메뉴 건너뛰기




Volumn 10, Issue 4, 2013, Pages 212-224

Security and privacy-enhancing multicloud architectures

Author keywords

Application partitioning; Cloud; Data partitioning; Multicloud; Multiparty computation; Privacy; Security; Tier partitioning

Indexed keywords

ARCHITECTURE; CLOUDS; DATA PRIVACY;

EID: 84897586246     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2013.6     Document Type: Article
Times cited : (118)

References (57)
  • 2
    • 84897817289 scopus 로고    scopus 로고
    • IT cloud services user survey, pt.2: Top benefits & challenges
    • F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges," blog, http://blogs.idc.com/ie/?p=210, 2008.
    • (2008) Blog
    • Gens, F.1
  • 5
    • 84874751138 scopus 로고    scopus 로고
    • Top threats to cloud computing v1.0
    • D. Hubbard and M. Sutton, "Top Threats to Cloud Computing V1.0," Cloud Security Alliance, http://www. cloudsecurityalliance.org/ topthreats, 2010.
    • (2010) Cloud Security Alliance
    • Hubbard, D.1    Sutton, M.2
  • 10
    • 77954328275 scopus 로고    scopus 로고
    • XML signature element wrapping attacks and countermeasures
    • M. McIntosh and P. Austel, "XML Signature Element Wrapping Attacks and Countermeasures," Proc. Workshop Secure Web Services, pp. 20-27, 2005.
    • (2005) Proc. Workshop Secure Web Services , pp. 20-27
    • McIntosh, M.1    Austel, P.2
  • 11
    • 77951058864 scopus 로고    scopus 로고
    • Google privacy blunder shares your docs without permission
    • J. Kincaid, "Google Privacy Blunder Shares Your Docs without Permission," TechCrunch, http://techcrunch.com/2009/03/07/ huge-google-privacy-blunder-shares-your-docs-withoutpermission/, 2009.
    • (2009) TechCrunch
    • Kincaid, J.1
  • 16
    • 0021372186 scopus 로고
    • Extending binary byzantine agreement to multivalued byzantine agreement
    • DOI 10.1016/0020-0190(84)90027-9
    • R. Turpin and B.A. Coan, "Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement," Information Processing Letters, vol. 18, no. 2, pp. 73-76, 1984. (Pubitemid 14570886)
    • (1984) Information Processing Letters , vol.18 , Issue.2 , pp. 73-76
    • Turpin Russell1    Coan Brian, A.2
  • 23
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 27
    • 84947931331 scopus 로고    scopus 로고
    • Some Recent Research Aspects of Threshold Cryptography
    • Information Security
    • Y. Desmedt, "Some Recent Research Aspects of Threshold Cryptography," Proc. First Int'l Information Security Workshop, pp. 158-173, 1998. (Pubitemid 128064894)
    • (1998) Lecture Notes in Computer Science , Issue.1396 , pp. 158-173
    • Desmedt, Y.1
  • 32
    • 84863447066 scopus 로고    scopus 로고
    • SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
    • M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, "SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics," Proc. USENIX Security Symp., pp. 223-240, 2010.
    • (2010) Proc. USENIX Security Symp , pp. 223-240
    • Burkhart, M.1    Strasser, M.2    Many, D.3    Dimitropoulos, X.4
  • 41
  • 46
    • 78649986957 scopus 로고    scopus 로고
    • Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
    • L. Wiese, "Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints," Proc. Fifth Int'l Workshop Security (IWSEC '10), pp. 101-116, 2010.
    • (2010) Proc. Fifth Int'l Workshop Security (IWSEC '10) , pp. 101-116
    • Wiese, L.1
  • 54
    • 84897783593 scopus 로고    scopus 로고
    • Commission decision of 5 february 2010 on standard contractual clauses for the transfer of personal data to processors established in third countries under directive 95/ 46/ec of the european parliament and of the council
    • European Commission
    • European Commission, "Commission Decision of 5 February 2010 on Standard Contractual Clauses for the Transfer of Personal Data to Processors Established in Third Countries under Directive 95/ 46/EC of the European Parliament and of the Council," Official J. European Union, vol. L39, pp. 5-18, 2010.
    • (2010) Official J. European Union , vol.L39 , pp. 5-18
  • 56
    • 84897797894 scopus 로고    scopus 로고
    • German federal data protection act (bdsg)
    • Fed. Republic of Germany
    • Fed. Republic of Germany, "German Federal Data Protection Act (BDSG)," Fed. Law Gazette I, p. 66, 2009.
    • (2009) Fed. Law Gazette i , pp. 66
  • 57
    • 77956385334 scopus 로고    scopus 로고
    • EU Article 29 Working Party, Opinion 05/ 2012, WP 196
    • EU Article 29 Working Party, "Cloud Computing," Opinion 05/ 2012, WP 196, http://ec.europa.eu/justice/data-protection/ article-29/ documentation/opinion-recommendation/files/2012/ wp196-en.pdf, 2012.
    • (2012) Cloud Computing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.