-
1
-
-
79954609461
-
The nist definition of cloud computing, version 15
-
P. Mell and T. Grance, "The NIST Definition of Cloud Computing, Version 15," Nat'l Inst. of Standards and Technology, Information Technology Laboratory, vol. 53, p. 50, http://csrc.nist.gov/groups/ SNS/cloud-computing/, 2010.
-
(2010)
Nat'l Inst. of Standards and Technology, Information Technology Laboratory
, vol.53
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
2
-
-
84897817289
-
IT cloud services user survey, pt.2: Top benefits & challenges
-
F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges," blog, http://blogs.idc.com/ie/?p=210, 2008.
-
(2008)
Blog
-
-
Gens, F.1
-
4
-
-
80053153446
-
Security prospects through cloud computing by adopting multiple clouds
-
J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, "Security Prospects through Cloud Computing by Adopting Multiple Clouds," Proc. IEEE Fourth Int'l Conf. Cloud Computing (CLOUD), 2011.
-
(2011)
Proc. IEEE Fourth Int'l Conf. Cloud Computing (CLOUD)
-
-
Bohli, J.-M.1
Jensen, M.2
Gruschka, N.3
Schwenk, J.4
Iacono, L.L.L.5
-
5
-
-
84874751138
-
Top threats to cloud computing v1.0
-
D. Hubbard and M. Sutton, "Top Threats to Cloud Computing V1.0," Cloud Security Alliance, http://www. cloudsecurityalliance.org/ topthreats, 2010.
-
(2010)
Cloud Security Alliance
-
-
Hubbard, D.1
Sutton, M.2
-
6
-
-
74349113474
-
On technical security issues in cloud computing
-
M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "On Technical Security Issues in Cloud Computing," Proc. IEEE Int'l Conf. Cloud Computing (CLOUD-II), 2009.
-
(2009)
Proc. IEEE Int'l Conf. Cloud Computing (CLOUD-II)
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Lo Iacono, L.4
-
7
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third- party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 199-212, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
8
-
-
84869859962
-
Cross-vm side channels and their use to extract private keys
-
Y. Zhang, A. Juels, M.K.M. Reiter, and T. Ristenpart, "Cross-VM Side Channels and Their Use to Extract Private Keys," Proc. ACM Conf. Computer and Comm. Security (CCS '12), pp. 305-316, 2012.
-
(2012)
Proc. ACM Conf. Computer and Comm. Security (CCS '12)
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.M.3
Ristenpart, T.4
-
10
-
-
77954328275
-
XML signature element wrapping attacks and countermeasures
-
M. McIntosh and P. Austel, "XML Signature Element Wrapping Attacks and Countermeasures," Proc. Workshop Secure Web Services, pp. 20-27, 2005.
-
(2005)
Proc. Workshop Secure Web Services
, pp. 20-27
-
-
McIntosh, M.1
Austel, P.2
-
11
-
-
77951058864
-
Google privacy blunder shares your docs without permission
-
J. Kincaid, "Google Privacy Blunder Shares Your Docs without Permission," TechCrunch, http://techcrunch.com/2009/03/07/ huge-google-privacy-blunder-shares-your-docs-withoutpermission/, 2009.
-
(2009)
TechCrunch
-
-
Kincaid, J.1
-
12
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces," Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW '11), pp. 3-14, 2011.
-
(2011)
Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW '11)
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
13
-
-
80755168339
-
AmazonIA: When elasticity snaps back
-
S. Bugiel, S. Nürnberger, T. Pöppelmann, A.-R. Sadeghi, and T. Schneider, "AmazonIA: When Elasticity Snaps Back," Proc. 18th ACM Conf. Computer and Comm. Security (CCS '11), pp. 389-400, 2011.
-
(2011)
Proc. 18th ACM Conf. Computer and Comm. Security (CCS '11)
, pp. 389-400
-
-
Bugiel, S.1
Nürnberger, S.2
Pöppelmann, T.3
Sadeghi, A.-R.4
Schneider, T.5
-
14
-
-
70349755377
-
Blueprint for the intercloud-protocols and formats for cloud computing interoperability
-
D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, "Blueprint for the Intercloud-Protocols and Formats for Cloud Computing Interoperability," Proc. Int'l Conf. Internet and Web Applications and Services, pp. 328-336, 2009.
-
(2009)
Proc. Int'l Conf. Internet and Web Applications and Services
, pp. 328-336
-
-
Bernstein, D.1
Ludvigson, E.2
Sankar, K.3
Diamond, S.4
Morrow, M.5
-
15
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to Enhance Cloud Architectures to Enable Cross-Federation," Proc. IEEE Third Int'l Conf. Cloud Computing (CLOUD), pp. 337-345, 2010.
