메뉴 건너뛰기




Volumn , Issue , 2013, Pages 25-32

End-to-end privacy policy enforcement in cloud infrastructure

Author keywords

Cloud computing; data protection; FUSE; privacy control; sticky policy

Indexed keywords

CLOUD INFRASTRUCTURES; CLOUD TECHNOLOGIES; COMPUTATION COSTS; DATA PROTECTION; PRIVACY CONSTRAINTS; PRIVACY CONTROL; STICKY POLICIES; TRANSFER CONTROL;

EID: 84893816738     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudNet.2013.6710554     Document Type: Conference Paper
Times cited : (27)

References (34)
  • 3
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing and fault tolerance
    • M.O. Rabin, "Efficient dispersal of information for security, load balancing and fault tolerance", Journal of the ACM, Vol. 36, Issue 2, 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2
    • Rabin, M.O.1
  • 5
    • 84876105782 scopus 로고    scopus 로고
    • Epsilon data breach highlights cloud computing security concerns
    • F.Y. Rashid, "Epsilon data breach highlights cloud computing security concerns", eWeek.com, 2011.
    • (2011) EWeek.com
    • Rashid, F.Y.1
  • 7
    • 84875340659 scopus 로고    scopus 로고
    • Opinion 05/2012 on cloud computing WP 196, Brussels, July
    • Article 29 Data Protection Working Party, "Opinion 05/2012 on cloud computing", WP 196, Brussels, July 2012.
    • (2012) Article 29 Data Protection Working Party
  • 9
    • 84893755338 scopus 로고    scopus 로고
    • Beyond location: Data security in the 21st century
    • Jan
    • D. Desai, "Beyond location: data security in the 21st Century", Communications of the ACM; Vol. 56, No. 1, Jan. 2013.
    • (2013) Communications of the ACM , vol.56 , Issue.1
    • Desai, D.1
  • 11
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Nov.-Dec
    • H. Takabi, J.B.D. Joshi, and G.J. Ahn, "Security and privacy challenges in cloud computing environments", IEEE Security & Privacy, Vol.8, No.6, Nov.-Dec. 2010.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.J.3
  • 14
    • 84893769465 scopus 로고    scopus 로고
    • Sophos, http://www.sophos.com.
    • Sophos
  • 15
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • 14-19 March 2010
    • S. Yu, C. Wang, K. Ren, W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", IEEE INFOCOM 2010, 14-19 March 2010.
    • (2010) IEEE INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 16
    • 84873619608 scopus 로고    scopus 로고
    • Collaboration in multicloud computing environments: Framework and security issues
    • Feb
    • M. Singhal, S. Chandrasekhar, T. Ge, R. Sandhu, K. Ram, G.J. Ahn, E. Bertino, "Collaboration in multicloud computing environments: framework and security issues", Computer, vol. 46, no. 2, Feb. 2013.
    • (2013) Computer , vol.46 , Issue.2
    • Singhal, M.1    Chandrasekhar, S.2    Ge, T.3    Sandhu, R.4    Ram, K.5    Ahn, G.J.6    Bertino, E.7
  • 19
    • 84861610379 scopus 로고    scopus 로고
    • A privacy preserving authorisation system for the cloud
    • Sept
    • D.W. Chadwick and K. Fatema, "A privacy preserving authorisation system for the cloud", J. Comput. Syst. Sci., vol. 78, no. 5, Sept. 2012.
    • (2012) J. Comput. Syst. Sci. , vol.78 , Issue.5
    • Chadwick, D.W.1    Fatema, K.2
  • 20
    • 84858009776 scopus 로고    scopus 로고
    • Encore: Dynamic consent, policy enforcement and accountable information sharing within and across organisations
    • M. Casassa Mont, V. Sharma, and S. Pearson, "EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations", HP report HPL-2012-36, 2012.
    • (2012) HP Report HPL-2012-36
    • Mont, M.C.1    Sharma, V.2    Pearson, S.3
  • 21
    • 84893778946 scopus 로고    scopus 로고
    • Apple icloud breach proves wozniak's point about cloud risks
    • August
    • T. Samson, "Apple iCloud breach proves Wozniak's point about cloud risks", InfoWorld, August 2012.
    • (2012) InfoWorld
    • Samson, T.1
  • 23
    • 84893759982 scopus 로고    scopus 로고
    • Tools and strategies for file-level data protection
    • April
    • R. George., "Tools and strategies for file-level data protection", InformationWeek Report, April 2013.
    • (2013) InformationWeek Report
    • George, R.1
  • 24
    • 84893765515 scopus 로고    scopus 로고
    • Opportunities for csps in enterprise-grade public cloud computing
    • May
    • P. Hall, "Opportunities for CSPs in enterprise-grade public cloud computing", OVUM, May 2012.
    • (2012) OVUM
    • Hall, P.1
  • 25
    • 84893722961 scopus 로고    scopus 로고
    • Right Management System, http://technet.microsoft.com/enus/windowsserver/ dd448611.aspx.
    • Right Management System
  • 28
    • 84893716095 scopus 로고    scopus 로고
    • UK Cloud adoption and trends for 2013
    • Cloud Industry Forum, "UK Cloud adoption and trends for 2013", 2012.
    • (2012) Cloud Industry Forum
  • 29
    • 84893788298 scopus 로고    scopus 로고
    • Seeding the cloud: An innovative approach to grow trust in cloud based infrastructures
    • Lecture Notes in Computer Science
    • S. Betgé-Brezetz et al., "Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures" FIA book, Lecture Notes in Computer Science, Vol. 7858, 2013.
    • (2013) FIA Book , vol.7858
    • Betgé-Brezetz, S.1
  • 30
    • 84893773219 scopus 로고    scopus 로고
    • GPG, http://www.gnupg.org.
    • GPG
  • 31
    • 84893774411 scopus 로고    scopus 로고
    • BlowFish, https://www.schneier.com/blowfish.html.
    • BlowFish
  • 32
    • 84889256275 scopus 로고    scopus 로고
    • Sun XACML, http://sunxacml.sourceforge.net.
    • Sun XACML
  • 34
    • 84893791161 scopus 로고    scopus 로고
    • FUSE-J, http://sourceforge.net/projects/fuse-j.
    • FUSE-J


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.