-
1
-
-
84868152765
-
Insider attacks in cloud computing. Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications
-
Jun. 25-27, IEEE Xplore Press, England, DOI: 10.1109/TrustCom.2012.188
-
Adrian, D., S. Creese and M. Goldsmith, 2012. Insider attacks in cloud computing. Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications, Jun. 25-27, IEEE Xplore Press, England, pp: 857-862. DOI: 10.1109/TrustCom.2012.188
-
(2012)
, pp. 857-862
-
-
Adrian, D.1
Creese, S.2
Goldsmith, M.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores.
-
DOI: 10.1145/1315245.1315318
-
Ateniese, G., R. Burns, R. Curtmola, J. Herring and L. Kissner et al., 2007. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 02, ACM Press, USA., pp: 598-609. DOI: 10.1145/1315245.1315318
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 02, ACM Press, USA.
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
-
4
-
-
80052864529
-
The final frontier: Confidentiality and privacy in the cloud. Computer
-
DOI: 10.1109/MC.2011.223
-
Francisco, R., S. Abreu and M. Correia, 2011. The final frontier: Confidentiality and privacy in the cloud. Computer, 44: 44-50. DOI: 10.1109/MC.2011.223
-
(2011)
, vol.44
, pp. 44-50
-
-
Francisco, R.1
Abreu, S.2
Correia, M.3
-
5
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism. Proceedings of the 27th International Conference on Data Engineering, Apr. 11-16, IEEE Xplore Press, Germany
-
DOI: 10.1109/ICDE.2011.5767862
-
Hibo, H., J. Xu, C. Ren and B. Choi, 2011. Processing private queries over untrusted data cloud through privacy homomorphism. Proceedings of the 27th International Conference on Data Engineering, Apr. 11-16, IEEE Xplore Press, Germany, pp: 601-61. DOI: 10.1109/ICDE.2011.5767862
-
(2011)
, pp. 601-661
-
-
Hibo, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
6
-
-
84872854104
-
Cloud Computing for business.
-
Oct. 17-19, IEEE Xplore Press, Georgia, DOI: 10.1109/ICAICT.2012.6398514
-
Khayyam, H., Q. Ilkin, B. Vusale and B. Mammad, 2012. Cloud Computing for business. Proceedings of the 6th International Conference on Application of Information and Communication Technologies, Oct. 17-19, IEEE Xplore Press, Georgia, pp: 1-4. DOI: 10.1109/ICAICT.2012.6398514
-
(2012)
Proceedings of the 6th International Conference on Application of Information and Communication Technologies
, pp. 1-4
-
-
Khayyam, H.1
Ilkin, Q.2
Vusale, B.3
Mammad, B.4
-
7
-
-
84863127613
-
Study on the third-party audit in cloud storage service.
-
Dec. 12-14, IEEE Xplore Press, Hong Kong, DOI: 10.1109/CSC.2011.6138525
-
Ling, L., X. Lin, L. Jing and C. Zhang, 2011. Study on the third-party audit in cloud storage service. Proceedings of teg International Conference on Cloud and Service Computing, Dec. 12-14, IEEE Xplore Press, Hong Kong, pp: 220-227. DOI: 10.1109/CSC.2011.6138525
-
(2011)
Proceedings of teg International Conference on Cloud and Service Computing
, pp. 220-227
-
-
Ling, L.1
Lin, X.2
Jing, L.3
Zhang, C.4
-
8
-
-
84875991211
-
A Study on significance of adopting cloud computing paradigm in healthcare sector.
-
Dec. 8-10, IEEE Xplore Press, UAE, DOI: 10.1109/ICCCTAM.2012.6488073
-
Mervat, B., S. Brohi, S. Chuprat and A. Jamalul-lail, 2012. A Study on significance of adopting cloud computing paradigm in healthcare sector. Proceedings of the 2012 International Conference on Cloud Computing Technologies, Applications and Management, Dec. 8-10, IEEE Xplore Press, UAE, pp: 65-68. DOI: 10.1109/ICCCTAM.2012.6488073
-
(2012)
Proceedings of the 2012 International Conference on Cloud Computing Technologies, Applications and Management
, pp. 65-68
-
-
Mervat, B.1
Brohi, S.2
Chuprat, S.3
Jamalul-lail, A.4
-
9
-
-
80053418474
-
A threat free architecture for privacy assurance in cloud computing.