-
(2010)
Proc. IEEE Third Int'l Conf. Cloud Computing (CLOUD)
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
16
-
-
0021372186
-
Extending binary byzantine agreement to multivalued byzantine agreement
-
DOI 10.1016/0020-0190(84)90027-9
-
R. Turpin and B.A. Coan, "Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement," Information Processing Letters, vol. 18, no. 2, pp. 73-76, 1984. (Pubitemid 14570886)
-
(1984)
Information Processing Letters
, vol.18
, Issue.2
, pp. 73-76
-
-
Turpin Russell1
Coan Brian, A.2
-
22
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. Rivest, L. Adleman, and M. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, vol. 4, no. 11, pp. 169-180, 1978.
-
(1978)
Foundations of Secure Computation
, vol.4
, Issue.11
, pp. 169-180
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
23
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
84859950107
-
Multiparty computation with low communication, computation and interaction via threshold fhe
-
G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan, and D. Wichs, "Multiparty Computation with Low Communication, Computation and Interaction via Threshold Fhe," Proc. 31st Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '12), pp. 483-501, 2012.
-
(2012)
Proc. 31st Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '12)
, pp. 483-501
-
-
Asharov, G.1
Jain, A.2
López-Alt, A.3
Tromer, E.4
Vaikuntanathan, V.5
Wichs, D.6
-
27
-
-
84947931331
-
Some Recent Research Aspects of Threshold Cryptography
-
Information Security
-
Y. Desmedt, "Some Recent Research Aspects of Threshold Cryptography," Proc. First Int'l Information Security Workshop, pp. 158-173, 1998. (Pubitemid 128064894)
-
(1998)
Lecture Notes in Computer Science
, Issue.1396
, pp. 158-173
-
-
Desmedt, Y.1
-
29
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation," Proc. 20th Ann. ACM Symp. Theory of Computing (STOC '88), pp. 1-10, 1988.
-
(1988)
Proc. 20th Ann. ACM Symp. Theory of Computing (STOC '88)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
30
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S.M.S. Micali, and A. Wigderson, "How to Play Any Mental Game," Proc. 19th Ann. ACM Symp. Theory of Computation (STOC '87), pp. 218-229, 1987.
-
(1987)
Proc. 19th Ann. ACM Symp. Theory of Computation (STOC '87)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.M.S.2
Wigderson, A.3
-
31
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
I. Damgård, M. Geisler, M. Krøigaard, and J.B.J. Nielsen, "Asynchronous Multiparty Computation: Theory and Implementation," Proc. 12th Int'l Conf. Practice and Theory Public Key Cryptography (PKC '09), pp. 160-179, 2009.
-
(2009)
Proc. 12th Int'l Conf. Practice and Theory Public Key Cryptography (PKC '09)
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.J.4
-
32
-
-
84863447066
-
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
-
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, "SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics," Proc. USENIX Security Symp., pp. 223-240, 2010.
-
(2010)
Proc. USENIX Security Symp
, pp. 223-240
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
33
-
-
80053596395
-
Twin clouds: Secure cloud computing with low latency
-
S. Bugiel, S. Nürnberger, A.-R. Sadeghi, and T. Schneider, "Twin Clouds: Secure Cloud Computing with Low Latency," Proc. 12th IFIP TC 6/TC 11 Int'l Conf. Comm. and Multimedia Security (CMS '11), pp. 32-44, 2011.
-
(2011)
Proc. 12th IFIP TC 6/TC 11 Int'l Conf. Comm. and Multimedia Security (CMS '11)
, pp. 32-44
-
-
Bugiel, S.1
Nürnberger, S.2
Sadeghi, A.-R.3
Schneider, T.4
-
34
-
-
70350379222
-
Secure multiparty computation goes live
-
R. Dingledine and P. Golle, eds., Springer-Verlag
-
P. Bogetoft, D.L.D. Christensen, I. Damgard, M. Geisler, T.P.T. Jakobsen, M. Kroigaard, J.D.J. Nielsen, J.B.J. Nielsen, K. Nielsen, J. Pagter, M.I.M. Schwartzbach, and T. Toft, "Secure Multiparty Computation Goes Live," Financial Cryptography and Data Security, R. Dingledine and P. Golle, eds., pp. 325-343, Springer-Verlag, 2009.
-
(2009)
Financial Cryptography and Data Security
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.D.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.P.T.5
Kroigaard, M.6
Nielsen, J.D.J.7
Nielsen, J.B.J.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.M.11
Toft, T.12
-
36
-
-
84863449538
-
Assisting server for secure multi-party computation
-
J.-M. Bohli, W. Li, and J. Seedorf, "Assisting Server for Secure Multi-Party Computation," Proc. Sixth IFIP WG 11.2 Int'l Conf. Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP '12), pp. 144-159, 2012.
-
(2012)
Proc. Sixth IFIP WG 11.2 Int'l Conf. Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems (WISTP '12)
, pp. 144-159
-
-
Bohli, J.-M.1
Li, W.2
Seedorf, J.3
-
39
-
-
84864872035
-
SeC2: Secure mobile solution for distributed public cloud storages
-
J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, and C. Wietfeld, "SeC2: Secure Mobile Solution for Distributed Public Cloud Storages," Proc. Second Int'l Conf. Cloud Computing and Services Science (CLOSER), pp. 555-561, 2012.
