digital rights management for cloud computing
-
11-14 January, Las Vegas, NV, USA
-
Joshi, N. and Petrlic, R. (2013) 'Towards practical privacy-preserving digital rights management for cloud computing', Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013), 11-14 January, Las Vegas, NV, USA, pp.265-270.
-
(2013)
Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013)
, pp. 265-270
-
-
Joshi, N.1
Petrlic, R.2
-
11
-
-
70350159316
-
-
National Institute of Standards and Technology
-
McCallister, E., Grance, T. and Scarfone, K. (2010) 'Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), National Institute of Standards and Technology, pp.800-122.
-
(2010)
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
, pp. 800-122
-
-
McCallister, E.1
Grance, T.2
Scarfone, K.3
-
12
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST) , NIST
-
National Institute of Standards and Technology (NIST) (2001) Advanced Encryption Standard (AES) (FIPS PUB 197), NIST.
-
(2001)
Advanced Encryption Standard (AES) (FIPS PUB 197)
-
-
-
13
-
-
70349836055
-
Taking account of privacy when designing cloud computing services
-
23 May, Vancouver, BC, USA
-
Pearson, S. (2009) 'Taking account of privacy when designing cloud computing services', Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD'09, 23 May, Vancouver, BC, USA, pp.44-52.
-
(2009)
Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD'09
, pp. 44-52
-
-
Pearson, S.1
-
14
-
-
77953963918
-
Privacypreserving DRM
-
Perlman, R., Kaufman, C. and Perlner, R. (2010) 'Privacypreserving DRM', Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST'10, pp.69-83.
-
(2010)
Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST'10
, pp. 69-83
-
-
Perlman, R.1
Kaufman, C.2
Perlner, R.3
-
16
-
-
84871374598
-
Proxy re-encryption in a privacy-preserving cloud computing DRM scheme
-
Xiang, Y., Lopez, J. and Kuo, C-C.J. (Eds)
-
Petrlic, R. (2012b) 'Proxy re-encryption in a privacy-preserving cloud computing DRM scheme', in Xiang, Y., Lopez, J. and Kuo, C-C.J. (Eds): Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Vol. 7672, pp.194-211.
-
(2012)
Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012)
, vol.7672
, pp. 194-211
-
-
Petrlic, R.1
-
17
-
-
84860725458
-
Privacy-preserving DRM for cloud computing
-
26-29 March, Fukuoka
-
Petrlic, R. and Sorge, C. (2012) 'Privacy-preserving DRM for cloud computing', Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 26-29 March, Fukuoka, pp.1286-1291.
-
(2012)
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops
, pp. 1286-1291
-
-
Petrlic, R.1
Sorge, C.2
-
18
-
-
0242426092
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
Federrath, H. (Ed.)
-
Pfitzmann, A. and Kohntopp, M. (2009) 'Anonymity, unobservability, and pseudonymity - a proposal for terminology', in Federrath, H. (Ed.): Workshop on Design Issues in Anonymity and Unobservability, Vol. 2009, pp.1-9.
-
(2009)
Workshop on Design Issues in Anonymity and Unobservability
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
19
-
-
71049135827
-
DRM, trusted computing and operating system architecture
-
Reid, J.F. and Caelli, W.J. (2005) 'DRM, trusted computing and operating system architecture', In Proceedings of the 2005 Australasian Workshop on Grid Computing and E-Research, Darlinghurst, Australia, Vol. 44, pp.127-136.
-
(2005)
, in Proceedings of the 2005 Australasian Workshop on Grid Computing and E-Research, Darlinghurst, Australia
, vol.44
, pp. 127-136
-
-
Reid, J.F.1
Caelli, W.J.2
-
20
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
Rivest, R.L., Shamir, A. and Adleman, L. (1978) 'A method for obtaining digital signatures and publickey cryptosystems', Communications of the ACM, Vol. 21, No. 2, pp.120-126. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) 'How to share a secret', Communications of the ACM, Vol. 22, No. 11, pp.612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
67649930533
-
-
Technical Report, Trinity College, Dublin
-
Tewari, H., O'Mahony, D. and Peirce, M. (1998) Reusable Off-line Electronic Cash Using Secret Splitting, Technical Report, Trinity College, Dublin.
-
(1998)
Reusable Off-line Electronic Cash Using Secret Splitting
-
-
Tewari, H.1
O'Mahony, D.2
Peirce, M.3
|