-
1
-
-
84901635605
-
-
Amazon Web Services, AWS
-
Amazon Web Services, AWS. Online at: http://aws.amazon.com.
-
-
-
-
2
-
-
84901635606
-
-
Google App Engine
-
Google App Engine. Online at: http://code.google.com/appengine/.
-
-
-
-
3
-
-
84901620059
-
-
Microsoft Azure
-
Microsoft Azure. http://www.microsoft.com/azure/.
-
-
-
-
4
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Elsevier
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 25 6 2009 599 616 Elsevier
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
5
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
ACM
-
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Xuemin Shen Secure provenance: the essential of bread and butter of data forensics in cloud computing ASIACCS 2010 2010 ACM
-
(2010)
ASIACCS 2010
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
7
-
-
41149088295
-
Automatic capture and efficient storage of e-Science experiment provenance
-
DOI 10.1002/cpe.1235
-
R.S. Barga, and L.A. Digiampietri Automatic capture and efficient storage of e-Science experiment provenance Concurrency and Computation: Practice and Experience 20 5 2008 419 429 (Pubitemid 351428356)
-
(2008)
Concurrency Computation Practice and Experience
, vol.20
, Issue.5
, pp. 419-429
-
-
Barga, R.S.1
Digiampietri, L.A.2
-
8
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
StorageSS'07
-
R. Hasan, R. Sion, M. Winslett, Introducing secure provenance: problems and challenges, in: Proceedings of ACM workshop on Storage Security and Survivabilit, StorageSS'07, pp. 13-18.
-
Proceedings of ACM Workshop on Storage Security and Survivabilit
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
9
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
DOI 10.1002/1532-2890(2000) 52:1<12::AID-ASI1062>3.0.CO;2-V
-
C.A. Lynch When documents deceive: trust and provenance as new factors for information retrieval in a tangled Web Journal of the American Society for Information Science and Technology 52 1 2001 12 17 (Pubitemid 32133545)
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynch, C.A.1
-
10
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Susan Hohenberger, and Anna Lysyanskaya How to securely outsource cryptographic computations TCC'05 LNCS vol. 3378 2005 264 282 (Pubitemid 41231169)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
12
-
-
0000490812
-
A survey of fast exponentiation methods
-
D.M. Gorden A survey of fast exponentiation methods Journal of Algorithms 27 1 1998 129 146
-
(1998)
Journal of Algorithms
, vol.27
, Issue.1
, pp. 129-146
-
-
Gorden, D.M.1
-
13
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Y.L. Simmhan, B. Plale, and D. Gannon A survey of data provenance in e-Science SIGMOD Record 34 3 2005 31 36 (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
14
-
-
84948706138
-
Chimera. A virtual data system for representing, querying, and automating data derivation
-
IEEE Computer Society
-
I.T. Foster, J. Vockler, M. Wilde, and Y. Zhao Chimera. A virtual data system for representing, querying, and automating data derivation SSDBM'02 2002 IEEE Computer Society 37 46
-
(2002)
SSDBM'02
, pp. 37-46
-
-
Foster, I.T.1
Vockler, J.2
Wilde, M.3
Zhao, Y.4
-
15
-
-
24744433101
-
A survey of peer-to-peer storage techniques for distributed file systems
-
Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
-
R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell A survey of peer-to-peer storage techniques for distributed file systems ITCC'05 2005 IEEE Computer Society 205 213 (Pubitemid 41290231)
-
(2005)
International Conference on Information Technology: Coding and Computing, ITCC
, vol.2
, pp. 205-213
-
-
Hasan, R.1
Anwar, Z.2
Yurcik, W.3
Brumbaugh, L.4
Campbell, R.5
-
16
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters Attribute-based encryption for fine-grained access control of encrypted data CCS'06 2006 ACM 89 98 (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
LNCS Springer Berlin, Heidelberg
-
B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Proc. of PKC'11 LNCS vol. 6571 2011 Springer Berlin, Heidelberg 53 70
-
(2011)
Proc. of PKC'11
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
18
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Amit Sahai, and Brent Waters Fuzzy identity-based encryption EUROCRYPT'05 LNCS vol. 3494 2005 Springer 457 473 (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
20
-
-
76549089793
-
Hidden attribute-based signatures without anonymity revocation
-
Elsevier
-
Jin Li, and Kwangjo Kim Hidden attribute-based signatures without anonymity revocation Information Sciences 180 9 2010 1681 1689 Elsevier
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1681-1689
-
-
Li, J.1
Kim, K.2
-
21
-
-
77954473455
-
Attribute-based signature and its applications
-
ASIACCS'10 ACM
-
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, and Kui Ren Attribute-based signature and its applications Proceeding of the 5th ACM Symposium on Information, Computer and Communications Security ASIACCS'10 2010 ACM 60 69
-
(2010)
Proceeding of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 60-69
-
-
Li, J.1
Au, M.H.2
Susilo, W.3
Xie, D.4
Ren, K.5
-
22
-
-
84901620060
-
Improving privacy in multi-authority attribute-based signature
-
Jin Li, Xu Ma, and Dongqing Xie Improving privacy in multi-authority attribute-based signature ChinaCrypt 2011
-
(2011)
ChinaCrypt
-
-
Li, J.1
Ma, X.2
Xie, D.3
-
23
-
-
85024290278
-
Group signatures
-
LNCS Springer-Verlag
-
D. Chaum, and E. van Heyst Group signatures Eurocrypt'91 LNCS vol. 547 1991 Springer-Verlag 257 265
-
(1991)
Eurocrypt'91
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
25
-
-
84979291225
-
Broadcast encryption
-
LNCS Springer-Verlag
-
Amos Fiat, and Moni Naor Broadcast encryption CRYPTO'93 LNCS vol. 773 1993 Springer-Verlag 480 491
-
(1993)
CRYPTO'93
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
26
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with accountability
-
ACM
-
Jin Li, Qiong Huang, Xiaofeng Chen, and Sherman S. Chow Multi-authority ciphertext-policy attribute-based encryption with accountability ASIACCS'11 2011 ACM
-
(2011)
ASIACCS'11
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.4
-
28
-
-
84899113029
-
Outsourcing the decryption of ABE ciphertexts
-
USENIX Association Berkeley
-
M. Green, S. Hohenberger, and B. Waters Outsourcing the decryption of ABE ciphertexts Proc. of SEC'11 2011 USENIX Association Berkeley
-
(2011)
Proc. of SEC'11
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
29
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
LNCS Springer
-
Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, and Wenjing Lou New algorithms for secure outsourcing of modular exponentiations ESORICS LNCS vol. 7459 2012 Springer 541 556
-
(2012)
ESORICS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
|