-
(2012)
Proc. Second Int'l Conf. Cloud Computing and Services Science (CLOSER)
, pp. 555-561
-
-
Somorovsky, J.1
Meyer, C.2
Tran, T.3
Sbeiti, M.4
Schwenk, J.5
Wietfeld, C.6
-
41
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 79-88, 2006. (Pubitemid 47131358)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
42
-
-
33745134401
-
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions," Proc. 25th Ann. Int'l Conf. Advances in Cryptology (CRYPTO '05), pp. 205-222, 2005. (Pubitemid 43902115)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621 LNCS
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
43
-
-
82655162816
-
CryptDB: Protecting confidentiality with encrypted query processing
-
R. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: Protecting Confidentiality with Encrypted Query Processing," Proc. 23rd ACM Symp. Operating Systems Principles, pp. 85-100, 2011.
-
(2011)
Proc. 23rd ACM Symp. Operating Systems Principles
, pp. 85-100
-
-
Popa, R.1
Redfield, C.2
Zeldovich, N.3
Balakrishnan, H.4
-
44
-
-
67650690965
-
Order- preserving symmetric encryption
-
A. Boldyreva, N. Chenette, Y. Lee, and A. Oneill, "Order-Preserving Symmetric Encryption," Proc. 28th Ann. Int'l Conf. Advances in Cryptology: The Theory and Applications of Cryptology (EUROCRYPT '09), pp. 224-241, 2009.
-
(2009)
Proc. 28th Ann. Int'l Conf. Advances in Cryptology: The Theory and Applications of Cryptology (EUROCRYPT '09)
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
Oneill, A.4
-
46
-
-
78649986957
-
Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
-
L. Wiese, "Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints," Proc. Fifth Int'l Workshop Security (IWSEC '10), pp. 101-116, 2010.
-
(2010)
Proc. Fifth Int'l Workshop Security (IWSEC '10)
, pp. 101-116
-
-
Wiese, L.1
-
47
-
-
51849119332
-
@neurist-towards a system architecture for advanced disease management through integration of heterogeneous data, computing, and complex processing services
-
H. Rajasekaran, L. Lo Iacono, P. Hasselmeyer, J. Fingberg, P. Summers, S. Benkner, G. Engelbrecht, A. Arbona, A. Chiarini, C.M.C. Friedrich, M. Hofmann-Apitius, K. Kumpf, B. Moore, P. Bijlenga, J. Iavindrasana, H. Mueller, R.D.R. Hose, R. Dunlop, and A. Frangi, "@neurist-Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services," Proc. IEEE 21st Int'l Symp. Computer-Based Medical Systems (CBMS '08, ) pp. 361-366, 2008.
-
(2008)
Proc. IEEE 21st Int'l Symp. Computer-Based Medical Systems (CBMS '08,)
, pp. 361-366
-
-
Rajasekaran, H.1
Lo Iacono, L.2
Hasselmeyer, P.3
Fingberg, J.4
Summers, P.5
Benkner, S.6
Engelbrecht, G.7
Arbona, A.8
Chiarini, A.9
Friedrich, C.M.C.10
Hofmann-Apitius, M.11
Kumpf, K.12
Moore, B.13
Bijlenga, P.14
Iavindrasana, J.15
Mueller, H.16
Hose, R.D.R.17
Dunlop, R.18
Frangi, A.19
-
54
-
-
84897783593
-
Commission decision of 5 february 2010 on standard contractual clauses for the transfer of personal data to processors established in third countries under directive 95/ 46/ec of the european parliament and of the council
-
European Commission
-
European Commission, "Commission Decision of 5 February 2010 on Standard Contractual Clauses for the Transfer of Personal Data to Processors Established in Third Countries under Directive 95/ 46/EC of the European Parliament and of the Council," Official J. European Union, vol. L39, pp. 5-18, 2010.
-
(2010)
Official J. European Union
, vol.L39
, pp. 5-18
-
-
-
56
-
-
84897797894
-
German federal data protection act (bdsg)
-
Fed. Republic of Germany
-
Fed. Republic of Germany, "German Federal Data Protection Act (BDSG)," Fed. Law Gazette I, p. 66, 2009.
-
(2009)
Fed. Law Gazette i
, pp. 66
-
-
-
57
-
-
77956385334
-
-
EU Article 29 Working Party, Opinion 05/ 2012, WP 196
-
EU Article 29 Working Party, "Cloud Computing," Opinion 05/ 2012, WP 196, http://ec.europa.eu/justice/data-protection/ article-29/ documentation/opinion-recommendation/files/2012/ wp196-en.pdf, 2012.
-
(2012)
Cloud Computing
-
-
|