-
Jul. 4-9, IEEE Xplore Press, USA., DOI: 10.1109/SERVICES.2011.11
-
Prasadreddy, P., T. Srinivasa and S. Phani, 2011. A threat free architecture for privacy assurance in cloud computing. Proceedings of the IEEE World Congress on Services, Jul. 4-9, IEEE Xplore Press, USA., pp: 564-568. DOI: 10.1109/SERVICES.2011.11
-
(2011)
Proceedings of the IEEE World Congress on Services
, pp. 564-568
-
-
Prasadreddy, P.1
Srinivasa, T.2
Phani, S.3
-
10
-
-
78650536265
-
Protection of identity information in cloud computing without trusted third party.
-
Oct. 31 Nov. -03, IEEE Xplore Press, Indian DOI: 10.1109/SRDS.2010.57
-
Ranchal, R., B. Bhargava, L. Ben and L. Lilien, 2010. Protection of identity information in cloud computing without trusted third party. Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems, Oct. 31 Nov. -03, IEEE Xplore Press, Indian, pp: 368-372. DOI: 10.1109/SRDS.2010.57
-
(2010)
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Ben, L.3
Lilien, L.4
-
11
-
-
80052161321
-
Lucy in the sky without diamonds: Stealing confidential data in the cloud.
-
Jun. 27-30, IEEE Xplore Press, Hong Kong. DOI: 10.1109/DSNW.2011.5958798
-
Rocha, F and M. Correia, 2011. Lucy in the sky without diamonds: Stealing confidential data in the cloud. Proceedings of the 41st International Conference on Dependable Systems and Networks Workshops, Jun. 27-30, IEEE Xplore Press, Hong Kong, pp: 129-134. DOI: 10.1109/DSNW.2011.5958798
-
(2011)
Proceedings of the 41st International Conference on Dependable Systems and Networks Workshops
, pp. 129-134
-
-
Rocha, F.1
Correia, M.2
-
12
-
-
77953310709
-
Achieving secure, scalable and fine-grained data access control in cloud computing.
-
Mar. 14-19, IEEE Xplore Press, USA., DOI: 10.1109/INFCOM.2010.5462174
-
Shucheng, Y., C. Wang, K. Ren and W. Lou, 2010. Achieving secure, scalable and fine-grained data access control in cloud computing. Proceedings of the 30th International Conference on Computer Communications, Mar. 14-19, IEEE Xplore Press, USA., pp: 1-9. DOI: 10.1109/INFCOM.2010.5462174
-
(2010)
Proceedings of the 30th International Conference on Computer Communications
, pp. 1-9
-
-
Shucheng, Y.1
Wang, C.2
Ren, K.3
Lou, W.4
-
13
-
-
84862848411
-
Improving public auditability, data possession in data storage security for cloud computing.
-
Apr. 19- 21, IEEE Xplore Press, India, DOI: 10.1109/ICRTIT.2012.6206835
-
Venkatesh, M., M.R. Sumalatha and C. SelvaKumar, 2012. Improving public auditability, data possession in data storage security for cloud computing. Proceedings of the International Conference on Recent Trends in Information Technology, Apr. 19- 21, IEEE Xplore Press, India, pp: 463-467. DOI: 10.1109/ICRTIT.2012.6206835
-
(2012)
Proceedings of the International Conference on Recent Trends in Information Technology
, pp. 463-467
-
-
Venkatesh, M.1
Sumalatha, M.R.2
SelvaKumar, C.3
-
14
-
-
77953295132
-
Privacypreserving public auditing for data storage security in cloud computing.
-
Mar. 14-19, IEEE Xplore Press, USA., DOI: 10.1109/INFCOM.2010.5462173
-
Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacypreserving public auditing for data storage security in cloud computing. Proceedings of the 30th International Conference on Computer Communications, Mar. 14-19, IEEE Xplore Press, USA., pp: 1-9. DOI: 10.1109/INFCOM.2010.5462173
-
(2010)
Proceedings of the 30th International Conference on Computer Communications
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
15
-
-
84863088193
-
Cloud computing concepts, architecture and challenges. Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, Mar. 21-22, IEEE Xplore Press, India, DOI: 10.1109/ICCEET.2012.6203873
-
Yashpalsinh, J. and K. Modi, 2012. Cloud computing concepts, architecture and challenges. Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, Mar. 21-22, IEEE Xplore Press, India, pp: 877-880. DOI: 10.1109/ICCEET.2012.6203873
-
(2012)
, pp. 877-880
-
-
Yashpalsinh, J.1
Modi, K.2
|